Professional Documents
Culture Documents
Editor
Lin Liu
Wuhan University of Technology, Wuhan, China
CRC Press/Balkema is an imprint of the Taylor & Francis Group, an informa business
All rights reserved. No part of this publication or the information contained herein may be reproduced,
stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical,
by photocopying, recording or otherwise, without written prior permission from the publisher.
Although all care is taken to ensure integrity and the quality of this publication and the information
herein, no responsibility is assumed by the publishers nor the author for any damage to the property or
persons as a result of operation or use of this publication and/or the information contained herein.
Table of contents
Preface xiii
Committees xv
Sponsors xvii
v
Simulation of towing operation for tractor-aircraft system 85
J. Bao, Q. Wu & J. Xie
Study of the influence of the process parameters of incremental forming of 6061
aluminium alloy 89
Z. Liu, Z. Shi, T. Guo, Z. Li & C. Cui
vi
Research on clustering algorithms for wireless sensor networks 197
H. Chen & L. Yuan
Research on real-time data centre reconstruction technology based on big data technology 203
X. Li, S. Zhou, S. Ji, G. Zhen, Y. He, W. Li, Y. Wang, W. Tang, J. Chen & P. Lou
Research on a small wireless power transfer device via magnetic coupling resonant 207
X. Liu, R. Dou, Y. Yang, P. Wu, X. Xiao, S. Chen & J. Sun
Simulation and verification technology of shortwave communication based on OPNET 211
X. Zhang, Z. Yi, H. He, J. Wan & Y. Ren
The application of time-frequency analysis method in frequency hopping signal analysis 215
Q. Wu, Z. Tan & H. Shang
Two strategies to improve the performance of two-way relay networks: Relay selection
and power allocation 219
T. Liu, C. Dong & X. Jiang
Updated dynamic channel reservation scheme based on priorities in LEO satellite systems 223
J. Guo, J. Gao & J. Ran
vii
Research on the output-input relationship of Solid Oxide Fuel Cell (SOFC) stack
with indirect internal reforming operation 305
C. Yuan & H. Liu
Simulation of a heat pipe receiver with high-temperature latent heat thermal energy
storage during the charging process 313
H. Song, W. Zhang, Y. Li, Z. Yang & A. Ming
Temperature distribution of wire crimp tubes under different loads 321
H. Zhang, B. Wang, M. Wang, Y. Duan, X. Hu & H. Liu
Optical property research on Mg0.15Zn0.85O film by sol-gel technology 327
J. Zhang
System test and diagnosis, monitoring and identification, video and image processing
A novel remote sensing image segmentation algorithm based on the graph theory 333
Y. Zhou, Y. Han & J. Luo
A subpixel edge detection algorithm for the vision-based localisation of Light Emitting
Diode (LED) chips 339
Y. Qiu & B. Li
Active learning framework for android unknown malware detection 345
H. Zhu
An accelerated testing method based on similarity theory 349
S. Li, Y. Zhang & A. Wang
Analysis of factors influencing laser ranging accuracy 353
Y.G. Ji, C.Y. Tian, X.G. Ge, C.D. Ning & Z.H. Lan
Application of graph databases in the communication and information asset management
in power grid 357
X. Lv, S. Zheng, Z. Li, S. Liu & Y. Wang
Application of support vector regression in surge arrester fault diagnosis 363
Y. He, Y. Sun & H. Jiang
Effect of heave plate on wave piercing buoy 367
D. Jiang, J. Zhang, L. Ma & H. Chen
Height detection in smart baby weighing system using machine vision 371
Q. Fang & H. Tang
Lamb wave metal plate defect detection based on comsol and finite element analysis 375
P. Qin
Lane detection and fitting using the Artificial Fish Swarm Algorithm (AFSA) based
on a parabolic model 381
X. Wang, Z. Wang & L. Zhao
Method for supplementing incomplete traffic flow data in hazy conditions based
on guidance data 389
Y. Gong, J. Zhang, S. Li & J. Lan
Micro-satellite attitude determination based on MEKF using MEMS gyroscope
and magnetometer 395
F. Ni, H. Quan & W. Li
Research and implementation of a vehicle top-view system based on i.MX6Q 401
Y. Xu, X. Zuo, A. Cheng & R. Yuan
Research of the fault detection and repair technology for submarine cable 405
Z. Chen, Z. Lu, X. He & Y. Le
Research on blind identification method of error correcting code type 409
X. Li, M. Zhang & S. Han
viii
Research on the detection system for dynamic ship draft on the basis of ultrasonic
diffraction effect 419
M. Xiong, L. Lu, W. Zheng & R. Li
Research on key technologies of the unmanned-helicopter-born obstacle avoidance radar
for power line inspection 427
C. Li, B. Yang, C. Li, Z. Li & T. Ge
Research on the key technology of automatic target detection for visual vehicles 431
Q. Ren, H. Cheng & J. Chang
Research on machine learning identification based on adaptive algorithm 437
Q. Ren, H. Cheng & J. Chang
Research on main insulation monitoring of submarine cable based on the low frequency
signal of the system 443
Z. Chen, Z. Lu, X. Zheng & W. Peng
Research on object re-identification with compressive sensing in multi-camera systems 447
Y. Huang, Q. Liu & C. Yan
Research on plugging technology in the Yingtai Area of Daqing oilfield 451
Y. Li & Z. Dong
Research on vision technology: Introducing an intelligent destacker based on an ARM-based
laser scanner 455
L. Wang, Y. Peng & H. Li
Review of the image quality assessment methods and their applications to image defogging
and stabilisation 461
J. Cai, W. Yan & J. Liu
Study of a driver’s face and eyes identification method 471
Y. Zhang, H. Zhang, Z. Ding & J. Zhang
Testability modeling for a remote monitoring system of marine diesel engine power plant 475
X. Wen, G. He, K. Bi & P. Zhang
The dynamic target of Yellow River ice tracking algorithm based on wireless video streaming 481
L. Xu & S. Li
The on-line fault diagnosis technique for the radar system based on one-class support vector
machine and fuzzy expert system theory 485
M.S. Shao, X.Z. Zhang & G.H. Fan
ix
Comparative study on directional and reverse directional expert systems 525
Z. Lin, H. Huang & P. Wang
Dynamic modelling and simulation of a centrifugal compressor for diesel engines 531
L. Huang, G. Cheng, G. Zhu & S. Fan
Exploration of the operational management of a pig farm based on mathematical modelling 539
N. Ruan & L. Duan
Global large behaviour on a 2-D equation in turbulent fluid 543
H. Li & S. Deng
Glonass almanac parameters algorithm model 549
X. Xie & M. Lu
Local stability of solutions for a class of viscous compressible equations 553
S. Deng & H. Li
Maximum entropy-based sentiment analysis of online product reviews in Chinese 559
H. Wu, J. Li & J. Xie
Node spatial distribution and layout optimization based on the improved particle
swarm algorithm 563
H. Yu, F. Cui & Y. Wang
Optimal load control in direct current distribution networks 569
S. Liu, S. Zou, Z. Ma, Y. Shao & S. Feng
Research on attribute-based encryption scheme for constant-length ciphertexts 575
L. Han, Z. Wang & Y. Wang
Research on attribute-based encryption scheme for constant-length decryption key
in Hadoop cloud environment 581
L. Han, Y. Wang & Y. Sun
Research on Bayesian network structure learning method based on hybrid mountain-climbing
algorithm and genetic algorithm 587
W. Xu, G. Cheng & L. Huang
Research of the evaluation of electric power construction projects based on fuzzy
comprehensive evaluation 591
X. Feng, Y. Sha, X. Wang, M. Li, K. Cao, H. Xu, Z. Sun & Y. Wang
Research on vehicle routing optimisation in the emergency period of natural disaster rescue 597
J. Ma, X. Wang & L. Zhao
Research on the Zigbee routing algorithm based on link availability prediction 601
Z. He
Short-term load forecasting based on fuzzy neural network using ant colony
optimization algorithm 605
Z. Ren, Q. Chen, L. Chen, K. Cao, H. Wang, R. Chen, Y. Tian, Y. Wang & H. Wang
Soft measurement of emulsion matrix viscosity based on GA-BP neural network theory 609
Y. Wang & J. Zhang
Stability control algorithm for unmanned aerial vehicle based on dynamic
feedback search 613
X. Lu & J. Ke
Study of MA and MACD directional expert systems based on funds management 621
F. Yu, H. Huang & P. Wang
Study of RSI and W%R reverse directional expert systems based on funds management 627
H. Huang & P. Wang
Weather routing based on modified genetic algorithm 633
Y. Wang, X. Zhu, X. Li & H. Wang
x
Technologies in electrical and electronic control and automation
A full on-chip LDO regulator with a novel transient-response-enhanced circuit 639
P. Zhang, P. Wang, H. Meng, S. Zhao & F. Liu
A review on camera ego-motion estimation methods based on optical flow for robotics 645
L. Lu
A work charged car insulation system design and research 651
K. Li, L. Xia, L. Tan & D. Wang
Analysis of static impedance abnormity based on EMMI 655
H. Meng, R. Li, P. Zhang & Y. Chen
Application of an unmanned aerial vehicle in fire rescue 659
B. Hu & J. Xing
Attitude tracking of quadrotor UAV based on extended state observer 663
Y. Liu, X. Xu & Z. Yang
Design of a high performance triple-mode oscillator 669
Z. Li, S. Yue, Y. Mo, J. Wang & F. Chu
Electromagnetic compatibility design of power supply based on DSP industrial control system 675
W. Liu, X. Zheng, Z. Lin & J. Xu
MAC design and verification based on PCIe 2.0 681
Z. Lang, T. Lu & Y. Zong
Miniaturization of microstrip open-loop resonator with fragment-type loading 687
T. Liu, L. Wang & G. Wang
Power electronic digital controller based on real-time operating system 691
L. Guo, S. Tao, L. Pei & W. Gao
Reactive power optimisation with small-signal stability constraints 695
J. Xu, X. Wang, K. Wang & C. Zha
Research and design of beacon laser drive system 701
D. Xiao, H. Li & H. Zhang
Research on a kind of intelligent garbage bin combined with solar street light 705
Y. Feng
Research on dual PWM converter for doubly fed motor generation system 709
J. Xu, L. Huang, L. Zhang, Y. Zhou, L. Yan & H. Li
Research on single event effect based on micro-nano SRAM semiconductor devices 713
S. Wang
Design of an industrial robot system based on PLC control 717
Y. Dai
xi
Logistics equipment support capability evaluation 753
G. Zhen
Optimisation and simulation of the production schedule for the missile general assembly process 757
X. Hu, Z. Zhang & Y. Li
Research on bridge construction methods of power outage maintenance in distribution networks 761
L. Xu, J. Niu, D. Zou, L. Tang, L. Liu, W. Li & Y. Fu
Research on logistics network site selection under imperfect information 765
L. Yang, X. Wang & J. Ye
Research on strategic development of smart logistics 771
Z. Fan & M. Ma
Virtual missile assembly system based customisation of plant simulation 775
L. Ma, Z. Zhang, X. Su & K. Guo
xii
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Preface
The organizing committee of AEMEE 2016 is proud to present the proceedings of the 2016 International
Conference on Automotive Engineering, Mechanical and Electrical Engineering (AEMEE 2016: http://
www.aemee.org/), held in Hong Kong, China during December 09–11, 2016.
AEMEE 2016 was a platform for presenting excellent results and new challenges facing the field of the
automotive engineering, mechanical and electrical engineering. It brought together experts from industry,
governments and academia, experienced in engineering, design and research.
AEMEE 2016 received 356 manuscripts, and 115 authors participated in this conference. By submit-
ting a paper to AEMEE 2016, the authors agreed to the review process and understood that papers would
undergo a peer-review process. Manuscripts were reviewed by appropriately qualified experts in the field
selected by the Conference Committee, who gave detailed comments and-if the submission was accepted-
the authors would submit a revised version that took into account this feedback. All papers were reviewed
using a double-blind review process: authors declared their names and affiliations in the manuscript for
the reviewers to see, but reviewers did not know each other’s identities, nor did the authors receive infor-
mation about who had reviewed their manuscript. The Committees of AEMEE 2016 invested great efforts
in reviewing the papers submitted to the conference and organizing the sessions to enable the participants
to gain maximum benefit.
Hopefully, all participants and other interested readers will benefit scientifically from the proceedings
and also find it stimulating in the process.
xiii
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Committees
CONFERENCE CHAIRS
TECHNICAL COMMITTEE
ORGANIZING COMMITTEE
xv
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Sponsors
xvii
Automotive engineering and rail transit engineering
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: In order to enable the automatic transmission shifting of the AMT vehicle to reflect the
changes of road conditions and vehicle conditions, and to meet the requirement of shifting smoothness
of the vehicle, we studied the fuzzy three-parameter shifting control of the AMT vehicle and put forward
that acceleration should be used to reflect the changes of road conditions. This paper will introduce the
principle of fuzzy three-parameter shifting control at first, and then it will show the design of fuzzy
three-parameter shifting controller. Finally, it will give the fuzzy three-parameter shifting simulation of
a certain model of AMT car produced by Changan Automobile. In addition, we will also compare it
with the fuzzy two-parameter shifting. The result shows that the fuzzy three-parameter shifting is fit with
drivers’ shifting experience and habits than the two-parameter shifting. And compared with solving the
shifting rules with traditional calculation method, it is more convenient and easier to be implemented with
stronger robustness.
3
Many domestic and foreign scholars have
studied the establishment of the shifting rules,
A.Bastian et al. studied the fuzzy shifting rules
of the AT vehicle (Huang Zongyi, 2006; Huifang
Kong, 2008; J Yi, 2007). Yi Jun et al. studied the
fuzzy shifting of the tracked vehicle. Li Pingkang
et al. studied the fuzzy shifting of the construc-
tion vehicle (Wang Lixin, 2003; Weibo Yu, 2016;
Yi Jun, 2006; Yi Jun, et al. 2008; Zhiyi Zhang,
2008). These studies had something in common,
that is, the transmissions, which was the subject
of these studies, all had a hydraulic torque con-
verter in them, and when establishing the shifting
rules, the rotating speed of the turbine and pump
of the hydraulic torque converter were added, so
that the hydraulic torque converter could serve
as a buffer. However, due to a power interrup- Figure 1. The principle of the fuzzy three-parameter
tion problem when shifting the gear of the AMT shifting control of the AMT vehicle.
vehicle, the vehicles were extremely sensitive to the
change of acceleration, so the way in which the AT
and construction vehicles shift gears fuzzily could fuzzy controller (the part in the double dotted
not be applied to the AMT vehicle directly. Hui- line frame). First quantify and then fuzzy process
fang Kong (Zhang Zhiyi, 2005) and B Mashadi the signals of the accelerator opening, the vehicle
(Zhang Yong, 2003) studied the fuzzy shifting of speed and acceleration, and then do fuzzy reason-
the AMT vehicle. Since what they adopted was ing combining with the fuzzy rule base to get the
the two-parameter shifting, they were unable to results, which can determine the transmission’s
fully consider the impact of external environ- gear through defuzzification and adjusting the
mental changes on the shifting of the vehicle. In scale factor, thus changing the transmission ratio
order to correctly reflect the impact of external of AMT transmission and satisfying the require-
environmental changes on shifting, in this paper ments of the vehicle for driving power and gear
I adopt the fuzzy three-parameter shifting (vehi- when running.
cle speed, accelerator opening, and acceleration).
To some extent, acceleration reflects the changes
of the driving environment, and after introduc- 3 THE DESIGN OF THE FUZZY
ing acceleration, the three-parameter shifting can CONTROLLER
make the impact in the process of shifting smaller,
thus improving riding comfort. First of all, this The design of the fuzzy controller includes the
paper describes the principle of the fuzzy shifting determination of the quantification factor and the
of the AMT vehicle, then studies the fuzzy shift- scale factor, the fuzzy strategy, the design of fuzzy
ing controller, and finally the fuzzy control system rule base, the establishment of fuzzy reasoning
is simulated. It turns out that the adoption of the mechanism, and defuzzification.
fuzzy three-parameter shifting is more fit for the When the vehicle is running, the accelerator
operation of skilled drivers than the adoption of opening reflects the driver’s intention, and the
the two-parameter shifting, because it makes shift- speed reflects the current running conditions of
ing process more comfortable and smoother, and the vehicle. And to a certain extent, acceleration
the vehicle has better fuel economy. reflects the changes of driving environment, while
upshifts and downshifts are the effective methods
to realize drivers’ intentions according to the vehi-
2 THE PRINCIPLE OF THE FUZZY cle’s conditions and the environment. Choose the
THREE-PARAMETER SHIFTING accelerator opening, the vehicle’s speed and accel-
CONTROL OF THE AMT VEHICLE eration as the input of the fuzzy controller and
gear as the output.
The principle of the fuzzy three-parameter shifting
control of the AMT vehicle is shown in Figure 1.
3.1 The fuzzification of controlled variables
In Figure 1, a is the opening of the engine’s
and qualification factor
accelerator, V is the vehicle’s driving speed, and
Ac is the vehicle’s acceleration. The core of fuzzy According to the driving experiences of excellent
three-parameter shifting control is the design of drivers and the specific parameters of vehicles in
4
actual testing, the fuzzy subsets of the three input
quantities of the fuzzy three-parameter shifting
controller respectively are: “Negative Big” (NB),
“Negative Medium” (NM), “Negative Small”
(NS), “Medium” (M), “Positive Small” (PS), “Pos-
itive Medium” (PM), “Positive Big” (PB), which
are seven fuzzy quantities in total. The accelerator
opening is taken as: “Very Small” (VS), “Small” (S),
“Medium” (M), “Big” (B), “Very Big” (VB), which
are five fuzzy quantities in total. And the accelera-
tion is taken as: “Very Small” (VB), “Small” (S),
“Medium” (M), “Big” (B), “Very Big” (VB), which
are five fuzzy quantities in total. The output gear
Dy is indicated by single point, and there are five
gears in total: I, II, III, IV, V.
When the total number of the elements in the
discourse domain is 2–3 times than the total num-
ber of fuzzy subsets, the degree of coverage of the
fuzzy subsets for the discourse domain is the best
(B Mashadi, 2007). Quantify the vehicle speed, the
accelerator opening and the acceleration, and then
their discourse domains are taken respectively as:
{0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15}
{0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10}
{0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10}
5
3.2 The establishment of the fuzzy control rules The compositional rule of inference adopts
Mamdani (max-min) compound operation:
According to the shifting experience of excellent
drivers, when establishing the fuzzy three-
parameter shifting rules, there are 175 fuzzy rules Dy′ = (V ′ a ′ × Ac ′ ) R (7)
in total according to the fuzzy subsets of the three
input quantities. The three-dimensional fuzzy rules O is the synthesis operator.
are shown in Figure 3, and each cube corresponds
to one fuzzy rule described below. 3.4 Defuzzification
IF V is NB and a is VS and Ac is VS, THEN
Dy is I; According to the features of this research subject,
IF V is NM and a is S and Ac is S, THEN Dy defuzzification adopts the maximum membership
is II; degree law:
IF V is M and a is M and Ac is B, THEN Dy
is III; Dy = sup{uV ′ a ′× Ac ′ } (8)
IF V is PB and a is VB and Ac is VB, THEN
Dy is V;
4 THE SIMULATION ANALYSIS OF THE
FUZZY THREE-PARAMETER SHIFTING
3.3 Fuzzy reasoning OF THE AMT VEHICLE
The fuzzy relation of the i fuzzy rule is:
After designing the fuzzy three-parameter shifting
controller, the controlling system is simulated by
Ri (vv a Ac D
Dy ) uVi (v, a, Ac, Dy
y) (5)
ai Aci Dy
D i using MATLAB/Simulink program.
The simulation uses a Changan Null car
The total fuzzy relation is: equipped with AMT transmission as the sub-
ject. The main parameters of the car are shown
175
R ∪ Ri in Table 1, and the simulation module diagram
(6)
i =1 is shown in Figure 4. The simulation results are
shown in Figures 5, 6.
In Figure 5, (a) is the fuzzy three-parameter
shift when the acceleration is 3 m/s2; (b) is the
fuzzy three-parameter shift when the accelera-
tion is 1.5 m/s2; (c) is the fuzzy three-parameter
shift when the acceleration is −1.5 m/s2; (d) is the
fuzzy three-parameter shift when the acceleration
is −3 m/s2. It can be seen from the figure that with
the same accelerator opening, the bigger the accel-
eration is, the lower the vehicle speed will be when
shifting the gear, while at the same acceleration,
the bigger the accelerator opening is, the higher the
vehicle speed will be when shifting the gear. And it
is totally the same with the gear-shifting behavior
of skilled drivers, which indicates that the adop-
tion of the fuzzy three-parameter shifting is suc-
cessful, because it is able to reflect the impact of
the changes of the external environment on gear-
shifting decisions completely.
Figure 6 is the fuzzy three-parameter shifting
when acceleration is taken as 0 m/s2. Arrow lines
1, 2, 3, 4, 5 refer to the five gears respectively. The
adoption of the fuzzy two-parameter shifting is
equal to the fuzzy three-parameter shifting when
acceleration is taken as 0 m/s2 (the four cases shown
in Figure 5 are unattainable). Therefore, it can be
seen that when adopting the fuzzy three-parameter
shifting, the impact of acceleration on the process
Figure 3. The three-dimensional fuzzy rule base of the of shifting is taken into account when shifting the
fuzzy three-parameter shifting. gear, making gear shifting be more fit with the
6
Table 1. The table of main parameters of a certain testing model of Changan car.
5 CONCLUSION
Figure 4. The simulation model of the fuzzy three-
parameter shifting of the AMT vehicle. As people’s requirements for the driving per-
formance and emission of the vehicle are getting
increased, in order to make the gear-shifting deci-
sion and shifting control of the AMT automatic
transmission vehicle be more fit with vehicles, the
environment, the drivers’ intentions, this paper
adopts the fuzzy three-parameter shifting method
to effectively solve the problem that the relation
between the conditions of the vehicle and the road
and the gear-shifting decision and control cannot
be reflected well, which, as a result, makes the shift-
ing process be more fit with people’s driving habits
and more adapt to the road conditions. In addi-
tion, it also avoids the complex calculation in the
traditional gear-shifting decision control, which is
easier and more convenient with better robustness
and adaptability. The fuzzy three-parameter shift-
ing has better controlling precision than the two-
parameter shifting, and the process of shifting is
smoother.
Figure 5. The simulation of the fuzzy three-parameter
shifting of the AMT vehicle.
REFERENCES
7
Sakaguchi, S., I. Sakai, T. Haga, Application of Fuzzy Yi Jun, Xu Zhongbao, Wang Xuelin etc, Adaptive Fuzzy
Logic to Shift Scheduling Method for Automatic Control of Shift Strategy of Off-road Vehicle [J],
Transmission [J], IEEE1993 0-7803-0614-7. Automotive Engineering, 2008 (Vol. 30), No. 1
Wang Lixin, Fuzzy System and Fuzzy Control Tutorial Zhang Yong, Liu Jie, Lu Xintian etc, Adaptive Fuzzy
[M], Beijing, Tsinghua University Press, June 2003. Shift Strategy of Construction Vehicles [J], Journal of
Weibo Yu, Nan Li, Dingxuan Zhao etc., Adaptive fuzzy Tongji University, Vol. 31, No. 1, Jan. 2003.
shift strategy in automatic transmission of construc- Zhang Zhiyi, Zhao Dinxuan, Chen Ning, Research on
tion Vehicles [J], IEEE2016 1-4244-0466-5. Fuzzy Automatic Transmission Strategy of Vehicles
Yi, J., X-L Wang, Y-J Hu etc, Modelling and simulation [J], Transactions of the Chinese Society for Agricul-
of a fuzzy controller of automatic transmission of a tural Machinery, Vol. 36, No. 10, Oct. 2005.
tracked vehicle in complicated driving conditions [J], Zhiyi Zhang, Dingxuan Zhao, BeiSun, Study on Fuzzy
JAUTO335 IMechE 2007. Automatic Transmission Strategy of Vehicles [J],
Yi Jun, Wang Xuelin, Hu Yujin etc, Fuzzy Control and IEEE2008 978-4244-1674-5.
Simulation on Automatic Transmission of Tracked
Vehicle in Complicated Driving Conditions [J].
IEEE2006 1-4244-0759-1.
8
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Yong Wei
SAIC GM Wuling Automobile Co. Ltd., Liuzhou, China
Zhuoyu Su
Hubei Province Key Laboratory of Modern Automotive Technology, Wuhan, China
School of Automotive Engineering, Wuhan University of Technology, Wuhan, China
Hubei Collaborative Innovation Centre for Automotive Components Technology, Wuhan, China
Changye Liu
SAIC GM Wuling Automobile Co. Ltd., Liuzhou, China
ABSTRACT: Taking a minivan system as the research object, a process of kinematic characteristics
analysis and optimisation design is presented. The simulation of parallel wheel travel of the suspen-
sion of the minicar is carried out and analysed. The characteristics curves of four front wheel alignment
parameters including toe angle, camber angle, caster angle, and kingpin inclination angle are drawn, the
unreasonable alignment parameters are drawn, and the non-ideal characteristics of the wheel alignment
parameters are established. The objective function is then to reduce the variation of the unreasonable
alignment parameters; the design variables are given by the sensitivity analysis, and the constraint condi-
tion is the change in the coordinate values of key hard points. By optimising wheel alignment parameters,
and the original and optimised simulation results, a better solution is obtained and the system perform-
ance of the suspension is improved.
9
To a certain extent, Macpherson suspen- springs and dampers. Secondly, rational is nec-
sion kinematics and dynamics characteristics essary for transferring force and torque between
were improved in previous studies. However, few frame and wheels. At the same time, the steer-
researchers have studied the analysis and design ing mechanism movement should be coordinated
process of the Macpherson suspension. In order with the movement of the guide mechanism to
to further research the analysis and design process, avoid movement interference. It is crucial to
improving the whole vehicle comfort and handling determine the rational suspension roll centre and
stability, taking a minivan suspension system as the longitudinal metacentre to improve anti-roll and
research object, the process of kinematic charac- longitudinal ability during steering. Lastly, high-
teristics analysis and optimisation design is given. strength and lightweight components and parts
The rest of the paper is organised as follows. The are essential.
design process of the suspension system, includ-
ing the general suspension design requirements,
2.1 Design object parameters
and the composition of the suspension design are
developed in Section 2. The kinematic model of Based on the market requirement and design
suspension is established in Section 3. To realise the objective, basic model and standard model
fundamental characteristics of the research object, needed to develop was choose. The suspension
the kinematics characteristics and wheel alignment parameters of the basic model and standard
parameters of a minivan suspension system are model were measured and collected in K&C tests.
analysed and confirmed in Section 4. To further Comparing with two kinds of parameters data,
improve the suspension system performance, the the design object parameters of the suspension
optimisation design of the suspension system kin- were defined.
ematics characteristics is developed in Section 5,
which is followed by the concluding remarks in
2.2 Suspension system hard points
Section 6.
The structural features of the Macpherson suspen-
sion include simple structure, small volume, and
2 DESIGN PROCESS OF THE SUSPENSION less frame stress point. According to the basic vehi-
SYSTEM cle suspension hard points data and body structure,
the hard points of the front suspension are roughly
Figure 1 presents the design process of a mini- determined. The kinematics simulation model is
van’s suspension system in this study. Consider- established using ADAMS, the simulation results
ing the suspension system plays a decisive role in are compared with the object parameters, and
the vehicle handing stability and comfort, there then the data of the hard points are adjusted so
are five design requirements during the research that the simulation results coincide with the object
(Ding, 2010). Firstly, reasonable elastic proper- parameters.
ties of springs and damper damping character-
istics are important to avoid impact between
2.3 Components design and checking
According to the change in suspension hard points,
the structure and size of the base model parts are
improved accordingly. Considering the material,
processing technology and connections of the
parts, but also using a simulation model, the stiff-
ness of the bushings is adjusted and determined,
and the parts are optimised by finite element anal-
ysis. For the coil spring, according to the suspen-
sion stiffness and suspension structure to calculate
the stiffness, and to determine the parameters of
the spring. For the damper, the shape of the struc-
ture and the damping curve is determined, and the
appropriate damper is selected to meet the design
requirements.
10
reestablished, and the complete K&C characteris- Table 1. The initial key point coordinate of the left
tic simulation analysis is carried out. The design Macpherson suspension components (mm).
target is adjusted and the optimisation design is
carried out. The design of the suspension system is Number Hard points x y z
completed by the test. P1 Top damper −697.34 −535.60 421.27
mounting point
P2 Under spring −713.72 −562.38 151.39
mounting point
3 KINEMATIC MODELLING P3 Steering tie rod −849.36 −605.78 −114.13
outside point
Figure 2(a) shows the Macpherson suspension P4 Steering tie rod −848.00 −330.05 −57.90
structure. Based on the theory of vehicle dynam- inside point
ics, the suspension is reasonably simplified and P5 Under damper −727.01 −584.11 −68.71
assumed. In addition to elastic components and mounting point
rubber components, the other parts are considered P6 Lower control arm −759.77 −288.18 −142.18
rigid, regardless of its deformation. All connec- inside front point
tions between components are simplified as ball P7 Lower control arm −422.00 −289.80 −133.96
joints, sleeve connections, etc., excluding internal inside rear point
clearance. The frictional forces within the motion P8 Lower control arm −745.10 −634.24 −214.86
pairs between the components are negligible outside point
(Huang et al., 2010). P9 Steering knuckle −730.40 −644.24 −138.29
center point
Figure 2(b) shows a minivan’s Macpherson sus-
P10 Wheel centre point −725.03 −692.62 −138.29
pension CAD model. The relative position of the
component parts is determined, the coordinate,
quality, inertia and geometric characteristics of
the component parts are obtained, finding out all
kinds of constraints and connection point, the ref-
erence point coordinate information. The detailed
parameter information for the simulation model
establishment is provided.
Some key parameters of the Macpherson sus-
pension are listed in Table 1. Figure 3 shows a
multi-rigid-body dynamic model of Macpherson Figure 3. A multi-rigid-body dynamic model of
front suspension assembly in ADAMS/CAR. Macpherson front suspension.
The wheel travel is generated by two-wheel co-
oscillating excitation.
In this study, the technical roadmap of
Macpherson suspension system kinematics analy-
sis and optimisation is shown in Figure 4.
4 SUSPENSION KINEMATIC
CHARACTERISTIC SIMULATION
ANALYSIS
11
Table 2 Comparison of the parameters on the front
suspension.
12
In the process of optimisation, the conflicting
1 N
objectives cannot achieve most optimisation values
at the same time.
min ∑ (Ti
N i =1
T )2 i , 2, ,N (1)
Figure 7. (a) Toe angle curves; (b) Camber angle curves; (c) Caster angle curves; (d) Kingpin inclination.
13
Table 4. Comparison of wheel alignment parameters optimisation.
In Figure 7 and Table 4, it can be seen that wheel sity (IRT13087), Research Project of State Key
toe angle, camber angle and kingpin inclination Laboratory of Mechanical System and Vibration
change less when the wheel moves. Consequently, (MSV201608) and the Foundation Research Funds
the kinematics characteristics of the Macpherson for the Central Universities (WHUT: 2016IVA037)
suspension are improved, tyre wear is reduced and is also greatly appreciated.
the stability of the car is improved.
REFERENCES
6 CONCLUSION
Automotive Engineering Manual Editorial Board. (2001).
In this paper, by analysing kinematics characteris- Automotive engineering manual. Beijing: China Com-
tics and optimising the design of the Macpherson munications Press.
suspension, the following conclusions are made: Chen, J.R. (2012). Automobile structure. Beijing: China
Communications Press.
a. Obtaining the change rule of Macpherson Chen, J. (2008). MSC.ADAMS technology and engineer-
suspension wheel alignment parameters with ing analysis example. Beijing: China Water & Power
different wheel vibrating and determining the Press.
reasonable alignment parameters. Ding, L. (2010). Design of suspension and process analy-
sis for automobile. Society of Automotive Engineers of
b. By simulation, the position of the lower con- China, SAE-China Congress Proceedings, 1466–1471.
trol arm outside endpoint has a great effect on Beijing: China Machine Press.
cam-ber angle and kingpin caster angle and the Huang, D.M., Wang, L.M., Jing, G.H., & Yin, C.H.
positions of the steering tie rod internal end- (2010). Simulative analysis of front suspension of a
point strongly influence the wheel toe angle. light duty truck based on ADAMS/CAR. Automobile
c. The result shows that the kinematics charac- Technology, (9), 28–32.
teristics of the optimised Macpherson suspen- Jamali, A., Shams, H., & Fasihozaman, M. (2014). Pareto
sion are improved significantly. In particular, multi-objective optimum design of vehicle-suspension
the range of wheel toe angle and kingpin caster system under random road excitations. Proceedings of
the Institution of Mechanical Engineers Part K-Journal
angle is more reasonable. of Multi-body Dynamics, 228(3), 282–293.
To conclude, the proposed optimisation design Ren, K., Wang, J.J., & Wu, D.H. (2010). The simulation
is useful in the process of kinematic modelling and optimization of Macpherson front suspension of
and simulation. It offers an effective optimisa- a certain minibus based on ADMAS/CAR. Machin-
ery Design and Manufacture, (3), 36–38.
tion approach that can shorten the design period. Sagi, G., Lulic, Z., & Ilincic, P. (2015). Multi-objective
Although the research object in this paper is the optimisation model in the vehicle suspension sys-
Macpherson suspension, the concept and method tem development process. Tehnicki Vjesnik-technical
of the proposed approach can be instructive for Gazette, 22(4), 1021–1028.
other suspensions. Sun, Z. (2014). Dynamic modeling, verification and opti-
mization of full vehicle based on suspension system
performance. Changsha: Hunan University.
ACKNOWLEDGEMENTS Wang, B., Guan, H., & Lu, P. (2015). Novel evaluation
method of vehicle suspension performance based
on concept of wheel turn center. Chinese Journal of
This work was supported by the National Sci- Mechanical Engineering, 28(5), 935–944.
ence Foundation for China (Grant No. 51605353) Zhang, Y.C., Dai, J., Hou, Y., & Wu, Z.D. (2013).
and the Joint Funds of the National Science Optimization of Suspension Hard Points Based on
Foundation of China (U1564202). The support ADAMS. CAD/CAM YU ZHISAOYE XINXIHUA,
from the Innovative Research Team in Univer- (12), 86–8.
14
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
15
2 DEVELOPMENT OF THE EV the battery charging and discharging efficiency is
POWERTRAIN MODEL greatly influenced by the temperature and SOC
level of the battery since the internal resistance and
Many simulation models are developed for the the open circuit voltage of the battery depend on
design and development of electric vehicles (Chew those parameters. In this paper, it is assumed to be
et al., 2014; Goncalves et al., 2009; Maia et al., 2011; constant. Although the battery aging effects and
McDonald, 2012; Park et al., 2014; Yang et al., 2012). the temperature effects are neglected in the battery
Depending on the research focus, how detailed each model, it does not influence the scope of our work.
component is modelled differs greatly. For example,
the user may need a more precise model for the bat-
2.2 Electric motor model
tery system to investigate the battery degradation
(Hulsebusch et al., 2011; Serrao et al., 2005; Yagues- The most common type of electric motor in current
goma et al., 2013). Different methods can be applied electric vehicles is the Permanent Magnet Synchro-
for the powertrain modelling such as the physics- nous Machine (PMSM). Besides, the Separately
based resistive companion form technique and the Excited Synchronous Machine (SESM) and the
bond graph method (Mi et al., 2007). In this paper, Asynchronous Machine (ASM) can also be seen
a physics-based mathematical model is built up. It in some electric vehicles. PMSM is significantly
consists of the following sub-models. more efficient than SESM and ASM at low speed
(Braun, 2012). Because the electric vehicle is cur-
2.1 Battery model rently mainly designed for low-speed urban driv-
A lithium-ion battery system is applied in the simu- ing, the lightweight and compact PMSM with high
lation model. Its energy capacity is assumed to be efficiency is preferred by vehicle manufacturers.
22 kWh, which is similar to the battery capacity of A permanent magnet synchronous machine
most of the current electric vehicles. Many battery with peak torque 210 Nm, peak power 60 kW, and
models focus on studies of battery behaviour and peak speed 10,500 rpm is applied in the simulation
electrical efficiency. These models are detailed as built model. The efficiency map of this PMSM is shown
up electrochemically (Ceraolo, 2000), mathematically in Figure 1, whose data were provided by our sup-
(Salameh et al., 1992), or electrically (Chen & Rincon- plier. It shows that the electric motor works in a
mora, 2006). They provide a high level of accuracy higher efficiency area when the torque is between
due to a low abstraction level and many input param- 20 Nm and 120 Nm and the speed between 1,500
eters (Schellenberg et al., 2014). Hu established a rpm and 4,500 rpm. At other operating points the
battery model with a moderate complexity to charac- efficiency is low. Especially at the operating points
terise the voltage behaviour of a lithium-ion battery of low torque and low speed (dark area on the left
for electric vehicles (Hu et al., 2011). However, such side of Figure 1), the motor efficiency is very low
a detailed model is time consuming and not neces- and its values are not shown in Figure 1. The elec-
sary in the forward driving simulation. Here, in order tric model calculates the output torque according
to simplify the model and speed up the computation, to the accelerator pedal position from the driver
we calculate the battery State of Charge (SOC) value model. The torque-to-speed characteristic curve
depending on the vehicle power requirement in each at different pedal positions is acquired through
time step. It is expressed by interpolation between the full-load curve and the
thrust characteristic curve. The efficiency of each
PVeh ( i ) ( i i 1 ) operating point in Figure 1 is considered when cal-
SOC ( i ) SOC
SOC(( )− culating the motor output torque.
QBat ⋅ (ηBat ⋅ ηIInv ⋅ ηMot
M ⋅ ηTr
i 1 ω
T a)
(1)
where SOC (ti) = the state of charge in time step
ti; PVeh(ti) = the vehicle power requirement in time
step ti; QBat = the battery capacity; ηBat = the battery
efficiency; ηInv = the inverter efficiency; ηMot = the
motor efficiency; ηTra = the mechanical efficiency
of the transmission and ω indicates the direction
of power flow. When the energy is recovered from
vehicle braking or coasting, ω is equal to −1. When
the electric motor outputs power to the vehicle, it is
equal to 1. In this way, the SOC value of the battery
system and the energy consumption in a specific Figure 1. Efficiency map of the electric motor applied
driving cycle can be calculated quickly. Actually, in the simulation model.
16
2.3 Power loss of ancillary devices maximum electric motor speed. In addition, the
smallest ratio should also consider the overdrive
For the electric vehicle, the power loss of ancillary
ratio, which is calculated according to the motor
devices also has a big influence on its maximum driv-
speed requirement at the vehicle cruising speed.
ing distance. The average power loss of ancillary devices
differs with different driving cycles. At the beginning of
the driving cycle, a higher power is usually required for ⎛ nmax ncruising ⎞
imiin = min ⎜ , ⎟ (4)
the ancillary devices such as air conditioning or heating. ⎝ vmax / 2π rdyn vcruising //22π rdyn ⎠
In order to determine the maximum driving distance of
the electric vehicle, the Chair of Mechatronics at Uni- where vmax = the maximum vehicle speed,
versity of Duisburg-Essen investigated the influence of (m/s); nmax = the maximum motor speed, (rpm);
ancillary power loss based on different driving cycles vcruising = the vehicle cruising speed, (m/s); ncruis-
(Proff et al., 2012). It was found that the ancillary power
ing = the motor speed at the vehicle cruising speed,
loss is higher in winter than in summer in Germany (rpm); and rdyn = the tyre radius, (m). Table 1 shows
because of the temperature requirement for heating. In the vehicle parameters and some requirements for
this paper, the simulation results from the study by Proff this electric vehicle.
et al. (2012) are applied as the nominal values for the Here the vehicle cruising speed is defined as
calculation of the ancillary power loss. It is expressed by 100 km/h. The motor speed requirement at this
vehicle speed is 3,200 rpm, which is in the opti-
Pauxiliary ( i ) max[
a [ Pmin auxiliary , Pauxiliary (t 0 )
min_ mum efficiency range according to Figure 1. The
− kP r ⋅ ( i − 0 )]
Pauxiliary (2) calculated transmission ratio is then limited in the
range of 3.426 to 8.826. In the simulation model,
where Pancillary(ti) = the average ancillary power loss the number of the transmission speed is firstly
in time step ti; Pmin_ancillary = the minimum ancillary defined before each driving simulation. When the
power loss in the driving cycle, which is a basic speed number is more than two, the intermediate
electric power demand for lighting and other gear ratio is calculated based on the geometrical
electric devices; Pancillary(t0) = the initial ancillary gear steps. In this paper, the maximum speed num-
power loss at the beginning of the driving cycle; ber is limited to four, as shown in Table 2.
and kPancillary = the gradient of the ancillary power
loss decrease. The ancillary power loss consumes 2.5 Driving resistance model
the battery energy and reduces the maximum driv-
ing distance. This equation assumes that it reaches The total driving resistances of the vehicle consist of
its maximum level at the beginning of the driving the rolling resistance, the air resistance, the accelera-
cycle due to heating or air conditioning. Then it tion resistance and the gradient resistance. In the for-
will decrease gradually as the driving time extends ward driving simulation, these resistances act on the
until it reaches the minimum value.
A mini-class electric vehicle is used in the simula- Vehicle Value Vehicle Value
tion model. According to the vehicle data, the speed
ratio range of the transmission is predefined. Firstly, Class Mini class Max. climbing ability 55%
the largest ratio is determined with respect to the Weight 1,250 kg Max. speed 135 km/h
requirement of the vehicle climbing ability based on requirement
Wheel 0.284 m Cruising speed 100 km/h
radius
rdyn mF ⋅ g ⋅ ( f cos + sin
i )
imax =
St
St St
(3) Vehicle 2.07 m2 Motor speed at 3,200 rpm
Tmax ⋅ η cross- vehicle cruising
section speed
where rdyn = the tyre radius, (m); mF = the vehicle
mass, (kg); fR = the rolling resistance coefficient;
αSt = the gradient angle; Tmax = the maximum Table 2. Transmission speed ratio.
motor torque, (N ⋅ m); and η = the powertrain
efficiency. In the simulation model, the transmis- Transmission Speed ratio
sion efficiency is a function of torque and speed. Single-spped i1: 8.826
It is variable at different operating points and is 2-speed i1: 8.826, i2: 3.426
improved as the load increases. 3-speed i1: 8.826, i2: 5.499, i3: 3.426
Secondly, the smallest ratio should satisfy 4-speed i1: 8.826, i2: 6.438, i3: 4.700, i4: 3.426
the maximum vehicle speed requirement at the
17
rolling wheels and must be balanced by the driving Different driving cycles can be selected in the
torque. The output load is calculated according to forward driving simulation, e.g. the New European
Driving Cycle (NEDC), which is supposed to repre-
1 sent the typical usage of a passenger car in Europe.
TL fR ⋅ mF g ⋅ (α St ) + ⋅ ρL ⋅ cW AF ⋅ vF 2 In this paper, a Worldwide Harmonised Light-Duty
2
+ mF ⋅ g ⋅ i (α St
St ) + λ F ⋅ mF aF ] ⋅ rddyn (5) Test-Cycle (WLTC) is applied in the simulation.
The WLTC represents real driving scenarios more
where ρL = the air density; cW = the drag coeffi- accurately than the NEDC. The load transients of
cient; AF = the vehicle cross-section; vF = the vehicle the WLTC are more frequent. It will replace the
speed; λF = the rotational inertia coefficient; and NEDC from 2017. The WLTC is divided into three
aF = the vehicle acceleration. classes according to the vehicle power-weight ratio:
Class 1: low-power vehicles with power-weight
ratio smaller than 22 W/kg
2.6 Driver model Class 2: medium-power vehicles with power-
A driver model is included to calculate the accel- weight ratio between 22 W/kg and 34 W/kg
erator pedal position and the brake pedal position Class 3: high-power vehicles with power-weight
according to the speed profile of the reference driv- ratio higher than 34 W/kg
ing cycle. The driver model controls the pedal posi- In the driving cycle of each class, there are sev-
tion through a PID controller to make the actual eral parts designed to represent real-world vehicle
vehicle speed in the simulation follow the speed operation on urban and extra-urban roads, motor-
profile of the reference cycle closely. The change ways and highways (Wikipedia, 2015). According
rate of the pedal position is expressed by to the motor power and the vehicle mass described
in the previous section, the driving cycle of class
ΔxP (ti ) K P Δv(ti ) + K I Δs(ti ) K D Δa(ti ) (6) 3 is applied in the simulation. Its speed profile
is shown in Figure 2. More cycle information is
where ΔxP(ti) = the change rate of the pedal posi- shown in Table 3.
tion in time step ti; Δv(ti) = the difference between
the actual vehicle speed and the reference vehicle
speed in time step ti; Δs(ti) = the difference between
the actual driving distance and the reference driv-
ing distance in time step ti; Δa(ti) = the difference
between the actual vehicle acceleration and the ref-
erence vehicle acceleration in time step ti; KP = the
proportional gain of the PID controller; KI =
the integral gain of the PID controller; and KD = the
derivative gain of the PID controller. Then the pedal
position is calculated through iteration in
18
3 EFFICIENCY-OPTIMISED GEAR An inverse tangent function, which is expressed
SHIFT STRATEGY by Equation (8), is used in the simulation model to
fit the upshift line according to
An efficiency-optimised gear shift strategy is devel-
oped in the simulation model. The basic idea of ⎡⎛ T ⎞ 3 ⎤ 2
the shift strategy is to keep the operating points of n1 2 (T ) = A ⋅ arctan ⎢ ⎥⋅ +C (8)
the electric motor in its optimum efficiency range ⎣⎝ B ⎠ ⎦ π
through gear shifting. The efficiency map of the
electric motor can be converted to the transmis- where n1−2(T) = the upshift speed for a specific driv-
sion output side through the gear ratio. Then the ing torque; and A, B, C are the function coefficients
motor efficiency can be depicted depending on the for the fitted upshift line. In the forward driving sim-
wheel speed and the wheel torque. We can choose ulation, the vehicle will shift into a higher gear based
the most suitable gear for motor efficiency for a on this upshift line. Figure 5 shows the fitted upshift
specific operating point of the vehicle. For exam- line for the two-speed transmission in Table 2. For
ple, as shown in Figure 3, the motor efficiency is the three-speed and the four-speed transmission in
obviously higher in second gear than in first gear Table 2, their upshift lines are shown in Figure 6.
at the vehicle operating point (1,000 rpm, 300 Nm) In order to avoid frequent shift, the speed of
when the two-speed transmission in Table 2 is used. the downshift line is defined to be lower than the
Therefore, in order to develop the efficiency-opti- speed of the upshift line in the shift map. Besides,
mised gear shift strategy, we must find the most the efficiency-optimised gear shift strategy sets a
suitable gear for each vehicle operating point by minimum time interval between two shifts in the
comparing the motor efficiency in different gears. driving simulation. Based on the developed shift
Figure 4 shows the suitable gear of each vehi- strategy, Figure 7 shows how the area of the opti-
cle operating point for the two-speed transmis- mum motor efficiency expands in the characteris-
sion in Table 2. There is an obvious boundary tic map of wheel torque versus wheel speed with
line between first gear and second gear. In the left the help of the four transmissions in Table 2.
region of the boundary, first gear can provide the The maximum vehicle speed of 135 km/h
vehicle with a high driving torque and is more effi- approximately corresponds to the wheel rota-
cient for the electric motor. In the right area of the tional speed of 1,260 rpm. In this speed range, it
boundary, second gear is more suitable for a high can be seen that the efficient operating range of
vehicle speed because the electric motor operates the electric motor expands with the help of the
more efficiently. multi-speed transmission and the developed effi-
Figure 4. Suitable gear of each vehicle operating point Figure 6. Upshift line of the three-speed and four-speed
for the two-speed transmission. transmission in Table 2.
19
This torque is transmitted through transmission
to tyres to overcome the driving resistance and
the braking torque. Shift automatically takes place
according to the developed shift strategy. The actu-
ating energy for the gear shifting is also considered
in the simulation model. We assume that the shift-
ing element is the wet multi-plate clutch which is
electro-hydraulically actuated. It needs hydraulic
pressure from the oil pump. Therefore, the energy
consumption of the oil pump is calculated in the
driving simulation. Besides, the friction loss in
each shifting process is also considered. By com-
paring the total energy consumption with different
transmissions in Table 2, we can know how many
transmission speeds is the best choice for current
electric vehicles.
Figure 7. Motor efficiency in the characteristic map of Figure 8 shows the simulation results of the
wheel torque versus wheel speed. motor operating points with different transmis-
sions. The operating points in the negative torque
area mean that the electric motor works as a
ciency-optimised gear shift strategy. The efficient generator for energy regeneration. It can be seen
range is narrow with single-speed transmission. from graph (a) that most of the operating points
It is suitable for the vehicle in urban traffic at low are in the area below 100 Nm and 5,000 rpm
driving speed. However, the motor efficiency is low when equipped with the single-speed transmis-
when the electric vehicle runs on the highway at sion. However, the motor does not make full use
high driving speed. When the vehicle is equipped of its efficient range. A large area around 100 Nm
with the two-speed transmission in Table 2, the with high efficiency is not covered by any operat-
second gear improves the motor efficiency at high ing point, and some operating points appear in the
driving speed. As shown in graph (b), the red effi- motor high speed area with low efficiency. They
cient range obviously expands towards the high correspond to the high vehicle speed in the WLTC
wheel speed area. When the transmission speed driving cycle. Therefore, the transmission with only
number increases to three or four, the cover area single-speed is not efficient for the electric vehicle.
of the red efficient range expands correspondingly When the transmission speed number increases,
under the control of the developed shift strategy. the developed shift strategy allows more operating
The total efficiency is further improved. points of the electric motor to fall in its efficient
However, it is observed that the red efficient range. As shown in graphs (b), (c) and (d), no oper-
range mainly expands towards the small wheel ating point appears over 5,000 rpm. It is clear that
torque and high wheel speed area. This is because the multi-speed transmission will reduce the energy
the ratio of a higher speed becomes smaller. The consumption. However, the difference between the
red efficient range thus cannot expand towards the
high wheel torque and low wheel speed area, and
the efficiency of the electric motor is normally low
at the operating point of its maximum torque. In
addition, the efficiency on the traction hyperbola
curve where the electric motor reaches its peak
power cannot be improved by the multi-speed
transmission and the efficiency-optimised gear
shift strategy.
20
two-speed, three-speed, and four-speed transmis-
sion is very small according to Figure 8.
Table 4 compares the simulation results with
the four different transmissions in Table 4. It can
be seen that energy consumption is greatest with
the single-speed transmission. The average motor
efficiency for the whole driving cycle is also the
lowest. The energy consumption is greatly reduced
when the transmission speed number increases to Figure 9. Simulation results of the energy consumption
two. About 3% battery SOC is saved in the WLTC and the average motor efficiency.
driving cycle through one more gear ratio and the
efficiency-optimised shift strategy. That means the
maximum driving distance can increase by about structure will become very complex with increas-
30 km for the electric vehicle with 22 kWh battery ing weight, space, and development cost. The
capacity. It has a big advantage compared with the weight and cost of a two-speed transmission will
single-speed transmission. However, continuing to not increase very much compared with a single-
increase the transmission speeds will not reduce speed transmission. Only an additional shifting
the energy consumption significantly. A two-speed element and a planetary gear set (or two transfer
transmission is thus the best choice for the mini- gear sets) are necessary, but it could help to reduce
sized vehicle with respect to a trade-off between the size and cost of the electric motor. Therefore, a
the energy conservation and the increased cost for two-speed transmission is the best choice for cur-
the development of multi-speed transmission. rent electric vehicles to save battery energy and to
This paper also investigates the small class vehi- extend their driving distances.
cle and the compact class vehicle. The vehicle mass
increases and certain vehicle parameters change 5 CONCLUSION
in these two class vehicles. The gear ratio is also
predefined differently depending on the vehicle 1. In this paper, the effect of increasing transmis-
parameters. The energy consumption and the aver- sion speed number on the energy conservation
age motor efficiency in the WLTC driving cycle are of electric vehicles was investigated.
shown in Figure 9. 2. A powertrain model of electric vehicle is devel-
It is known from Figure 9 that the two-speed oped for the forward driving simulation. The
transmission can significantly reduce the energy model takes into account the battery system,
consumption of all three class electric vehicles. the electric motor, the multi-speed transmis-
However, the improvement is small when the speed sion, the ancillary power loss, the driving
number is more than two, and the transmission resistance, the driver actuation, and the energy
regeneration.
3. An efficiency-optimised gear shift strategy
Table 4. Simulation results with different transmission.
is developed to control the shift in the driv-
Single- ing simulation. Simulation results show that
Transmission speed 2-speed 3-speed 4-speed a two-speed transmission can greatly reduce
the energy consumption of electric vehicles by
Energy 3.631 3.04 3.008 3.012 keeping the electric motor working in its high
consumption efficiency range. Compared with the two-speed
[kWh] transmission, the further improvement of more
SOC 16.5% 13.8% 13.7% 13.7% speeds is small, but the transmission struc-
consumption ture will become very complex with increasing
Average motor 0.695 0.773 0.774 0.775 weight, space, and development cost.
efficiency
4. It can be concluded that a two-speed transmis-
Max. driving 143 171 173 173
distance [km]
sion is the best choice for current electric vehi-
Percentage of 100% 42.82% 16.49% 1.69%
cles with respect to energy conservation and
Gear 1 driving distance extension.
Percentage of / 57.18% 46.14% 21.25%
Gear 2
Percentage of / / 37.37% 43.12% REFERENCES
Gear 3
Percentage of / / / 33.94% Braun, L. (2012). Fahrer- und fahrsituation sabhängige
Gear 4 Bewertung unterschiedlicher Elektromotorkonzepte.
Karlsruhe, Germany: Karlsruhe Institute of Technology.
21
Ceraolo, M. (2000). New dynamical models of lead-acid Qin, D-T., Zhou, B-H., Hu, M-H., Hu, J-J., & Wang, X.
batteries. IEEE Transactions on Power Systems, 15(4), (2011). Parameters design of powertrain system of
1184–1190. electric vehicle with two-speed gearbox. Journal of
Chen, M., & Rinconmora, G. (2006). Accurate electrical Chongqing University, 34(1), 1–6.
battery model capable of predicting runtime and Ren, Q., Crolla, D.A., & Morris, A. (2009). Effect
I-V performance. IEEE Transactions on Energy of transmission design on electric vehicle (EV)
Conversion, 21(2), 504–511. performance. Proceedings of the Vehicle Power and
Chew, K.W., Koay, C.K., & Yong, Y.R. Advisor. (2014). Propulsion Conference, Dearborn, USA, 1260–1265.
Simulation of electric vehicle performance on various Salameh, Z., Casacca, M., & Lynch, W.A. (1992). A
driving cycles. International Journal of Innovative mathematical model for lead-acid batteries. IEEE
Science, Engineering & Technology, 1(8), 70–76. Transactions on Energy Conversion, 7(1), 93–98.
Goncalves, G.A., Bravo, J.T., Baptista, P.C., Silva, C.M., Schellenberg, S., Berndt, R., Eckhoff, D., & German,
& Farias, T.L. (2009). Monitoring and simulation R.A. (2014). Computationally inexpensive battery
of fuel cell electric vehicles. World Electric Vehicle model for the microscopic simulation of elec-
Journal, 3, 1–8. tric vehicles. Proceedings of IEEE 80th Vehicular
Hofman, T., & Dai, C.H. (2010). Energy efficiency analysis Technology Conference, Vancouver, BC, 1–6.
and comparison of transmission technologies for an elec- Serrao, L., Chehab, Z., Guezennee, Y., & Rizzoni, G.
tric vehicle. Proceedings of the 2010 IEEE Vehicle Power (2005). An aging model of Ni-MH Batteries for
and Propulsion Conference (VPPC), Lille, France. hybrid electric vehicles. Proceedings of Vehicle Power
Holdstock, T., Sorniotti, A., Everitt, M., Fracchia, M., and Propulsion Conference, 78–85.
Bologna, S., & Bertolotto, S. (2012). Energy con- Sorniotti, A., Holdstock, T., & Pilone, G.L. et al.
sumption analysis of a novel four-speed dual motor (2012). Analysis and simulation of the gearshift
drivetrain for electric vehicles. Proceedings of the 2012 methodology for a novel two-speed transmission
IEEE Vehicle Power and Propulsion Conference, VPPC system for electric powertrains with a central motor.
(6422721), 295–300. Proceedings of the Institution of Mechanical Engi-
Hu, X-S., Sun, F-C., & Zou, Y. (2011). Online model iden- neers, Part D: Journal of Automobile Engineering,
tification of lithium-ion battery for electric vehicles. 916–929.
Journal of Central South University, 18(5), 1525–1531. Walker, P.D., Abdul, R.S., Zhu, B., & Zhang, N. (2013).
Hulsebusch, D., Schwunk, S., Caron, S., & Propfe, B. Modelling, simulations, and optimization of electric
(2011). Modeling and simulation of electric vehicles— vehicles for analysis of transmission ratio selection.
the effect of different Li-ion battery technologies. Advances in Mechanical Engineering, 323917.
Journal of Automotive Safety and Energy, 2(2), 59–67. Wang, X-J., Cai, Y-C., Zhou, Y-S., & Gao, S. (2014).
Maia, R., Silva, M., Araujo, R., & Nunes, U. (2011). A study on the effects of the matching of automatic
Electric vehicle simulator for energy consumption transmission on the energy consumption of electric
studies in electric mobility systems. Proceedings vehicle. Automotive Engineering, 36(7), 871–878.
of IEEE Forum on Integrated and Sustainable Wikipedia. (2015). Worldwide harmonized light vehicles
Transportation Systems, 227–232. test procedures. Accessed: 15–01–15. Available at:
McDonald, D. (2012). Electric vehicle drive simulation http://en.wikipedia.org/wiki/Worldwide_harmo-
with MATLAB/Simulink. Proceedings of the 2012 nized_Light_vehicles_Test_Procedures/.
North-Central Section Conference, American Society Wu, G., Zhang X., & Dong Z-M. (2013). Impacts of
for Engineering Education, 125–149. two-speed gearbox on electric vehicle’s fuel economy
Mi, C., Abulmasrur, M., & Gao, W. (2007). Modeling and and performance. Proceedings of the SAE 2013 World
simulation of electric and hybrid vehicles. Proceedings Congress and Exhibition, Detroit, MI, United States.
of the IEEE, 729–745. SAE Technical Paper, 2013-01-0349.
Nakagawa, M., Schwarz, U., Özbek, M., Pfluger, J., & Yaguesgoma, M., Olivellarosell, P., Villafafilarobles, R., &
Andert, J. (2013). Global direction of powertrain Sumper, A. (2013). Ageing of electric vehicle bat-
electrification. Proceedings of the 12th CTI tery considering mobility needs for urban areas.
Symposium, Automatic Transmissions, HEV and EV Proceedings of International Conference on Renewable
Drives, Berlin, Germany, 25–34. Energies and Power Quality.
Park, C.H., Kwon, M.H., Jeong, N.T., Lee, S.G., Suh, Yang, S-B., Li Z-Z., Xu, F., Zhang, G-G., Deng, Y-F., &
M.W., Kim, H.S., & Hwang, S.H. (2014). Development Wang, J. (2012). An electric vehicle powertrain simu-
of electric vehicle simulator for performance analysis. lation and test of driving cycle based on AC electric
Universal Journal of Mechanical Engineering, 2(7), dynamometer test bench. Proceedings of 2012 Inter-
231–239. national Conference on Mechanical Engineering and
Proff, H., Schonharting, J., Schramm, D., & Ziegler, J. Material Science, 273–276.
(2012). Zukünftige Entwicklungen in der Mobilität (1st
ed.), 91-104. Wiesbaden, Germany: Springer Gabler.
22
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Guorui Shang
R&D Center of Shandong Pengxiang Automobile Co. Ltd., Yantai, P.R. China
ABSTRACT: The force formula of the thrust rod was deduced for the suspension of mining trucks
driven on a ramp. By Finite Element Analysis (FEA), we found that the insufficient stress factor was the
main cause of breaking and buckling was the main cause of the bending failure. The FEA results
were consistent with the actual failure modes. The main reasons for the thrust rod failures were found and
the optimal designs were conducted within a defined range. After optimal FEA, the optimal results met
with the requirements of the safety factor and the reliability of the thrust rod structure design.
23
On the uphill, the relationship between Fμ and
G is:
Fμ μG α (5)
Figure 2. Meshing of the upper thrust rod.
From the Equations (3), (4) and (5), we obtained:
( μ cos
c α + sin )GL
L3 + Fx L2
F1 = (6)
L1
Fx ( L2 + L1 ) G ( μ cos
c α + sin )( L1 L3 )
F2 = (7)
L1
24
Table 1. Input parameters range.
Min. Max.
value value
Input parameters mm mm
25
the uphill journeys, according to an analysis of
the mining working environment. The stress fac-
tor and load multiplier of the thrust rod head
was insufficient, according to static FEA and
linear bulking analysis. The FEA results were
confirmed in the failure mode. After using the
optimisation function of ANSYS Workbench,
the most important parameters were found.
These could reduce the workload of the design
and, at the same time, avoid the failure problem.
REFERENCES
26
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Xiaoxu Zhang
Chongqing College of Electronic Engineering, Chongqing, China
ABSTRACT: On the basis of the simulation theory of the crashworthy vehicle, this paper takes the
Chongqing straddled-type monorail vehicle as the major object and uses the application of the non-
linear finite element technique. First establish the CAD structure and import the corresponding CAE
software, according to the requirements of the inspection of the grid units, to analyse and research the
optimisation unit. Finally complete the straddled-type monorail vehicle body finite element model.
Determine the initial speed of vehicle collision by the body and human body impact evaluation criteria
and show the deformation of the vehicle collision in the process, in order to analyse the crash construction
of the vehicle body in a virtual environment. The results show the effective dissipation of the crash energy
and the ordered deformation of the car-body structure, so that the reasonability and feasibility of the
design are verified.
Keywords: Straddled-type monorail vehicle; Frontal crash; Crashworthiness; Energy absorption device;
Simulation
27
to the experimental requirements, so as to observe when the vehicle collides, we have to balance the
the deformation of internal components and the force of collision and control its peak value as
distribution of stress and strain. much as we possibly can, keeping the force of col-
lision that transmits to the human body and the
value of acceleration in an acceptable range and
3 THE DESIGN OF THE IMPACT making sure that the impact on passengers meets
RESISTANCE STRUCTURE OF the requirements of safety regulations.
THE BODY OF STRADDLED-TYPE For “double collisions”, we should arrange the
MONORAIL VEHICLES interior space of the vehicle properly and prevent
the equipment installation, interior decoration,
When the vehicle collides with the fore-end face to apron board and the bogie connecting equipment
face, the first vehicle goes into the state of colli- from dropping or being damaged, so as to achieve
sion first. Therefore, the frontal collision simula- the aim of protecting people.
tion experiments of the first vehicle are the focus
of the research of the design of impact resistance
of monorail vehicles. As for the first vehicles, 4 THE CONFIRMATION OF COLLISION
which are located at both ends of the straddled- SIMULATION VELOCITY
type monorail vehicles, they are shared by drivers
and passengers, while non-passenger zones of the In order to simulate the collision of straddled-type
vehicle are quite small, and the deformable zone monorail vehicles, certain initial velocity should
decreases a lot correspondingly, which decreases firstly be given to the vehicle body so that it can
the energy-absorbing effect and makes it difficult collide with the specific rigid wall. As for the setting
to satisfy the safety design standards. Having rec- of the initial velocity, there are certain experiences
ognised the importance of developing the safety and theories to follow. According to the research
design standards for vehicle collision, we conduct of Reference, we can find that the number of vehi-
research for the safety performance of collisions cles has limited influence on the energy absorption
to be carried out on the design of straddled-type of the first vehicle. The energy absorption of the
monorail vehicles. The results are summarised as first vehicle can be calculated from Formula (1):
follows:
In designing the body of the straddled-type R1 1
monorail vehicles, the focus is the rational design Ed = × M c1v 2 (1)
2 fd 2
of the collision energy-absorbing zone of the vehi-
cles, which aims to rationally distribute the inflex-
ibility of the end wall, side wall and underframe, In the formula, R1 is the energy absorption
and which makes the non-passenger zone become coefficient of the interface, and the recommended
a high energy-absorbing deformation zone. The value of the reference is 0.9; coefficient 2 indicates
shadow zone in Figure 1 can be considered to be that the two vehicles absorb equal energy: fd is the
the deformation zone for the energy absorption energy coefficient, and the recommended value is
of the collision of the first vehicle. The strength 1.2; M c1 is the mass of the first vehicle; V is the
of the vehicle body in the deformation zone must velocity.
be less than that of the passenger zone. The ideal Substitute each value of the straddled-type
deformation is that, firstly, the plastic deforma- monorail vehicle into the above formula, and the
tion happens from the end of the vehicles, and energy absorption of the first vehicle is as follows:
in accordance with the process of progressive
development that has been set, to absorb a large 09 1
Ed M c1v 2 0.1875M c1v 2 (2)
amount of the energy caused by impact to control 2 × 1.2 2
the changes of the collision force and deceleration.
In the phase of “single collision”, in order to In the references, it says that two urban rail vehi-
keep the deceleration at a certain appropriate level cles of the same specification collide at a velocity
of 20 km/h, and whether the energy at this velocity
can be absorbed by energy-absorbing components
when the body structure is not basically deformed
is verified.
Since the rigid wall is fixed in the model of cal-
culation, according to the theorem of momentum
and the law of conservation of energy, under the
Figure 1. Structure diagram of the crashworthy vehicle. situation that the plastic deformation of the vehi-
cle body absorbs the same energy, the velocity with
28
Table 1. Collision velocity of straddled-type monorail
vehicle.
29
Figure 6. The major absorption component of the
straddled-type monorail vehicle.
energy dissipated by the first vehicle during colli- Taking the analytical method of the collision safety
sion is 1,032 kJ. of the straddled-type monorail vehicle as the
The energy change is evidently shown in the research objective and the Chongqing straddled-
collision process of the vehicles. Firstly, after type monorail vehicles as the research subject,
the collision, the front-end of the vehicle touches this paper explores the basic algorithm and theo-
the rigid wall and the deformation begins from ries of non-linear finite elements theoretically. We
small to large, then to the maximum, and then adopted the related software programs to establish
the rear part bounces back and separates until the the collision simulation analysis model and car-
movement ceases. This important rule reveals the ried out the head-on collision simulation analysis
characteristics of energy change during the process of the vehicle. With the initial velocity of 40 km/h
of collision, and also provides an important theo- (the collision velocity of the monorail vehicle and
retical foundation for the identification of the col- the static monorail vehicle of the same mass), it is
lapse and deformation of the vehicle body. concluded that the non-passenger zone at the front
In addition, the hourglass energy is only of the vehicle has obvious plastic deformation and
11.6 kJ, accounting for 0.67% of the total energy, absorbs most of the collision energy, which greatly
which ensures the correctness of the calculation reduces the peak value of the collision force. Fur-
results. The ordinary simulation requires that thermore, it does not impact the survival room of
the ratio of hourglass energy to total energy is the crew and passengers. The change to each part
less than 5%. Meanwhile, the sum of the energy of the human body does not cause its functions
is larger than the initial total energy. This is to be affected. From the analysis of the situation
because during the process of collision, some ille- of body injury, the maximum value of the injury
gal energy is produced. However, as its propor- index of each part is within the standards, indicat-
tion is very small, the calculation results are still ing that people are safe when collision occurs at
convincing. this initial velocity.
30
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Xianghong Zhu
Hubei Tri-ring Special Purpose Vehicle Limited Liability Company, Wuhan, China
Lei Zhao
Shiyan Product Quality Supervision and Testing Institute, Shiyan, China
ABSTRACT: The Hybrid Electric Vehicle (HEV) has been a new orientation for vehicles as it combines
the two advantages of low emissions and low fuel consumption. As a key technology for reducing energy
consumption, more and more importance has been attached to regenerative braking, which has been
extensively utilised by people. This thesis aims to introduce the features of regenerative braking, including
structure, function and control strategy. The appraisal and development trend of the regenerative braking
system is discussed.
31
Figure 2. Regenerate—hydraulic hybrid braking system
structure.
32
Then, compared to two other kinds of electric
vehicles, the cost is just right, and they do not
need to change the infrastructure. For the cur-
rent technology, which is relatively mature, it is the
car with the most performance advantages at this
stage. The environmental benefit and economic
benefit brought by hybrid cars is self-evident, and
a market potential exists in all of the countries in
the world. The hybrid technology attached high
attention in domestic and foreign, which pay more
efforts to develop hybrid electric vehicles.
Among the key technologies of hybrid elec-
tric vehicles, the battery technology has been the
research focus at home and abroad. But with a lot
of manpower, financial and material resources, its
Figure 3. Basic principle of regenerative braking energy bottleneck still has not been broken through. So
recovery. the power of the electric car that can carry energy
and can travel distances on a single charge is rela-
tively short. Regenerative braking can prolong the
and inductive current I along with the change of travelling distance of electric vehicles with a one
time t have the following relationship: time charge. As a key energy saving technology,
hybrid cars will have very considerable economic
di and social benefits, which has received increasing
E L (1) attention.
dt
In the regenerative braking control strategy,
When the switch K is closed, the induced cur- there are key technical problems: brake stability,
rent caused by the induced electromotive force the adequacy of the braking energy recovery, brak-
of the motor forms a loop through the switch K. ing pedal stationarity and composite braking coor-
The function of K is directed by IGBT (Insulated dination compatibility.
Gate Bipolar Transistor) components. The open Braking stability: due to the electric braking
circuit of the IGBT is provided by the control torque (the regenerative braking torque) varying
unit. Induced current is the braking current, whose with the speed range, its braking process is dif-
value is: ferent from the friction braking system. For later
driven cars, the electric braking torque is added on
E the rear axle.
i1 = − (2) Energy recovery adequacy: energy recovery
R1 R3 capacity is influenced by factors of battery, motor
work characteristics, charging speed, etc. For the
After the switch K is disconnected, the absolute reason that the braking energy recycling often exists
value of di/dt rapidly increases. When the induc- problem such as charging and fast charging, the
tion electromotive force is greater than the battery motor and battery work auspicious is complicated.
voltage: E > U, the current at the time of energy So by improving the motor control technology, the
recovery is: battery energy storage technology and the use of
advanced energy storage as a way to improve the
E U charging efficiency of the short time charging sys-
i2 = (3)
R1 R3 tem, this is the key to ensuring the braking energy
recycling is sufficient.
As a result, the energy generated in the proc- Brake pedal stationarity: as the auxiliary brak-
ess of motor regenerative braking is filled into the ing torque, the electric braking torque will affect
storage device. the brake pedal to beat and driving comfort. It is
necessary to optimise the size of the electric brak-
ing torque control to make the car brake feel the
3 THE PROSPECT OF TECHNOLOGY OF same as a conventional automobile brake system.
REGENERATION BRAKING SYSTEM Composite braking coordination compatibility:
OF HYBRID ELECTRIC VEHICLE to realise the energy under the condition of ensure
the safety of the brake fully recycling, regenera-
Two prominent advantages of hybrid cars are tive braking must be compatible with conventional
energy saving and environmental protection. braking system, ABS system good coordination.
33
Reasonable design electric mechanism regulated conduct the regenerative braking system parameter
torque and the brake torque adjustment of com- matching and performance optimisation. Accord-
prehensive control strategy are needed to realise ing to the experimental simulation of the regenera-
the motor feedback braking energy and ABS brak- tive braking system, put forward the scientific and
ing coordination control. reasonable hybrid regenerative braking compre-
To overcome these problems, our scientific hensive performance test and evaluation methods.
research ability needs to be improved in the follow-
ing respects:
Regenerative braking system modelling and 4 CONCLUSION
vehicle braking dynamics modelling ability: based
on a regenerative braking and friction braking The theory of regenerative braking technology
model, establish a hybrid integrated multiple oper- is one of the key technologies of hybrid electric
ating conditions braking kinetics model. Accord- vehicles, whose research of the control system is
ing to the requirements of regenerative braking, very complex, involving different subjects such as
establish a reasonable control model of the battery automobiles, machinery, electrical and electronic,
energy, and the efficiency of the motor/generator etc., which is a considerable breadth and depth of
control model. the subject. Because the research started late in our
Optimisation ability based on vehicle braking country, there are now many key problems to be
dynamics simulation: based on the comprehensive solved. For the reason that regenerative braking
braking dynamics simulation of the hybrid electric has broad application prospects, it is necessary to
vehicle, through the analysis on the battery in the increase the investment in research and develop-
process of regenerative braking, motor/generator ment in our country.
work change rule and correlation, finish working
parameters of subsystem comprehensive control
based on maximum braking energy recovery rate. REFERENCES
Through analysis and evaluation on braking per-
formance and braking energy recovery in multiple Ahn, J.K., Jung, K.H., Kim, D.H., Jin, H.B., Kim,
operating conditions, optimise the distribution of H.S., & Hwang, S.H. (2009). Analysis of a regenera-
the braking energy control strategy. tive braking system for hybrid electric vehicles using
Regenerative braking energy management and an electro-mechanical brake. International Journal of
Automotive Technology, 10(2), 229–234.
control strategy development capabilities: accord- Han, J.F., Tao, J., Lu, H.J., et al. (2014) Development and
ing to the different conditions of hybrid cars, the prospect of regenerative braking technology of elec-
road adhesion conditions and braking require- tric vehicles. Applied Mechanics and Materials, 2808
ments on the condition of braking safety, deter- (448).
mine the reasonable regenerative braking and Han, Z.L., & Wang, Y. (2010). On the study of electric
friction braking energy distribution management vehicle regenerative braking. Applied Mechanics and
model and control strategy, braking and compre- Materials, 1016 p. (33).
hensive coordination of ABS control, and improve Li, G.F., & Wang, H.X. (2012). Study on regenerative
the braking energy recovery. braking control strategy for EV based on the vehicle
braking mechanics. Advanced Materials Research,
Regenerative braking system experiment, 1700 (490).
matching control and comprehensive evaluation Wang, F., & Wu, Y.H. (2013). Study of regenerative brak-
of simulation ability: build a physical simulation ing model and simulation of a car. Advanced Materi-
environment for the hybrid regenerative braking als Research, 2109 (605).
system that can reflect the state of the vehicle, and
34
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: The rotating articulated skirt and the underwater vehicle are sealed by an O-ring which
is compressed by bolts pre-tightening flange, to solve the difficulty of sealing the rotating articulated
skirt and the underwater vehicle in a deep water operation. In this paper, the O-ring was taken as the
object of study. 3 order Yeoh model is used as the corresponding material parameters of the hyper-elastic
constitutive relation curve fitting of the O-ring, using the finite element software to analyse the influence
of different number of bolts pre-tightening on the contact stress and shear stress of the O-ring. Thus the
dangerous section position is obtained, and the optimal number of bolts is acquired through the analysis
of contact stress on the dangerous sections. The results show that: on the contact surfaces A and B, the
contact stress of O-rings which are pre-tightened by 24 bolts is 14.635 MPa and 13.011 MPa, while the
seal areas that meet the requirements are 52.52% and 67.14%, which is far stronger than a setting 22, 20
or 26 bolts.
Keywords: Articulated shirt; Carrier; Sealing; O-ring; Yeoh Model; non-linear finite element analysis
35
In the simple shear test:
⎛ 1 ⎞ ∂W
σ 12 λ1 − (3)
⎝ λ1 ⎟⎠ ∂I1
⎛ 1 ⎞ ∂W
σ1 λ12 − (4)
⎝ λ1 λ 22 ⎟⎠ ∂I1
⎛ 1 ⎞ ∂W
σ2 λ 22 − (5)
Figure 1. The assembly of articulated shirt and carrier. ⎝ λ 2 λ12 ⎟⎠ ∂I1
⎛ 1⎞⎡
3C30 ( 1 − 3) ⎤
2
σ 11 λ12 − C10 + 2C220 (6)
⎝ λ1 ⎟⎠ ⎣ ⎦
Figure 2. Partial enlarged drawing of seal.
⎛ 1 ⎞
⎟ ⎡⎣C 3C30 ( − 3) ⎤⎦
2
σ 12 λ − + 2C 20 (7)
⎝ 1
λ1 ⎠
10 1
⎛ 1 ⎞ ∂W
σ 11 λ12 − (2)
⎝ λ1 ⎟⎠ ∂I1 Figure 3. The curve fitted test data.
36
The curve fitted the above test data by using
ANSYS is shown in Figure 3.
By using ANSYS, the parameters obtained
by the above-mentioned curve can be reached:
C10 = 1.29 MPa, C20 = −1.03 × 10–2 MPa,
C30 = 2.7 × 10–4 MPa.
37
Figure 6. Three contact surfaces of the sealing ring. Figure 10. Shear stress curve.
38
Hu Yong, Zhang Jin and Cui Weicheng. (2007). Sealing Wang Liquan, Tang Dedong, Wu Jianrong and Zhang
ability research on movable rescue bell. Journal of Zhonglin. (2008). Research on Structure and kinemat-
Ship Mechanics. 11(2), 221–230. ics of a novel mating skirt on the underwater vehicle.
Li Xiaofang and Yang Xiaxiang. (2005). A review of China Mechanical Engineering. 19(23), 2814–2818.
elastic constitutive model for rubber materials. China Wang Liquan, Tang Dedong and Zhang Zhonglin.
Elastomerics. 15(1), 50–58. (2007). Research on Novel Underwater Mating Device
Lu Junfeng and Zhao Yao. (2014). Research on sealing with Articulated Skirt. Proceedings of the 2007 IEEE
ability of the spherical transfer skirt at large mating International Conference on Mechatronics and Auto-
angle. Shipbuilding of China. 61(8), 453–457. mation, Harbin, China, 769–773.
Mao Jiyu, Zhang Xiangming, Luo Ziyei and Liu Yan. Wang Liquan, Tang Dedongi, Meng Qingxin and Zhang
(2000). A research for the revolving on the skirt seal- Zhonglin. (2011). Prototype development and test
ing technology of DSRV mating system. Lubrication study on double articulated mating skirts of rescue
Engineering. 25(5), 47–48. vehicle. Journal of Mechanical Engineering. 47(9),
Ren Quanbin, Chen Ruxun, and Yang Weiguo. (1995). 39–44.
Deformation and stress analysis of rubber O-ring. Wei Yintao, Yang Tingqing and Du Xingwen. (1999). On
Journal of Aerospace Power. 10(3), 38–41. the large deformation rubber-like materials: Constitu-
Schoof, C., Goland, L. & Lo, D. (2007). Pressurised Res- tive laws and finite element method. Chinese Journal
cue Module System Hull and Transfer Skirt Design of Solid Mechanics. 20(4), 281–289.
and Experimental Validation. Oceans. 81(9), 1–8.
39
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: In this paper, based on researching the behaviour of pedestrians’ overtaking in Xizhimen
and Chongwenmen subway station channel in Beijing, the characteristics of pedestrians’ overtaking
behaviour are analysed, when the rear pedestrians pass the front pedestrians, considering the required
space and the shortest distance. Then choosing a temporary target improves the existing pedestrian social
force model. In this paper, the modified pedestrians’ overtaking behaviours based on the social force
model program is compiled by MATLAB, and the reasonable model parameters are selected. Taking the
Xizhimen and Chongwenmen subway station channel as the research background, the model simulation
program is used to simulate the pedestrians’ overtaking behaviours in a subway station channel. The
results show the effectiveness of the proposed model.
Keywords: Urban rail transit; Pedestrians’ overtaking behaviours; Social force model; Pedestrian flow
simulation
41
social force model. The model of pedestrians over- trian has overtaken the pedestrian ahead, and go
take social force is developed by using MATLAB, ahead in accordance with the target direction. The
selecting the reasonable model parameters. Taking reason for the pedestrian choosing to overtake the
the research area of Xizhimen and Chongwenmen pedestrian ahead on their left side is that on the
subway stations as the research background, the one hand, the ahead pedestrians’ left sides can
model simulation program is used to simulate the meet the overtaking required space. On the other
pedestrians’ overtaking behaviours in the subway hand, the pedestrians (circle-marked) on the left
stations, to verify the validity of the model. side of the front pedestrian can realise the overtak-
ing behaviours in the shortest distance.
The pedestrians’ crossing behaviours in the
2 ANALYSIS OF PEDESTRIANS’ Chongwenmen and Xizhimen subway stations can
OVERTAKING BEHAVIOURS be seen. First it is determined beyond the pedes-
trians around, whether they can meet the required
This paper investigates the pedestrians’ overtak- space of the overtaking pedestrian. Then the
ing behaviours of a one-way and bi-directional pedestrians can finish the overtaking behaviours in
pedestrian walkway in Beijing Xizhimen and the shortest distance.
Chongwenmen subway stations, and analyses the
characteristics of the pedestrians’ behaviours.
Figure 1 shows the Chongwenmen subway sta- 3 IMPROVEMENT OF PEDESTRIANS’
tion research channel (one-way) area pedestri- OVERTAKING BEHAVIOURS ON
ans’ overtaking behaviours process diagram. The SOCIAL FORCE MODEL IN THE
first picture shows the behaviour of a pedestrian STRAIGHT LINE AREA OF URBAN
(circle-marked) preparing to overtake the front RAIL CHANNEL
pedestrians. The second picture shows the pedes-
trian change the direction of stride, and overtake This section analyses the pedestrians’ overtaking
from the right side of the front pedestrian. The behaviours on social force model of the existing
third picture shows that in accordance with the urban rail channel, by considering the required
direction of the target forward, the pedestrian space and the shortest distance of the pedestrians’
overtakes the front pedestrians. Pedestrians choose overtake process, selecting the temporary target
to overtake from the right side of the front pedes- point and improving the existing pedestrians’ over-
trian because the right side of the front pedestrian taking behaviours on social force model.
can provide the required space.
Figure 2 shows that the research on the process
3.1 The problems of the pedestrians’ overtaking
of the pedestrian flow overtaking behaviours in the
behaviours on social force model in the
same direction in the Xizhimen subway research
existing urban rail channel
channel area. The first picture shows the rear
pedestrian (red circle marker) ready to overtake the The description of the pedestrians’ overtaking
pedestrian in front. The second picture shows the behaviours on social force model in the existing
pedestrian overtake the pedestrian ahead on their urban rail channel.
left side. The third picture shows after the pedes- The existing pedestrians’ overtaking behaviours
on social force model describing the pedestrian’s
overtaking behaviours by changing the intended
speed direction of the pedestrian self-driving force
(Haijun Zhang). Figure 3 is a schematic diagram
of the change of intended speed direction when
pedestrians overtake other pedestrians. When the
Figure 2. The overtaking behaviours of pedestrians in Figure 3. Schematic diagram of the change of pedestri-
research area of subway Xizhimen station. ans’ intended speed direction.
42
distance between pedestrians is less than 0.75 m the relation between the required lengths for one
(including the radius of pedestrians), the pedes- pedestrian to move with velocity v, where v itself
trian changes the intended speed direction accord- is linear, at least for velocities 0.1 m/s < v < 1.0 m/s.
ing to the current intended direction with the The required length of the pedestrian to move can
current position as the base point, and the angle be determined by formula 3.
of change is π/6.
The pedestrians’ speed is updated in accord- d a + bv (3)
ance with the traditional social force model after
the pedestrians find the intended direction, and With a = 0.36 m and b = 1.06 s.
describing the pedestrian transcendence, as shown In reality, pedestrians’ walking behaviour takes
in the formula 1, 2. place in a two-dimensional system. Therefore, on
the basis of Seyfried A’s research, the required
Fdesired mi i (v ei − vt ) / τ (1) space for pedestrians walking is defined as two-
dimensional required space. It is defined as: under
the hypothetical conditions, pedestrians along the
where Fdesired is the pedestrian self-driving force
direction of velocity v, the required space occupied
according the intended speed direction; mi is the
by the length of d, and the width of the pedestri-
pedestrian weight; v0 is the intended speed; ei is the
ans’ diameter (Shanshan Li), as shown in Figure 4.
direction of intended speed; vt is the actual speed; τ
In she selecting for the length and width in
controls the acceleration.
required space, there are the following deficiencies:
m d (t ) In reality, the traffic environment is different,
F= i i = Fdesired Fwalll + Fpedestrian (2) the intended speed Vdes of pedestrians are different,
d (t ) and the length d of required space is more fixed,
based on hypothetical conditions selected. When
F is the pedestrian by the resultant force;
where pedestrians move to the next step and the step is
interaction
Fwall is the between pedestrians and greater than the length d, it may cause collisions
the wall; Fpedestrian is the force between pedestrians. with other pedestrians.
The model has the following deficiencies: The width of the required space is equal to
the pedestrian’s diameter, which easily leads to
1. Changing the direction of pedestrians by using
the pedestrian conflicting with other pedestrians
the intended speed may conflict with other
(Figure 5), pedestrians i by the force of the pedes-
pedestrians. Pedestrian i considered avoiding
trian j, the two person will be bounced off.
conflict with pedestrian j, but did not consider
conflicting with other pedestrians. It is possible
in the process of overtaking pedestrian j, that 3.2 The improvement of pedestrian overtaking
there is conflict with other pedestrians. social force model
2. The effect of multiple forces may cause pedes-
By analysing the existing pedestrian overtaking
trian i to deviate from the intended speed
social force model and the shortcomings of the
direction of the overtaking behaviour. In the
traditional social force model, the position of
the pedestrian i in the next step is determined by
the self-driving force of pedestrians, the inter-
action between pedestrians and the interaction
force between pedestrians and obstructions, in
which the self-driving force is considered with-
out other obstacles or pedestrian interference,
advancing according to the intended speed for
direction of the destination. When pedestrian Figure 4. The required space for pedestrian i.
i wants to overtake pedestrian j, the intended
speed in the direction of the destination is
changed to the intended speed direction of the
overtaking behaviours, which may cause the
pedestrian i to deviate from the intended speed
direction of the overtaking behaviours.
3. Describe the required space
The Seyfried study found that pedestrians
needed a certain distance to meet the required Figure 5. The contact diagram between pedestrian i
space of next step in the process of walking, and and pedestrian j.
43
Figure 7. Schematic diagram of initial target selection.
Figure 6. The schematic of pedestrians setting target
point.
44
where F is the pedestrian by the resultant
force, Fwall is the interaction between pedestri-
ans and the wall, , Fpedestrian is the force between
pedestrians, Fturning is the gravity of the pedes-
trian in the corner, ϕ1 is the coefficients of the
p
piecewise function.
vi (t ) is the speed of the pedestrians in the
Figure 9. Adjust the selection of target points. step t, vi (t ) is the speed of the pedestrians
in the step t − 1. When the p
pedestrian is not
affected by other pedestrians, Fpedestrian = 0.
4. Calculation of deflection force. In order to over-
take pedestrian j, pedestrian i needs to be within P( x y ).t P( x , y ) (t ) + vi (t ) i Δt (7)
a certain range of psychological effects and
temporary change in the direction of the target, position
where P( x , y ).(t ) is the p of the pedes-
towards the temporary target point forward. trian at time (t − 1), P( x , y ).t is the position of the
Then it is necessary to add a deflection force pedestrian at time t.
and change the direction of walking in order
to complete overtake behaviours. The deflec-
tion force Ftur not only ensures the pedestrian 4 ANALYSIS ON THE IMPROVEMENT
walks towards the target point, but also guaran- EFFECT OF PEDESTRIANS’
tees the next step position of the pedestrian i, OVERTAKING BEHAVIOURS ON
which does not exceed the required space by the SOCIAL FORCE MODEL
pedestrians at the target point. The calculation
is shown in formula 4. Determining the pedestrian parameters of the
social force model, inputting the relevant data, and
Ftur tur (
mi Vddeses
)
eop − vest (t ) / τ (4) simulating the improved pedestrian overtaking
social force model to verify the validity and feasi-
bility of the improved model. Analysing the over-
where Ftur is the deflection force; κtur is deflection taking process and trajectory of the pedestrian.
coefficient; mi is the weight of pedestrian I;
force
vest (t ) is the actual speed at the moment; Vdes is
intended speed; τ is the reaction time, τ = 0.5;
the 4.1 Select the model parameters
eop is the unit vector for the direction of the next According to research for the pedestrian social
pedestrian’s walk; eop is the current position of force model simulation parameters, pedestrian
the pedestrian points to the target point. quality and pedestrian radius obey normal dis-
tribution. The range of pedestrian quality m
eop (G x y )
− P x y / G( x , y 2 ) − P( x , y ) (5) is m ∈ [50, 80]kg, N(65, 52), the range of pedes-
trian radius is d ∈ [0.2, 0.3]m, the initial intended
where G( x , y 2 ) is the pedestrian i next temporary speed V0 and initial actual speed V are uniformly
target location; P(x, y) is the pedestrian i current distributed, respectively V0 ∈ [0.8, 1.6]m/s and
location. V ∈ [0.5, 1.8]m/s; This simulation takes two pedes-
5. Calculate the speed and the next step position trians which contains the front pedestrian 1 and
for pedestrian i. After the pedestrian deter- rear pedestrian 2, respectively the intended speed
mines the target point, the pedestrian speed is 1.0 m/s and 1.6 m/s. The initial speed is 0.8 m/s
and position of the next step is determined by and 1.3 m/s, and the initial position is (1.8, 2.7),
the formula 6, 7. Pedestrian i by the role of the (0, 2.7).
deflection force in the process of overtaking In the normal pedestrian flow, pedestrian
relaxation time τ takes a fixed value of 0.5 s. The
force. After the end of
instead of the self-driving
the deflection force Ftur disappears, the driving parameters of pedestrian transcending social force
force is recovered. modelca according to the reference (Shanshan Li).
45
continue to rise gradually until pedestrian 2 com-
pleted the overtake behaviour. After the 15th step,
pedestrian 2 was no longer affected by pedestrians
1 and accelerated to the desired speed of 1.6 m/s.
In the simulation process, pedestrian 1 was not
affected by pedestrian 2. In the role of self-driving
force, the speed of pedestrian 1 increased from the
initial speed 0.8 m/s to the intended speed 1 m/s.
5 SIMULATION ANALYSIS OF
PEDESTRIANS’ OVERTAKE
BEHAVIOUR IN URBAN RAIL
CHANNEL
46
the existing and improved models are compared
by MATLAB. Based on the two-way channel of
Xizhimen subway station and the one-way channel
of Chongwenmen subway station, the improved
pedestrians flow model is simulated. The simula-
tion results are in agreement with the analysis of
Figure 13. Pedestrian overtaking process simulation the investigation, and validates the improvement
diagram. of pedestrians’ overtaking behaviours on social
force model.
REFERENCES
47
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Xiaoxu Zhang
Chongqing College of Electronic Engineering, Chongqing, China
ABSTRACT: The Support Vector Regression (SVR) was proposed to establish the relationship
between the objective psychoacoustic parameters and the sound quality of vehicle exhaust noise. Sensory
pleasantness evaluation of vehicle exhaust noise samples were obtained under the same training and test
sample sets and the results were compared with that obtained through Multiple Linear Regression (MLR)
prediction models. The results showed that the prediction values of SVR were close to the measured
values, the mean absolute percentage error is smaller than MLR and in the 8% error range. The SVR
model represented the nonlinear of sensory pleasantness and objective parameters exactly. It is suggested
that SVR is an effective and powerful tool for predicting sound quality of vehicle exhaust noise.
Keywords: Highway transportation; Vehicle; Sound quality; Exhaust noise; Support vector regression
49
3 THE ESTABLISHMENT OF SVR variable to conduct the learning and training of
REGRESSION MODEL modeling. In order to compare with the prediction
results of the multiple linear regression method in
3.1 Data Document, the training samples and testing sam-
ples for the conduction of modeling prediction
The data employed in this paper are from Docu-
research adopted by this paper are completely the
ment. This data set including 28 groups of meas-
same with those in Document.
ured samples (Table 1) is a satisfaction assessment
of the exhaust noise of vehicles obtained by Shi
Yan et al. through the test using the method of 3.3 The evaluation of the performance
paired comparison of the jury. By adopting the of the model
multiple linear regression model, they carried out Mean Absolute Percentage Error (MAPE), Root
a prediction of the satisfaction through modeling, Mean Square Error (RMSE) and correlation coeffi-
and the specific experimental procedure and mod- cient (R2) are used to evaluate the predictive perfor-
eling process are shown in Document. mance of the established model, which is defined as:
1 n yˆ j − y j
3.2 The establishment of the model MAPE = ∑
n j =1 y j
(3)
In the modeling process of SVR for satisfaction,
the five parameters of loudness, sharpness, rough- 1 n
ness, fluctuation and kurtosis are taken as input RMSE = ∑ ( yˆ j
n j =1
j )2 (4)
variables, and satisfaction is taken as an output
50
2 Table 3. Comparison of two prediction performances.
⎛ ⎞
⎜⎝ (ˆ ˆ )( )⎟
=1 ⎠ Satisfaction P
R2 = n n
(5) Regression
∑( ˆ
j =11
ˆ) 2
∑(
j 1
j y) 2 method MAPE% RMSE R2
MLR 8.83 1.99 0.96
SVR 3.13 0.67 0.99
In the formula, n is the number of testing sam-
ples. yj and yˆ j are the target value and predictive
value of the testing samples respectively. y and
ŷ are the target mean value and predictive mean
than 8%. Among the 10 samples, the maximum
value of the testing samples respectively.
error is 7.38%(26*), 4 MAPEs are lower than 2%,
and the others are between 3% and 6%, with the
changes being small. However, 60% of the predic-
4 THE ANALYSIS AND DISCUSSION
tive values of the multiple linear regression model
OF THE RESULTS
have errors that are lower than 10%, with 14.6%
being the biggest and 2.8% being the smallest.
The previous 18 groups are used as training sam-
The deviation fluctuates in a relatively wide range,
ples to establish SVR predictive model. In order
making the predictive result unstable. The result
to verify the effectiveness of the SVR model, the
of the comparison between the predictive values
last 10 groups are used as the predictive samples
and the measured values of the model shows that
of other samples which are prepared. Through
the predictive ability of the SVR model is supe-
the established model, the predictive values of
rior to that of the multiple linear regression mod-
all the satisfaction are calculated and compared
els, and the former can better reflect non-linear
with the measured values, and the predictive
relationship between objective parameters and
values of the multiple linear regression method.
satisfaction.
Table 2 shows the psychoacoustic parameters of
Table 3 shows the statistics of MAPE, RMSE
ten predictive samples, as well as the measured
and R2, which are calculated using two methods,
values of the sound quality satisfaction and the
about the satisfaction of the samples produced by
predictive values of two predictive models. It can
the subjective evaluation prediction model of the
be seen from Table 2 that the sample satisfaction
exhaust noise of vehicles. Table 3 indicates that
prediction result produced by the subjective valu-
MAPE of SVR of the predictive sample is 3.13,
ation predictive model for the exhaust noise of
which is much smaller than the 8.83 of MLR.
vehicles which SVR established is relatively ideal.
RMSE is 0.67, which is also much smaller than
All the MAPEs of the predictive values are lower
the 1.99 of MLR. The correlation coefficient R2
it obtained is 0.99, which is closer to 1 than 0.96
of MLR. It fully shows that the predictive model
Table 2. Comparison between the predictive values and
of SVR is more accurate than MLR. Its gener-
measured values.
alization ability is also stronger, and it is more
Satisfaction P effective.
Multiple
regression 5 CONCLUSION
SVR prediction predition
According to the measured data set of satisfaction
Samples Meas- Predictive Error Predictive Error according to different objective psychoacoustic
SN ured value % value %
parameters, we used the support vector regres-
19 11.0 11.09 0.82 11.34 3.1 sion machine to establish the predictive model for
20* 18.4 19.15 4.07 16.67 −9.4 the sound quality of the exhaust noise of vehicles,
21* 18.9 18.58 −1.70 18.38 −2.8 and compared it with the multiple linear regres-
22* 9.10 9.77 7.38 10.15 11.5 sion models. The result shows that there is a non-
23* 28.9 27.52 −4.77 27.36 −5.3 linear relationship between objective parameters
24* 24.3 25.04 3.05 22.51 −7.4 and subjective satisfaction. The impact of objec-
25* 21.2 21.15 −0.23 18.11 −14.6 tive parameters on subjective satisfaction is very
26* 7.50 7.500 0.00 6.73 −10.2 complex. The predictive value of the SVR model is
27* 8.70 9.23 6.15 9.46 8.8 closer to the measured value, with smaller predic-
28* 24.6 25.38 3.17 23.34 −5.2 tion error, better prediction accuracy and stronger
generalization ability.
51
REFERENCES Journal of Macromolecular Science Part B: Physics,
51(7): 1437–1448.
Cai C Z et al. 2003. SVM-Prot: web-based support vec- Shi Y et al. 2010. Sound Quality Prediction of Vehicle
tor machine software for functional classification of a Exhaust Noise Based on Neural Network. Transac-
protein from its primary sequence [J]. Nucleic Acids tions of the Chinese Society for Agricultural Machin-
Research, 31: 3692–3697. ery [J]. 41(8): 16–20.
Jiao F L et al. 2006. Listener clustering and subject Shin S H et al. 2009. Sound quality evaluation of the
assessment of car interior noise quality [J]. Technical booming sensation for passenger cars [J]. Applied
Acoustics, 25 (6): 568–572 (in Chinese). Acoustics, 2009, 70(2): 309–320.
Liao J P et al. 2010. Elementary Introduction Noise Tang J L et al. 2012. Support vector regression model for
Control of Automobile [J]. Design, Computational direct methanol fuel cell [J]. Int J Mod PhysC, 2012,
research. 1:15–19. 23(7): 1250055.
Pei J F et al. 2012. Prediction on the glass transition Vapnik V. The nature of statistical learning theory [M].
temperature of styrenic copolymers by using SVR [J]. New York: Springer, 1995.
52
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Daolai Cheng
School of Railway Transportation, Shanghai Institute of Technology, Shanghai, China
ABSTRACT: The basic unit is often used to reduce the noise of a certain frequency or a certain
frequency segment. In this paper, an acoustic finite element analysis is carried out on the transmission
loss of the muffler, such as the expansion ratio of the muffler, the inner tube, the number of the expansion
chamber and so on. HyperMesh divides the mesh of mufflers inner region, defining acoustic grid, posting
treatment and calculates the muffler transmission loss. Through such methods, we can get the effect of the
muffler transmission loss under the circumstance of the different basic unit of muffler.
1 INTRODUCTION
53
Figure 2. Physical geometry model of muffler.
54
Table 1. Single expansion muffler with different expansion ratios.
Number Scheme 1 Scheme 2 Scheme 3 Scheme 4 Figure 7. Two different numbers of expanding expan-
sion chambers.
1 L = L = L = L =
160 mm 200 mm 320 mm 400 mm
4 CONCLUSION
Figure 6. Different expansion chamber lengths.
With the increase of the expansion ratio, the trans-
mission loss will increase. However, there is no
only affects the noise elimination frequency and effect on the pass frequency. With the increase of
the pass frequency, but has no effect on the peak the length of the expansion chamber, the variation
value of the transmission loss. of the length of the muffler only affects the noise
elimination frequency and the pass frequency, but
has no effect on the peak value of the transmission
3.3 The effect of expansion chamber number on
loss. The double expansion chamber can not only
the transmission loss
improve the overall noise reduction of the muffler
We build two different numbers of expanding but it can also effectively inhibit the single expan-
expansion chambers (Yuan X, 2009), its specific sion chamber muffler from producing the pass fre-
parameters are as shown in Figure 7. quency. Acoustic finite element method is a kind of
Through the simulation analysis, the transmis- advanced calculation method, which is compared
sion loss curve is as shown in Figure 8. with the experience formula calculation in the past.
As is revealed in the picture, the transmission
loss of the double expansion chamber muffler is ACKNOWLEDGMENTS
still higher than the single one under the condition
of the same cavity volume. It can effectively inhibit This work was financially supported by the labora-
the single expansion chamber muffler from pro- tory construction project of Shanghai Institute of
ducing the pass frequency. Technology (No. 10210D150008) fund.
55
REFERENCES Selameta, A., Deniab, A.J. (2003). Acoustic behavior of
circular dual-chamber mufflers. Journal of Sound and
Beranek L. (1954). Acoustics. McGraw Hill. Vibration, 265, 967–985.
Munjal M.L.K (2008). Muffler Acoustics [M]. Formulas Yuan X., Liu, Z.S., Bi, R., and (2009). The contrast of
of Acoustics, 796–798. simple expanded-muffler with large porosity perfo-
Pang J., Chen, G., He, H. (2013). Automotive noise rated muffler. Journal of AUTO SU-TECH, 4, 18–21.
and vibration. 1st edn. Beijing: Beijing Institute of Zhang, F.L., Xu, J.W. (2013). Vitual. Lab Acoustics
Technology Press. Reference to a chapter in an edited acoustic simulation from entry to master, 1st edn.
book. Xi’an: Northwestern Polytechnical University Press.
56
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: Reliability improvement of the diesel engine is a systematic and probabilistic assessment
that needs a large amount of useful reliability data for this study. Collected diesel engine failure records
are taken as data samples, and then the two-parameter Weibull distribution fitting model is used for
failure mileage distribution. The parameters are estimated by using the linear regression and maximum
likelihood estimation methods, and the parameters are verified to come to an agreement with the collected
data of the Weibull model.
57
Table 1. Faulty data packets.
58
First, establish a linear equation: Both sides take the logarithm at the same time:
y = ax b (5) 1
lnln = mlnt − mlnη (13)
1− F (t )
The estimated value of parameters a and b are
calculated by substituting the sample observation In the linear regression fitting calculation, we
values ( x1 y1 ) , ( x 2 y 2 ) ,…, ( x n y n ) into the Equa- must first verify the linear relationship between the
tion (5). Each ( x i y i ) can yield a linear regression variables x and y, calculated by Equation (14):
parameter estimation:
∑ x y − nxy
n
yˆi ˆ i
ax bˆ (i 1,2, , n)
1,2, (6) ρ= i i ix
= 0.9885 ≈ 1
(∑ i ∑ y
n n
1
− i =1 i
2
− nyy 2 ) (14)
The difference between the sample observation
value yi and the parameter estimation value ŷ i is:
Therefore, the calculation can be a = 0.8924,
yi yˆi yi ˆ i
ax bˆ (i 1,2, , n) (7)
b = −9.5455. Then it can be drawn that m = 0.8924,
η = 44,198.08.
Equation (7) expresses the degree of deviation
between the estimated value ŷ i and the observed 2.3.2 Maximum likelihood estimation
value yi. The smaller the deviation, the better the In the experiment, the probability function of the
fitting degree between the estimated value and the population is p(t; θ), θ ∈ A, where θ is the vec-
actual value, and the more accurate the result is. tor composed of several unknown parameters, A
The concept of residual r is used to denote the is the vector space of the parameters, which can be
cumulative sum of squared deviations: obtained by θ. x1, , x n is the observed value of
the sample in the test, since the samples in the test
r (a, b) ∑
n
( yi ˆ ˆ )2 (8)
i =1 i are from the population, and when the total truth
value is unknown, the value at which the probabil-
The least square method is adopted to obtain ity of occurrence of the observation in the possible
the optimal solution of the estimated value: maximum of the possible values of θ is taken as
the estimated value estimate. In this case, the prob-
( )
r aˆ, bˆ minr (a, b) (9) abilities of the joint samples are treated as a func-
tion of θ as a likelihood function of the sample,
By solving the partial derivative of r with respect denoted as (θ; x1,,xx n ).
to a, b, and making it zero, we get: Usually L(θ) is abbreviated:
⎧ ∂r n
L (θ ) L (θ x xn ) = p ( x θ ) p ( x θ ) ⋅ ⋅
⎪ ∂a = −2∑( yi − axaxi − b )xi = 0 n
⎪
⎨
i =1
(10) p ( xn θ ) ∏p (x θ )
i (15)
⎪ ∂r = −2 ( y − ax
n i =1
⎪⎩ ∂b ∑i =1
i axi − b ) = 0
Then the probability of the sub-sample in the
adjacent domain can be estimated as:
Solution can be obtained:
(∑ ) ∏ p ( xi ) Δxi
n
⎧ n
xy nxy
p i =1
(16)
⎪aˆ = i =1 i i
⎪
⎨
⎪
(∑ n
x2
i =1 i
nx 2 ) (11) In order to find the maximum value of
θˆ = θˆ ( x1, ,x n ) , since the change of Δxi is not
⎪⎩ bˆ y x∠affected by the function θ, it must satisfy:
By linearising the Weibull distribution of the two
parameters, the data points can be approximated by
L θˆ() maxθ ∈A L (θ ) (17)
straight line fitting. From the probability distribu-
tion function of the Weibull distribution, we get: Then θ̂ is the maximum likelihood estimation
of θ. When we need to determine the unknown
⎛t⎞
m
parameters of the distribution model as θ1, , θ m ,
1 ⎜ ⎟
= e⎝ η ⎠ (12) we can get the expression of maximum likelihood
1− F ( ) estimation:
59
() ∏
L ′ θˆ
n
i =1
p ( xi ;θ1, ,θ m ) (18)
That is, Fn(x) is a sufficient estimate of F(x)
when the number of samples n is large enough.
Let x1, , xn be the sample observations of the
By making the Weibull distribution probability continuous distribution function F(x). Assum-
density expression into (18), we can get: ing H0 : F ( ) F0 ( ) , alternative hypotheses
H1 : F ( ) ≠ F0 ( ) .
m −1 m
m⎛ t⎞ ⎛t⎞ Inspection procedure:
( ) = ∏ i =1
−
L′ ( ) = ∏ i =1
n ⎝ η⎠
⎜ ⎟ e (19) 1. Assuming that the assumption H0 : F(x) = F0 (x)
η ⎝η⎠
is accepted, the alternative hypothesis H1 : F(x)
≠ F0 (x) holds;
Since lnx is a monotonic increasing function of 2. Building random variables:
x, the maximum value for L(θ) is equivalent to the The maximum deviation Dn between the theo-
maximum for lnL(θ). Therefore, it is often used retical distribution F(x) and the empirical distribu-
to solve the maximum likelihood estimation of θ tion Fn(x) is taken as the difference degree:
from inL(θ), and we can get the likelihood equa-
tion, that is:
Dn sup ∞ F ( x ) − Fn ( x ) = max δ i (23)
1≤ii n
dL (θ ) dlnL (θ )
= 0 or =0 (20) 3. Given the significance level α, we get the rejec-
dθ dθ
tion domain,, where we take α = 0.05
Take the logarithm of both sides. Then let the { }
P Dn > Dn = α , then the rejection domain is
first partial derivative of m, η be 0, and the likeli- Dn > Dn,α
hood estimate of the parameter: 4. Dn,α and Dn are compared, if Dn > Dn,α, the
assumption H0 : F ( x ) = F0 ( x ) is rejected, or
⎛ m⎞ the assumption is accepted.
L ( x; m,η ) lnL‘ ( x; m,η ) nln ⎜ ⎟ + The K-S test is used to estimate the parameters
⎝η⎠
m obtained by the two estimation methods. The
n
xi n
⎛x ⎞
( m −11) ∑ ln − ∑⎜ i ⎟ results are shown in Table 3.
i 1 η i 1⎝η⎠ It can be seen that the Dn of the parameters esti-
mated by the linear regression and maximum like-
⎧ ∂L n n
1 n
− ∑[ ]=0 lihood methods are less than D(n,α), therefore the
⎪ ∂m = m + ∑ η i =1 original hypothesis H0 is accepted, which means
⎪ i =1
⎨ (21) that the faulty mileage data of the two methods
⎪ ∂L n 1 n
= − + 2 ∑xi m = 0 are in line with the two parameters of Weibull dis-
⎪⎩ ∂η η η i =1 tribution. At the same time, it can be obtained that
the Dn of the linear regression method is smaller
Solving the equation can obtain the likelihood than that of the maximum likelihood method, and
estimated value of m, η. According to the maxi-
mum likelihood estimation method, two param- Table 3. K-S Test of parameter estimation.
eters can be obtained, which are m = 1.0480,
η = 37068.93. The linear regression method and Dn Dn,α
maximum likelihood method of the Weibull distri-
bution parameters obtained are shown in Table 2. Linear Regression 0.0428 0.2980
Maximum Likelihood 0.1075
∞
P{li sup−∞ F ( x ) − Fn ( x ) = 0} = 1 (22)
n →∞
m η
60
whether the estimated distribution in the linear which estimates the value of the parameters in a
regression method is closer to the distribution of direct way and proves that the distribution model
the actual data sample needs further research. fits the engine failure data well.
The results of the two methods are tested on the
Weibull probability map, and it can be found that
the estimated values of the two methods can gener- REFERENCES
alise well the distribution trend of the sample data,
and the fitting effect of the linear regression is better. Lianglong Shao, (1994). Research on life distribution law
of diesel engine, 1994, (2), 55–58.
Toscano, R., & Lyonnet, P. (2008). Online reliability pre-
3 CONCLUSION diction via dynamic failure rate model, 2008, 57(3),
452–457.
Wang, Z. (2008). Theory and Method of Dynamic Reli-
We mainly focus on the failure mileage reliability ability Modeling of Components and Systems. Shen-
modelling of the diesel engine. The first step is yang: Northeastern University.
to establish a two-parameter Weibull distribution Wang, Z. (2010). Failure Rate Calculation of Parts and
model. The distribution trend of the two-param- Systems Based on Load—Strength Interference. Bei-
eter Weibull distribution model is obtained by jing: Beihang University, 35–37.
arranging the data, and the two-parameter Weibull Xiang, Y., Chen, G., & Ding, L. (2008). Reliability design
distribution model is selected as the fitting model. and experiment of engine, 2008, 33(2), 131–133.
Then the parameters of the distribution of the Xie, L., & Zhou, J. (2004). System level load-strength
interference based reliability modeling of auto fan
least squares method and the maximum likelihood system. Reliability Engineering and System Safety,
method are prepared to estimate a third method 2001(3), 33–37.
of K-S test, a graph plotted by these two methods,
61
Mechanical, manufacturing, and process engineering
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Analysis of metal structure cracks on the miter gate of the ship lock
Panpan Zhang
China Waterborne Transport Research Institute, Beijing, China
Key Laboratory of Logistics Equipment and Control Engineering, Beijing, China
Jiahai Zhou
China Waterborne Transport Research Institute, Beijing, China
ABSTRACT: With the development of water transportation, the ship lock is playing a more and more
important part. The miter gate is one of the most significant facilities for the ship lock. In this paper, dif-
ferent kinds of miter gate for the ship lock gate were introduced, and the characteristics of the miter gate
were summarised. The reasons for the metal structure crack were analysed and measures were put forward
to solve the problem.
Keywords: Metal structure; Crack; Miter gate; Ship lock; Stress gauge
Figure 1. The Three Gorges ship lock. Figure 2. Different structures of miter gates.
65
metal cracks can be found in the conjunction of the
primary beam flange plate and the stiffened plate. At
the same time, the crack occurs a lot in the underwa-
ter part. When cracks are found, measures such as
repair welding, as shown in Figure 6, should be taken
to avoid further damage to the metal structure.
In order to solve the problem, the crack has to
be cleaned and re-welded. In addition, reinforcing
plates, as shown in Figure 7, are welded to improve
the situation of the miter gate.
However, metal cracks still emerged in the con-
nection area between the reinforcing plate and the
flange plate of the primary beam, as shown in Fig-
ure 7. According to comparison between different
66
miter gates in different ship locks of the Gezhouba,
stress concentration in the welding area was found
to be the main reason for this. In the design of a
miter gate, stress concentration should be taken
into consideration and measures should be taken
to reduce the structure stress concentration.
Metal structure cracks have a great influence on
the safety of the miter gate. Therefore, it is neces-
sary to monitor the crack growth under the water. Figure 10. The procedure of stress gauge mounting.
Different methods of metal structure monitor-
ing, such as acoustic emission testing, are shown
occupies the dominant position in the sensing
in Figure 8. A stress gauge, eddy current testing
field and is now studied focusing mainly on the
and so on can be used. But for underwater struc-
demodulation technology and novel applications.
ture monitoring, a reliable method has to be cho-
In this paper, the fibre Bragg grating stress gauge
sen. Compared with different testing methods, the
was chosen to set up the monitoring system for the
stress gauge is an easy way to monitor the condi-
miter gate. The FBG stress gauge will be arranged
tion of the miter gate.
along the welding seam. When the stress gauges are
As shown in Figure 9, there are different types of
mounted, steps should be taken as shown in Figure 10.
stress gauges, such as the electric resistance strain
The signal acquisition system is placed in the
gauge and the Fibre Bragg Grating (FBG) stress
control room. Through the stress data, the condi-
gauge. According to the application condition of the
tion of the miter gate can be obtained and perti-
miter gate, the light signal of the FBG stress gauge is
nent repairs can be carried out.
preferable when applied to an underwater structure.
The fibre gratings have an extensive use in the
fields of optical communication and optical sens-
4 CONCLUSION
ing. As sensing cells, they can transduce physical
quantities like strain, temperature, etc., and have
As water transportation develops rapidly, ship locks
attractive merits such as being small and light,
play a huge role. The miter gate is an important ele-
resistant to corrosion, immune to electromag-
ment for the ship lock. Different miter gates for ship
netic interference, etc. Among fibre gratings, FBG
locks were introduced in this paper, and the char-
acteristics of the flat type and the circular arc type
miter gate were discussed. Taking the miter gate
used in the Gezhouba, the reasons for the metal
structure crack were analysed and measures were
put forward to solve the problem. The FBG stress
gauge can be mounted on the surface to evaluate the
preliminary condition of the miter gate. It should
be pointed out that the condition evaluation of the
whole miter gate is a systematic project and more
Figure 8. The schematic diagram for acoustic emission measures need to be taken in the future.
testing.
REFERENCES
Li, Z., et al. (2000). Fiber Bragg grating strain sensor
with drift compensation for smart structures. Proceed-
ings of SPIE, 4223, 131–134.
Liao, P., (2009). Review on research of lock capacity at
inland waterway locks. Hydro-science and Engineer-
ing, 3, 34–38.
Zhang, P., & Li, H. (2015). Design of a vibration moni-
toring system for the hoisting machine in ship locks.
Advances in Computer Science Research, 2164–2167.
Zhang, Y. (2013). Safety test technology and evaluation
method study on miter gates of ship lock. Zhejiang Uni-
versity, 2013.
Zingoni, A. (2005). Structural health monitoring, dam-
age detection and long-term performance. Engineer-
Figure 9. Stress gauges. ing Structures, 27(12), 1713–1714.
67
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Zhijiang Zhang
Ningbo Navigation aid Department of Donghai Navigation Safety Administration (DNSA) MOT Zhejiang,
China
Hongwei Dai
Donghai Navigation Safety Administration (DNSA) MOT Shanghai, China
Haiquan Chen
Dalian Maritime University, Dalian, China
ABSTRACT: This paper proposed the design of a wave-piercing buoy based on a columnar buoy.
Six middle pontoons are used in this new type of buoy to obtain a larger wet surface area, which can
increase the resistance and resilience of the buoy in the water. The buoy is made of Ultra-High Molecular
Weight Polyethylene (UHMWPE) to reduce the weight, which can improve its natural frequency to avoid
resonance with the waves. This paper also uses the ANSYS-Hydraulic to analyse the performance of dif-
ferent schemes to improve the performance and survivability of buoys.
69
In formula 1, W‘0 is the heave natural frequency
of the buoy, ρ is the density of seawater, A0 is the
waterline area of the buoy and M is the weight of the
buoy. To avoid buoy resonance with the waves,
the natural frequency should be kept away from
the main energy frequency of the wave (QU Shao
chun, 2010). Research shows that the main energy
frequency of the wave is mostly distributed in the
low-frequency part, so the buoy’s natural frequency
should be improved to avoid resonance. According
the formula 1, reducing the quality or increasing
the area of the waterline, can improve the buoy’s
inherent period, reduce the heave motion ampli-
tude and improve the performance significantly.
This paper puts forward the design scheme Figure 1. Heave RAO of six-pontoon design.
of ‘wave-piercing buoy’ based on the traditional
columnar buoy, in which the number of intermedi-
ate pontoons will be increased, and their diameter
reduced to obtain a larger wet surface area, which
can increase the resistance and resilience of the
buoy in the water, and reduce the swing angle.
70
Figure 4. Roll RAO of 500 mm design. Figure 8. Roll RAO of 650 mm design.
Outer Inner
diameter diameter Length Thickness
Name (mm) (mm) (mm) (mm)
71
3 THE ANALYSIS AND VERIFICATION 3.2 RAO response analysis
OF THE BUOY
The RAO response curves of the buoy in the six
degrees of freedom are obtained by mathematical
3.1 Determination of parameters
modelling and numerical simulation using the fre-
After completing the design, the basic parameters quency domain analysis method (RyuS, 2006). The
of the buoy should be calculated to ensure its reli- main forms of motion that affect the performance
ability, including the centre of gravity, centre of of the buoy are heave, roll and pitch, because of
buoyancy and initial stability distance. the buoy structure form complete symmetry in the
The centre of gravity is the mass of the centre of plane of the horizon, so its rolling and pitching
the buoy, calculated by the product of the gravity of response is consistent. The RAO response curves of
each component and its respective centre of gravity, the heave and buoy of the traditional column buoy
then divided by the total weight of it as follows: and wave-piercing buoy are given when the wave
direction is 0°.
n
It was found from the curve that the wave-pierc-
∑M Z i i ing buoy has an inherent period of about 5.3 sec-
ZG = i =1
n
(2) onds, which can effectively avoid the wave main
∑M i
energy period. The heave RAO of the wave-piercing
i =1 buoy is smaller than the traditional one, the overall
trend of the movement increases with decreasing
M is the gravity of the component, Z is the cen- wave frequency. It can be concluded that the wavy
tre of gravity of the component. buoy has excellent performance in the heave direc-
The buoyancy of the buoy is the centroid of vol- tion when the wave period is large. Observing the
ume, calculated by the product of the volume of roll RAO curves of the wave-piercing buoy, it is
drained water and its centroid which is divided by found that the magnitude of the roll direction is
the buoy total drainage volume as follows: very small, which means there is no obvious reso-
nance phenomenon in the rolling direction.
m
∑V Z i i
Zv = i =1
m
(3)
∑Vi
i =1
Name ZG ZV Gm
72
4 CONCLUSION REFERENCES
The wave-piercing buoy in this paper used multi- Berteaux, Goldsmith, Schott. (1977). Heave and Roll
pontoon design, and was processed by UHMWPE, Response of Free Floating Bodies of Cylindrical
therefore its wet surface area is larger and lighter than Shape. WHOI Technical Report 77–12.
the traditional columnar buoy. The result of hydro- Dai Honglei, Mou Naixia, Wand Chunyu, Tian Maoyi
Development status and trend of ocean buoy in
dynamic analysis of this new type of buoy shows that China. Meteorological, Hydrological and Marine
the magnitude of the RAO amplitude in the heave instruments. Draft Rep 17th IALA Conference on aids
and roll direction is very small. It can be concluded to navigation.
that the performance and survivability in hard sea Malcolm, N. e-Navigation: the role of visual aids to
conditions of the wave-piercing buoy are superior to navigation.
those of traditional buoys and can effectively meet QU Shao chun, Zheng Kun, WANG ying min. (2010).
the needs of navigational and ocean monitoring. Analysis and Simulation of Spar buoy M otion. Com-
puter Simulation. 006: 363–367.
Ryu, S, Duggal A.S., Heyl, C.N., et al. (2006). Prediction
of deep water oil offloading buoy response and exper-
ACKNOWLEDGEMENTS imental validation. International Journal of Offshore
and Polar Engineering. 16(4): 290–296.
This work was supported by the Fundamen- Wang Bo, Li Min, Liu Shi xuan, Chen Shi zhel, Zhu
tal Research Funds for the Central Universities Qinglin, Wang Hong guang. Current status and trend
(313201 6356, 3132016345, and 3132016344) and of ocean data buoy observation technology applications.
Natural Science Foundation of Liaoning Province Wang J CH. (2013). Ocean data buoy: Principles and
(20150 20132). engineering. Beijing: Ocean Press.
73
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Liren Chai
China Academy of Aerospace Aerodynanics, Beijing, China
Keywords: Pose; Cartesian space; Vision guided; Industrial manipulator; Tenuous shaft
2 GETTING STARTED
75
3 POSE ESTIMATION FOR TENUOUS Related functions in the robot toolbox are
SHAFT encapsulated in modules and the simulation
model is established in the MATLAB/Simulink
The image of the tenuous shaft end is acquired environment, shown in Figure 3. Since downward
by orthogonal binocular vision in this paper. The plugged in grid plate belongs to linear path plan-
fundamental principle of pose estimation is shown ning after the pose of tenuous shaft is adjusted
in Figure 1. The end centre point M is made the by robot end gripper. Therefore, the simulation
feature point. Then, the end image is processed in input is a linear path and the simulation time set
order to obtain the pixel position of the feature up is 2 seconds. The tracking result is shown in
point and the orientation angle of the projection Figure 4.
line in the image frame. Furthermore, according to From the vertical displacement tracking curve,
the intrinsic and extrinsic parameters of the cam- it is known that the Cartesian space closed-loop
era, the position and orientation of the point M control system can demand the robot end effector
in world frame Ow – XwYwZw are computed. The to track the desired linear trajectory with a relative
detailed calculating process can look up the lit- error of 0.32%.
erature numbered 6 in which the pose estimation
methods of the tenuous shaft parts are proposed
(Chai, 2016). 5 EXPERIMENT AND RESULT
76
between the host computer and the robot control- time. The current pose and desired pose are com-
ler is used by series port RS232. The images of the puted through model match and feature extraction
tenuous shaft end and fixed grid plate are captured so as to obtain their relative pose error. Also, the
by the orthogonal binocular vision system. Then, Cartesian space motion instructions are planned.
they are processed by the host computer in real Then the motion instructions are transmitted into
the robot controller aiming at demanding the robot
to move along with a planned trajectory, namely,
completing the plug-in action. Eventually, the
automated assembly task of the tenuous shaft with
vision guided robots based on three-dimensional
pose is achieved
Xw Yw Zw α β γ
Parameter
No type mm mm mm ° ° °
77
6 CONCLUSION Brogardh, T. (2007). Present and future robot con-
trol development: An industrial perspective. Annual
The Cartesian space closed-loop control method Reviews in Control, 31(1), 69–79.
is presented in this paper after the tenuous shaft Chai, L.R. (2016). Research on assembly technology of
nuclear rods based on binocular vision. Harbin: Harbin
parts poses are estimated by the vision system. Institute of Technology.
Simulation results show that the proposed method Jia, B.X., et al. (2015). Visual trajectory tracking of
can track the planned linear trajectory well in industrial manipulator with iterative learning con-
advance. Also, assembly experiment results reveal trol. Industrial Robot: An International Journal, 42(1),
that the vision system has a high inspection speed 54–63.
and the manipulator has a high positioning accu- Navarro, J.L., et al. (2015). On-line knowledge acquisition
racy, which can meet assembly requirements. In and enhancement in robotic assembly tasks. Robotics
conclusion, the overall process can be applied in and Computer-Integrated Manufacturing, 78–89.
all kinds of industry fields where precise shaft Ren, B.Y., et al. (2017). A method for measuring 3D pose
of assembly end of long shaft part using orthogonal
parts are assembled automatically with industrial binocular stereovision. Journal of Harbin Institute of
manipulators guided by machine vision. Technology, 49(1).
REFERENCES
78
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Xiaohe Deng
School of Automotive Engineering, Wuhan University of Technology, Wuhan, China
Hubei Province Key Laboratory of Modern Automotive Technology, Wuhan University of Technology,
Wuhan, China
Hubei Collaborative Innovation Center for Automotive Components Technology, Wuhan University of
Technology, Wuhan, China
ABSTRACT: The meshing position of gear in the actual meshing process would deviate from the theo-
retical position, which is called gear engagement misalignment. The gear engagement misalignment could
lead to changes in actual meshing characteristic of gear, and then influence gear’s meshing capability.
Therefore, it is necessary to analyse the actual meshing situation of gear in detail for gear design. This
paper aims at the three typical meshing misalignment forms of gear, using finite element method to estab-
lish a gear meshing model, and analysing gear contact ratio, contact stress distribution and size of contact
zone, and the contact stress of gear in different meshing misalignment values. Then the impact of the
meshing misalignment on gear meshing rule is analysed.
79
3 MATHEMATICAL MODEL misalignment. It can be seen that when there is no
meshing dislocation, there is uniform load distri-
Both driving and driven meshing gear have the bution on tooth width direction, and the maxi-
misalignments caused by the deformation of sys- mum stress of the gear is at the end of gear width
tem. Thus the amount of misalignments are the with a maximum of 222.768 MPa.
integrated for the both dislocation. Assuming that
one of the meshing gear displacement quantities
is zero, another gear displacement quantity for 4 MESH MISALIGNMENT INFLUENCE
the two gear integrated dislocation. The detailed LAW OF GEAR ENGAGEMENT
operation is as follows: transfer the amount of
misalignments of a gear pair into one of the dis- 4.1 Gear parallel misalignment effect on the law
location of the gear, for there is no deviation in of gear engagement
the position of a gear benchmark position, the
The parallel misalignment of meshing gear will
gear as a benchmark, another gear relative to the
lead to changes of the centre distance of gear
benchmark gear mesh displacement quantity to a
shaft. In theory, the change of the centre distance
certain extent, the meshing gear for integrated dis-
will lead to slight interference of external diameter
location. Since the meshing of gear tooth surfaces
of gear, thus leading to the change of tooth profile
touch each other, the gears will mesh in a plane.
of gear contact ratio. Due to the reduction of cen-
Therefore, the relative displacement quantity can
tre distance, the contact area will be slightly nar-
be used to make a pair of meshing gears mesh-
rowed, leading to a small transverse contact ratio
ing displacement quantity into a gear relative to
increase. The transverse contact ratio calculation
another without dislocation of the gear meshing.
formula is:
The parameters of adopted meshing gear pair
are shown in Table 1.
The finite element method is used to establish εα [ 1
(t n α a1 tan tan α a ) +
tan 2
(t n α a 2 tan tan α a )] / 2
the corresponding model of the meshing gears.
Applying load and boundary condition, the con- where, αa is the pressure angle, satisfying formula
tact stress diagram of the driving gear when
the pair meshes in the node positon is shown in αa = ( α / a′ )
Figure 1. Figure 1 is the case of no meshing
where, a′ is the actual centre distance, a is the the-
Table 1. Parameters of meshing gear pair. oretical centre distance. It can be seen that when
cent distance is reduced, contact ratio increases. If
Driving gear Driven gear there is a parallel misalignment of 5 μm, the reduc-
tion of centre distance will lead to tooth profile
Number of tooth 19 19 contact ratio increasing from 1.463 to 1.463, up
Normal modulus (mm) 2.87 2.87 0.1%, so this change is very small and usually can
Normal pressure angle (°) 22.69° 22.69° be ignored. Centre distance can be thought of as
Tooth width 16 16 the involute tooth profile is not sensitive, parallel
Addendum coefficient 1.002 1.002
misalignment have less effect on the gear mesh-
Tip clearance coefficient 0.364 0.364
ing gears, the gear contact ratio as the meshing
and slight changes in the quantity of dislocation,
smaller influence on the change of the gear mesh-
ing state.
80
in the load distribution in the tooth width direc- enon, and the gear is prone to stress and damage.
tion, assuming the maximum dislocation value On both sides of the gear end face, the value of the
of one gear side is 10 μm. Figure 2 is the contact contact force is low. Although the load on one end
stress diagram of the corresponding driving gear of the gear width is reduced, along the direction of
when the gear pair meshes in the node position. the tooth width theload is covered.
Figure 2 shows the case of 10 μm mesh misalign- Tooth contact stress along the tooth width is
ment. Inn the dislocation cases, there are partial shown in Figure 4. In line with the trend of the
loads on the width direction presented obvious, contact force, with the increment of displacement,
side gear on the edge of the maximum value is the lines of contact stress are shown as the “see-
284.135 MPa, and the biggest stress rises by 27% saw” form. Among them, there is a fixed point near
in comparison to the no dislocation cases in the centre of gear width. If there is no mesh dis-
Figure 1. The length of the gear meshing contact placement misalignment, the contact stress of gear
line still covers the whole gear width. central symmetry is slightly larger, on both sides of
If we select the maximum mesh misalignment the end face of the contact stress. When the mis-
values from 0 μm to 25 μm by 5 μm intervals, alignment value is not zero, close to the maximum
Figure 3 shows the corresponding driving wheel displacement quantity for the position of the max-
contact force distribution along the gear width. imum contact stress of the position, (as shown in
We can see that when the misalignment is zero, the Figure), and the meshing area is consistent.
gear tooth width direction of the distribution of
contact force is symmetric, and with the amount
4.3 Gear space angle misalignment effect on the
of dislocation increasing, gear on one side of the
law of gear engagement
contact force increases, and the other side of the
contact force is reduced. The total contact force is The gear meshing condition is not the same when
constant. The gear in the inhomogeneity of tooth there are angle misalignments of gear axis which
width direction load causes partial load phenom- are not in the same plane. Due to angular mis-
alignment, the gear outside diameter will also twist
correspondingly. Assume that the maximum dis-
location value is 10 μm, which is caused by gear
space angle misalignment. Figure 5 is the contact
stress diagram of the corresponding driving gear
when the gear pair meshes in the node position.
In the gear space angle misalignment cases, par-
tial load on the width direction load is obviously
presented, side gear on the edge of the maximum
value is 382.007 MPa, and the biggest stress rises
by 71.5%. In this situation, the contact line of the
meshing gear deviates to one side of the tooth
width, which cannot cover the entire gear width.
It can be concluded that with the increment of dis-
location, meshing area gradually shift to one side,
and the effective areas decrease greatly.
Figure 2. The contact stress diagram (10 μm gear paral-
lel misalignment).
Figure 3. Contact force diagram under different gear Figure 4. Contact stress diagram under different gear
parallel misalignment values. parallel misalignment values.
81
Figure 7. Contact stress diagram under different gear
Figure 5. The contact stress diagram (10 μm gear space space angle misalignments.
angle misalignment).
82
increases to a certain amount, the no-load situation of a finite element model for stress analysis of gear
happens gradually in the tooth width side direction. drives with localized bearing contact. Mechanism and
Gear axis space angle displacement quantity is larg- Machine Theory, 46, 765–783.
est for the influence of the gear mesh, in the actual Huang, C., Wang, J.X., Xiao, K., Li, M. & Li, J.Y. (2013).
Dynamic characteristics analysis and experimental
gear design, gear system should be fully considered, research on a new type planetary gear apparatus with
the deformation of the gear meshing displacement small tooth number difference. Journal of Mechanical
quantity control in a reasonable range, in particular Science and Technology 27(5), 1233–1244.
to control the third form of meshing misalignment. Litvin, F.L. & Fuentes, A. (2004). Gear geometry and
applied theory (2nd ed.), Cambridge: Cambridge
University Press.
ACKNOWLEDGEMENTS Litvin, F.L., Fuentes, A., Gonzalez-Perez, I., Carvenal,
L., Kawasaki, K. & Handschuh R.F. (2003). Modified
The research is supported by the Fundamen- involute helical gears: computerized design, simulation
of meshing and stress analysis. Computer Methods in
tal Research Funds for the Central Universities Applied Mechanics and Engineering, 192, 3619–3655.
(WUT: 2016IVA039). Litvin, F.L., Lian, Q.M. & Kapelevich, A.L. (2000).
Asymmetric modified spur gear drives: reduction of
noise, localization of contact, simulation of mesh-
REFERENCES ing and stress analysis. Computer Methods in Applied
Mechanics and Engineering, 188(1–3), 363–390.
Gonzalez-Perez, I. Iserte, J.L. & Fuentes, A. (2011). Smith, J.D. (2003). Gear noise and vibration (2nd ed.).
Implementation of Hertz theory and validation New York: Marcel Dekker.
83
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Jingyuan Bao
Naval Military Representative Office, China Ship Development and Design Center, Wuhan, China
ABSTRACT: A framework of modelling and simulation for tractor-aircraft system is presented in this
article. A dynamic model for tractor-aircraft system is established and then a controller for the driver is
also established. Simulations and analyses for the tow tractor-aircraft system are conducted. The simula-
tion model can follow the given path well. It is expected that the research is useful for tow tractor in design
and manufacturing.
85
and traction is particularly important. In order The tire force Q is included in the generalized
to reduce the development risk of the system, it force described above. Fiala tire model is a widely
is necessary to carry on dynamic modeling and used tire force model, this paper is the use of this
simulation analysis before the tractor is used, and model. Fiala model of vertical force in the formula
design a reasonable traction route.
Fz i { Fzzkk + Fzc } (4)
( ) 2
q v where, Fx U × Fz , Fx 2 = 4 × Ss zCslip , U is the fric-
U F
M( q )v Q( q v ) ΦqT ( q,t )λ (1) tion coefficient, Ss is the longitudinal slip, Scritical is
0 = Φ ( q,t ) the longitudinal slip threshold, Cslip is the slip rate.
The lateral force in the Fiala model is calculated
Among them, q v ∈R n are the generalized by:
coordinates and the generalized velocity, respec-
tively, λ ∈R m are the Lagrangian multipliers. ⎧−U
U Fz × ( − H ) sign ( ) α < α critical
Fy = ⎨ (6)
M represents the generalized mass matrix, Q rep- ⎩−U
U i (
Fz × sign ) α > α criticala
resenting the generalized force, Φ representing the
complete constraint. In the formula, α is the lateral deflection angle,
Because high order integration methods are lim- α critical is the lateral deflection angle threshold
ited by stiffness problems, low-order integration value, H = 1 − C3α×UU× tanFα , Cα is the lateral stiffness
methods such as Newmark, HHT are often used z
coefficient. The positive moment in the Fiala
to solve equation (1). HHT-I3 algorithm (Dan N., model is calculated by:
2009) for solving the equation (1) the specific for-
mat as shown in equation (2) below.
U Fz R ( H ) H 3 sign( ), α < α critical
⎧2U
Tz = ⎨ (7)
h 2
⎩0, α > α critical
qn = q n + hq n + [( )a n
+ an+ ]
2
q n = q n + h [( − )a n
+ γ a n +1 ] The equations (1–7) above form the multibody
α dynamics model of the tractor-aircraft system and
( ) ( )
1
( ( ) ) +1+ + − =0 the solution format. Specific modeling and solu-
1+ α +1
+
1+ α n
where h is the integral step size, a n+1 is the approxi- 2.2 Driver control model
mation q , α , β and γ are parameters. Note In order to move the tractor-aircraft system in
that Eq. (2) contains a Newton iteration for a n+1 accordance with the set traction trajectory, a driver
and λn +1 and the corresponding Jacobian is model must be established to form a closed-loop
control of the tractor-aircraft system. Whether
⎡ 1 ⎤ the preview link is included in the model can be
+ ˆ T
J HHTI 3 = ⎢ 1 + α ⎥
q
(3) divided into compensation tracking model and
⎢ ⎥ preview tracking model.
⎣⎢ q ⎥⎦
In this paper, the driver’s preview tracking
model is adopted. Driver preview tracking model
Among them, block diagram shown in Figure 1. In the figure, P
(s), F (s) and B (s) respectively indicate the preview
(
Pˆ = β h 2 M ( q ) q T
q λ Q ) q
γ h Q q link, forward correction link and feedback esti-
mation link of the driver, which are the expected
86
3.2 Simulation conditions and results
Select a common traction operation as a simu-
lation case. In the case where the deck has inde-
pendent movement in three directions, the traction
operation shown in Fig. 3 is set and the tractor
traction aircraft is moved from right to left. The
Figure 1. The driver’s preview tracking model. simulation results of the traction operation are
shown in Figure 4 and Figure 5.
trajectory information. The preview link is based Figure 4 is the default traction trajectory and
on the current vehicle motion state the estimated the actual traction comparison results. The solid
future time vehicle position information is esti- trajectory is the preset trajectory, and the broken
mated by estimating the link estimated vehicle line is the actual traction trajectory. The maximum
state information at a future time, the deviation trajectory deviation between them is 294 mm,
of the two estimated values, the control informa- which indicates that the trajectory tracking algo-
tion applied to the vehicle, and the position of rithm has enough precision.
the trajectory for the vehicle. The preview track- Figure 5 shows the traction force when the trac-
ing model is more in line with the actual handling tion operation is calculated. As can be seen from
characteristics of the driver because the driver
always follows the road path in advance during the
usual driving process. The driver control model
is established by ADAMS SUBROUTINE. The
driver model is expressed in terms of VARSUB
to control the steering angle input of the vehicle
model to control the direction of the vehicle.
3 NUMERICAL SIMULATION
(t ) = ax i ( f xt )
y (t ) = ay i ( f yt) (8)
z (t ) = az i ( f zt )
87
accuracy of the dynamic model. The research
method in this paper has a positive significance for
the quick verification of the traction scheme.
REFERENCES
88
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Zhijie Li
School of North China Institute of Aerospace Engineering, Langfang, China
Chao Cui
Beijing Spacecrafts, Beijing, China
ABSTRACT: The 6061 aluminium alloy is widely used in the aerospace field due to its advantages of
high toughness, good forming performance and lack of deformation after forming. However, its manu-
facturing lacks theoretical guidance. Taking the 6061-T6 aluminium alloy with thickness of 1 mm as the
research object, the stress and strain of the machining area established by the mechanical model are first
analysed. The influence of the main process parameters, such as tool radius, tool depth ΔZ, half-apex angle
α on the sheet thickness distribution and forming quality using Abaqus/explicit, are then analysed. The
stress and strain data are obtained by numerical simulation. By comparing the numerical simulation with
the theoretical value, it shows that a big tool diameter and a small tool depth make the thickness distribu-
tion more uniform, but it is necessary to consider the reasonable choice of processing efficiency. Half-apex
angle has a great effect on sheet thickness distribution—the smaller the half-apex angle is, the larger the
sheet thickness thins. When the forming angle exceeds the sheet metal forming limit, cracking occurs.
Keywords: Incremental sheet forming; Numerical simulation; 6061 aluminium alloy; Formability;
Abaqus/explicit
89
aluminium, 08 AL and other materials, but there has
been less analysis of the forming of 6061 aluminium εA
2
3
ε ij ε ij = (
2 2
3
)
ε t + εθ2 + ε φ2 =
2 rt
ln 0
3 Rmt
(1)
alloy sheet, which has excellent forming properties.
In this paper, based on the 6061-T6 aluminium alloy
sheet, firstly the mechanical model to analyse the εθ—tangential strain
stress and strain of the contact zone between the εφ—meridional strain
tool head and the plate is set out. Then the finite εt—thickness strain
element model is established, analysing the effects of ε —equivalent strain
tool diameter, spacing, and half angle on the form- t0—initial sheet thickness
ing process, and making the comparison between t—sheet thickness
simulation results and the theoretical analysis. Rm—curvature radius of the mid surface of
sheet
2 MECHANICAL MODEL
2.2 Stress analysis of the stress area
ESTABLISHMENT
In Figure 2, the tangential force σθ is obtained by
2.1 Stress zone strain analysis the equilibrium equation, the constitutive equation
and the hardening criterion equation. Radial force
As shown in Figure 1, the deformation of the plate
σφ and thickness direction stress σt, and finally
in the area A, the contact area between the plate
get the equivalent stress for the stress state of the
and the tool head, is subject to tension and bend-
region A, the same element, the equilibrium equa-
ing. Hence the amount of deformation is the sum of
tion should be satisfied in the thickness direction
the amount of tensile deformation and the amount
(Xu & Liu, 1995):
of bending deformation. Taking into account the
pure bending without stretching, if the bending is
not too large, the surface of the middle position of
the plate can be approximated as a neutral plane.
By stretching the overlap effect, the original neu-
tral plane will be offset inward. The inner surface
is under tensile strain induced by tension and the
compressive strain caused by bending. The outer
surface is under tensile strain caused by stretch-
ing and bending. Without taking into account the
bending deformation, the tensile strain caused by
the tension can be expressed by the tension strain
of the neutral layer. According to the volume
invariance hypothesis, ε t + ε φ + εθ = 0 plane strain
assumption εθ = 0, get the equivalent strain of the
regional a unit ε A (Fanga et al., 2014).
90
⎛ dφ ⎞ direction, until the sheet material is extruded out
(σ t
+ d σ t ) (r + dr ) ⋅ d φ σ t r ⋅ d φ σ φ ⋅ sin
⎝ 2⎠
⋅ dr of the desired shape result.
(2) A finite element analysis model is established in
⎛ dφ ⎞
( )
− σ φ + d σ φ ⋅ sin
⎝ 2⎠
⋅ dr = 0 Abaqus software, which is shown in Figure 4(a). The
sheet size is 120 mm × 120 mm 6061 aluminium alloy,
with density 2.9 g/cm3. The specific performance
In area an any element in the thickness direction parameters are shown in Table 1 and the stress-strain
of stress σ tA can be expressed as: curve (Sun et al., 2014) is shown in Figure 5. The tool
head and the plate are arranged as a discrete rigid
C0 ⎡⎛ rt0 ⎞ ⎛ rtool t0 + t t0 ⎞ ⎤
n n +1
σ tA = ⎢⎜ ln − ln ⎟⎠ ⎥ (3)
n + 1 ⎢⎝ Rmt ⎟⎠ ⎜⎝ Rmt ⎥⎦
⎣
1
(σ ) + (σ )
2 2
σ AT
φ − σ AT AT
φ − σ θAT
2
n (6)
3 ⎛ rt0 ⎞
+ (σ )
2
− σθ = C0 ln
2 ⎝ Rmt ⎟⎠
91
Figure 5. Stress and strain curves of 6061-T6 alumin-
ium alloy.
92
Figure 7. Relationship between the stress of the plate
and the radius of the tool head. Figure 8. Strain PEEQ cloud images of different tool
tip radius.
son being that the smaller the radius of the tool 1 mm and 2 mm. It can be seen from Figure 9 that
head, the more obvious the stress concentration, when the layer spacing is 0.5 mm, the maximum
and as the stress becomes larger, the material is equivalent stress of sheet material is 338.9 MPa;
prone to rupture. R = 4 mm, smaller radius, the when the layer spacing is 1 mm, the maximum
stress concentration is more obvious. When the equivalent stress is 383.7 MPa; when the layer
radius of the tool head is increased, the contact spacing is 2 mm, the maximum equivalent stress
area between the tool head and the sheet metal is is 416.9 MPa. It can be seen from the above that
increased, and the stress concentration of the con- the maximum value of the equivalent stress of the
tact between the tool head and the sheet is relieved. plate is proportional to the distance between the
From Figure 8 we can see that there is a law of layers. As the increase of layer spacing will make
strain; the maximum area of strain is in the main the vertical feeding distance of tool head in con-
deformation zone, and the maximum strain of the tour processing of each circle increases, which
three is not large. leads to the contact area of the tool head with
the sheet increases, which required the extrusion
pressure of forming of sheet metal increases, the
4.2 Effect of layer spacing
equivalent stress of the sheet increases by extrusion
In the process of sheet metal forming, the two pro- pressure increasing.
cess parameters, the vertical displacement and the From Figure 10 we can see that the layer spac-
horizontal offset, are considered in the planning ing respectively is 0.5 mm, 1 mm and 2 mm. The
process. The drop in the vertical direction of the strain in the main deformation zone of sheet
tool head each walk round is layer spacing. When metal forming is basically the same. To sum up,
machining the same vertical depth, the larger the the other process parameters are unchanged, and
layer spacing, the less time it is used. This paper in with an increase in the layer spacing, the equivalent
the case of other process parameters unchanged, stress of the plate also increases. However, with an
making forming simulation of conical parts with increase in forming tensile stress, the sheet will
different layer spacing. The tool head diameter is have reaction force on the tool head, influencing
d = 6 mm, the forming depth is 20 mm, the layer the tool head service life. Smaller layer spacing can
spacing ΔZ is respectively selected as 0.5 mm, make the machining process take longer to form.
93
Therefore, in the process of sheet metal processing,
both the forming precision and the quality should
be considered and to achieve processing efficiency
the best layer spacing should be selected.
0.5 1 26.560
1 1 450
Figure 10. Strain PEEQ cloud images of different 1.5 1 56.310
layers.
94
part along the radial compared with the half angle
α = 45° and α = 26.56°56 . From the curve we can
see that the forming thickness of α = 26.56° is less
than the thickness of α = 45° and thickness distri-
bution of α = 45° is uniform after forming. The
thickness of deformation zone of the sheet is in the
range of 0.67 0.71 mm. This is consistent with the
plate thickness theory of t t0 sin α (Zhou et al.,
2003; Li et al., 2011). When α = 26.56°56 , the thick-
ness of the plate forming area is larger change, the
thinnest position has occurred. In the actual pro-
cessing, there is need to select the right half angle
which cannot exceed the material forming limit
angle.
5 CONCLUSION
95
cannot exceed the limit angle in the actual Li, J.C., Zhang, X., & Pang, S.T. (2011). Experimental
processing. Otherwise there may be material and numerical research on thickness variation of
rupture, so the half angle can be used as an dieless sheet metal incremental forming. Hot Working
evaluation index of the sheet metal incremental Technology, 40 (7), 1–4.
Mo, J.H., Ye, C.S., & Huang, S.K. (2002). Numerical con-
forming limit. trol incremental forming technology of metal sheet.
Aviation Manufacturing Technology, (12), 25–27.
Sun, L.M., Tian, N., & Cong, F.G. (2014) Study on the
REFERENCES strain hardening exponent of 6016 aluminium alloy
sheet for automotive body. 42, 11.
Arfa, H., Bahloul, R., & Belhadj, S.H. (2013). Finite ele- Xu, B.Y., & Liu, X.S. (1995). Application of elastic and
ment modelling and experimental investigation of sin- plastic mechanics. Tsinghua University Press.
gle point incremental forming process of aluminium Zhang, Y., Li, P.Y., & Wang, Q.D. (2015). Numerical
sheets. Springer, 6, 483–510. analysis of single point incremental forming based on
Ayed, L.B., Robert, C., & Delamézière. (2014). A simpli- ABAQUS. Mechanical Strength, 37(1), 99–103.
fied numerical approach for incremental sheet metal Zhou, L.R., Xiao, X.Z., & Mo, J.H. (2003). Research on
forming process. Engineering Structures, 75–86. NC incremental forming process of sheet metal parts.
Fanga, Y., Lu, B., Chen, J., Xu, D.K., & Ou, H. (2014). Journal of Plasticity Engineering, (4), 27–29.
Analytical and experimental investigations on defor- Zhou, L.R. (2004). The study of forming mechanism
mation mechanism and fracture behavior in single and process of NC incremental metal sheet (disserta-
point incremental forming. Journal of Materials Pro- tion). Wuhan: Huazhong University of Science and
cessing Technology, 1503–1515. Technology.
Hu, J.B., Zhou, J., & Li, J.C. ect. (2011). Research on sheet Zhuang, Z., & You, X.C. (2009). Finite element analysis
metal incremental forming process based on numerical and application based on ABAQUS. Tsinghua Univer-
simulation. Hot Working Process, (15), 76–78. sity Press.
96
Network, communications and applied information technologies
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Zhijian Xie
NC A & T State University, Greensboro, USA
Keywords: wireless communication; pipeline A/D converter; reconfigurable control; precision distribu-
tion; dual-input system
99
2.2 Design of single-input reconfigurable bits of 8, 9, 10, 11, 12, 13, 14. Meanwhile, stages
pipelined ADC that are not involved in contributing to the resolu-
tion of the structure can be shut off, entering to
2.2.1 Single-input pipelined ADC using scaling
sleep mode and saving power consumption.
down technology
Based on the analysis of existing ADC structures
2.2.2 How does a single-input reconfigurable
applied to multi-standard wireless terminals (Van
pipelined ADC work
de Vel H et al., 2008), it is clear that in the design
A reconfigurable entire pipelined ADC works in
of pipelined ADCs, the former stages consume a
this way: First, the system will send FRC to the recon-
greater proportion of the power consumption than
figurable controller to select 6 different states—a,
the latter ones.
b, c, d, e, f, which can be set to 0 or 1 respectively,
For this reason, a novel reconfigurable control
controlling the on and off of the K1-K6 switches
method—scaling down technique—was proposed.
so that the resolution changes according to the dif-
Chen Zhenyu used this method, powering off the
ferent states of the switches.
front-stages. Although this method can reduce the
power consumption in a great proportion, it does
not go for the high-resolution mode. In fact, for 2.3 Design of dual-input reconfigurable ADC
pipeline structure, the requirements of accuracy
2.3.1 The architecture of dual-input
and other performance are different in each stage.
reconfigurable ADC
The first stage requires the highest property, which
The overall architecture of dual-input reconfigur-
almost determines the overall system performance.
able ADC is shown in Figure 2. The dual-input
The overall reconfigurable pipelined ADC
structure can be reconstructed on the basis of
structure is shown in Figure 1.
a 14-bit pipelined ADC by adding some con-
As shown in Figure 1, the single-input recon-
trol logic circuits. The analogue input Vin1 goes
figurable pipelined ADC designed in this paper
through the first S/H circuit, while Vin2 chooses
consists of the following components: a reconfig-
to be sampled by the middle stage (here is the third
urable programmable controller, six precision con-
and fifth stage). S2 is a reconfigurable control sig-
trol switches K1-K6, sample and hold circuit, 10
nal, it is used to select which stage Vin2 is supposed
controllable pipeline stages (1.5 bit/stage), a delay
to enter. Besides, S2 also controls the algorithm in
alignment circuit and a digital correction circuit.
the digital correction circuit, which guarantees
The working state of each stage is controlled by a
programmable state control unit.
The signal FRC is from the system level. Vin is the
analogue input signal. Figure 1 shows that the improved
reconfigurable pipelined ADC is designed on the
basis of 14 stages (1.5 bit/stage) pipeline ADC
structure with an introduced reconfigurable pro-
grammable control module. The proposed design
is able to adjust precision by means of scaling
down the latter pipeline stages gradually, which
can achieve a dynamic change of precision—in the
100
that the two outputs are converted correctly. The From Table 2 we can see that the designed
advantage of this circuit is that only one control single-input reconfigurable ADC can achieve the
signal is used to control all circumstances. required performance in 6 different resolution
modes. Under the requirements of the aforemen-
2.3.2 The algorithm and principle of a dual-input tioned communication standards, its effective reso-
reconfigurable ADC lution almost reaches the ideal value (only less than
In the case of two inputs, we hope to achieve a pre- 0.2 bit), which have met the demands successfully.
cision-assignable mode. That is, the 14 bits of pipe- In addition, the power consumption expression
lined ADC can be distributed to X + (14-X) mode. of the reconfigurable pipelined ADC is as follows
First, the pipelined ADC digital correction algo- (Arias J, 2005):
rithm is as follows:
According to this scheme, we can achieve the cor- PADC nPblock
nP PS / H + PDSP
S PDEC (1)
rect conversion of two inputs by making changes
in the digital correction algorithm. Because of where n is the resolution of the ADC output, Pblock
the spit of a certain bit, the entire resolution will is the power consumed by every stage, PS/H is the
increase one bit. In terms of this dual-input sys- power consumption of the S/H circuit, PDSP is the
tem, total resolution will be 15 bit. power consumption of the reconfigurable control-
The whole control process is as follows: ler, and PDEC is the power consumption of is digital
If the control signal S2 is valid, Vin2 selects to correction circuit.
input from the third stage, passing through the The power consumption curve is shown below
fourth, fifth level up to the tenth. In a similar way, in Figure 4. It can be seen that the circuit has a
S2 cuts off the carry-bit between the second and positive effect on power reduction when the system
third stages, and outputs B20 (before algorithm) does not need high resolution, also it minimises
as the LSB of Vin1, and outputs B31 (after algo- the number of control signals. Power consumption
rithm) as the MSB of Vin2.We obtain Vin1 for 5 is close to linearly proportional to the number of
bit and Vin2 for 10 bit precision. bits, i.e. 8-bit mode consumes about four seventh
If the control signal S2 is invalid, then Vin2 of the power in 14-bit mode. There is no doubt that
selects to input from the fifth stage. So we avoid the power efficiency has been improved.
the addition of B40 and B51, output B40 (before
algorithm) as the LSB of Vin1, and output B51
(after algorithm) as the MSB of Vin2. In this case, 3.2 The performance simulation of a single-input
Vin1 is 7 bit and Vin2 is 8 bit. reconfigurable ADC
As for dual-input reconfigurable ADC, the simula-
tion is under different operating modes, also using
3 SIMULATION Simulink models. The simulation results are shown
in Figures 5 to 8.
3.1 The performance simulation of a single-input From the simulation results, we can see that
reconfigurable ADC when S2 is valid, the actual precision of Vin1 is
Both reconfigurable pipelined ADCs were 4.97 bit and Vin2 is 9.78 bit. When S2 is invalid,
designed in Simulink models and the simulations Vin1 is 7.00 bit and Vin2 is 7.84 bit. Both perfor-
were performed. mances are close to the ideal value.
FRC controls the switches on and off to out- From Figures 5 to 8 we can see that the reconfig-
put distinct accuracy respectively. The simulation urable ADC can achieve satisfactory performance
results are as follows:
101
Table 3. Simulation of two different modes.
4 CONCLUSION
REFERENCES
102
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: With the development of wireless communication technology and the prevalence of Loca-
tion-Based Service (LBS), wireless location technology has become a research hotspot. Among wireless
positioning technologies, TDOA positioning technology, with its high precision and wide range of appli-
cations, has been getting considerable attention. However, the TDOA technique is also easily disturbed by
noise and other interferences, and the accuracy and stability of the technology will be affected. Therefore,
other positioning technologies are needed for a better result. This paper proposes a new TDOA/RSSI
fusion location method based on the idea of the particle filter. Also, this paper proposes a real-time calcu-
lation of the accuracy of TDOA location technology to meet the requirements of the fusion method for
real-time TDOA location and the accuracy range of the results.
103
ference in signal propagation time of each base sta-
⎡ Δx ⎤
tion received. Wherein each base station location is
denoted as ( xi yi , zi ) , and the signal propagation δ = ⎢⎢ Δy ⎥⎥ = (G −1Q −1G )−1G T Q −1b (5)
time difference is multiplied by the speed of light ⎢⎣ Δz ⎥⎦
to find the signal propagation distance difference,
expressed as Losij . If ( x y, z ) denotes the mobile Q is the distance covariance matrix.
station coordinate, then relationship between them After obtaining , Δy, ) , the ini-
( x,Δ
is as follows:. tial value ( , y , ) will be replaced with
( ,y , ) = ( x, y′ + Δy, z ) , then repeat
⎧Los12 ( x − x1 )2 + ( y − y1 )2 + ( z − z1 )2 the entire process until Δx Δy, Δz is below the set
⎪ threshold value and the three-dimensional coordi-
⎪− ( x x2 ) + ( y − y2 ) + ( z − z2 )
2 2 2
⎪Los13 = ( − 1 ) + ( y − y1 ) + ( − 1 )2
2 2 nates of this time are the required coordinates.
⎪
⎨− ( − 3 )2 + ( y − y3 )2 + ( − 3 )2 (1)
3 TDOA ERROR ANALYSIS
⎪Los = ( x − x )2 ( y − y )2 ( z − z )2
⎪ 14 1 1 1
⎪− (x( x x4 )2 + (y
( y y4 )2 + (z
( z4 )2 In the actual TDOA solution, we cannot always get
⎪... the arrival time difference between the signals of
⎩ different base stations due to the interference of
non-line-of-sight errors and the propagation con-
Take Ri ( x − xi )2 + ( y − yi )2 + ( z − zi )2 , the
dition of the channel. As a result, our signal propa-
equation can be simplified to Losij Ri − R j tij c ,
gation distance difference formula is corrected to
wherein tij ti − t j , the difference in the propaga-
Losij Ri − R j (ti − t j )c + ( i − j )c = (tij +ε iij )c
tion time between the base station i , j received
Wherein, ε i is the error of the arrival time of
by the mobile station.
the signal of the ith road base station. From the
As a recursive algorithm, the Newton iteration
signal propagation conditions it can be seen that
requires an initial estimated position as the initial
ε i is subject to a Gaussian distribution with a
point of the recursion, and then in the recursive
mean of 0 and a variance of σ i2 .
process by TDOA measurement error of the local
After this correction, the original solve equation
least-square solution, until the error is less than
Gδ b updates to Gδ nnew bnew
the set threshold when the output. Take the ini-
tial set position of the mobile station ( , y , ) . G =
According to Taylor, by an expansion of Losij , we
⎡ x x′ x x′ y1 y′ y2 y′ z1 z′ z2 z′ ⎤
can get: ⎢ R′ − R′
1 2
− − ⎥
R1′ R2′ R1′ R2′
⎢ 1 2
⎥
F ( x, y, z ) = F ( x , y′, y ) + F ′(x
( x , y , z )Δx ⎢ x x′ x − x′ y1 − y ′ y3 − y ′ z1 − z ′ z − z′ ⎥
+ F ′(x
( x , y , z )Δy + F ′(x
( x , y′, z )Δz (2) ⎢ ′ −
1 3
− −
3
⎥
+ o( x , y , z ) ⎢ R 1
R′ 3
R1′ R3′ R1′ R′ ⎥ 3
⎢ x − x′ x − x′ y1 − y ′ y4 − y ′ z1 − z ′ z − z′ ⎥
Ignoring the higher-order small quantities, the ⎢ 1
−
4
− −
4
⎥
⎣ R′ R′ R1′ R4′ R1′ R′ ⎦
formula Gδ b can be obtained. In this formula:
1 4 4
(6)
G= ⎡ct12 + cε12 (R2′ − R1′) ⎤
⎡ x x′ x x′ y1 y′ y2 y′ z1 z′ z2 z′ ⎤ bnew = ⎢ct13 + cε13 (R3′ − R1′) ⎥ = b + ε ρ (7)
⎢ R′ − R′ − − ⎢ct + cε (R4′ − R1′) ⎥⎦
1 2
⎢ x x′ x − x′ y1 − y ′ y3 − y ′ z1 − z ′ z − z′ ⎥
⎢ ′ − − − ⎥
1 3 3
⎢ x − x′ x − x′ y1 − y ′ y4 − y ′ z1 − z ′ z − z′ ⎥
(8)
⎢ 1
−
4
− −
4
⎥ ⎢⎣ Δz ⎥⎦ ⎢⎣ ε z ⎥⎦
⎣ R′ 1
R′ 4
R1′ R4′ R1′ R′ ⎦ 4
(3) ⎡cε12 ⎤
⎢cε ⎥
⎡ct12 − (R2′ R1′) ⎤ Wherein ε ρ = ⎢... ⎥ is the measurement error
13
⎢ ⎥
b = ⎢ct13 − (R3′ R1′) ⎥ (4) ⎢ cε ⎥
⎢ct − (R ′ R ′) ⎥ ⎣ 1i ⎦
⎣ 14 4 1 ⎦
⎡ε x ⎤
Can be solved by the least squares method matrix, ⎢⎢ε y ⎥⎥ is the result error matrix, ε x ε y , ε z
⎢⎣ ε z ⎥⎦
104
are the projection vector of the error between the The trace of matrix A is the variance of the final
mobile station position coordinate and the actual result of the TDOA localisation.
position coordinate of the mobile station in three At last, we complete the derivation of the
dimensions. TDOA precision real-time calculation formula,
Due to: and through this formula, we can calculate the
variance range of the TDOA positioning result
δ new = (G 1Q −1G ) 1G T Q 1bnnew in real time by the spatial position of each signal
= (G G ) 1G T Q 1 (b + ε ρ )
(G 1Q 1G) (9) transmitting base station and the statistical charac-
teristics of the signal propagation time, in order to
use TDOA precision as the basis for fusion of the
⎡ Δx ⎤ particle filter method to lay the foundation.
δ = ⎢⎢ Δy ⎥⎥ = (G −1Q −1G )−1G T Q −1b (10)
⎢⎣ Δz ⎥⎦
4 PARTICLE FILTERING METHOD BASED
ON TDOA AND RSSI RESULTS
We can obtain:
The core of the particle algorithm is to scatter par-
⎡ε x ⎤ ⎡ Δx ⎤ ticles near the possible true result positions, and
⎢ ε ⎥ =δ ⎢ y⎥ ( Q ) Q ερ then calculate the probability density function of
⎢ y ⎥ new ⎢ ⎥ (11)
⎢⎣ ε z ⎥⎦ ⎢⎣ Δz ⎥⎦ each particle as the correct result according to the
results of the TDOA and RSSI localisation meth-
ods. Then eliminate the less likely particles, the
When the time of arrival of each signal is inde- probability of high-particle re-sampling and the
pendent of each other, there is: total number of particles in the same conditions to
increase the number of high probability particles,
Q Q −1 = E (12) and then the weight of particles and particle coor-
dinates to be weighted fusion results.
The error formula can be simplified as: As a result of cost constraints, a smart terminal
positioning of mobile devices with only low accu-
⎡ε x ⎤ racy of the compass and gyroscope is commonly
⎢ε ⎥ = (G 1G
G))−1G T ε ρ used, which cannot simply rely on these two sen-
⎢ y⎥ (13)
sors to locate. Therefore, the combination of the
⎢⎣ ε z ⎥⎦
actual situation and the use of the compass as a
predictor of particle position transfer equation
The error covariance matrix of the arrival time parameters is a better choice.
difference location can be: The state of the particle filter can be described
as:
⎛ ⎡ ε x ⎤⎞ ⎛ ⎡ε x ⎤ ⎞
Cov ⎢ε y ⎥ = E ⎜ ⎢⎢ε y ⎥⎥ ⎡⎣ε x
A C ⎜
⎜
⎢ ⎥
⎜⎝ ⎢ ε ⎥⎟⎠
⎣ z⎦
⎟
⎟ ⎜
⎜⎝ ⎢ ε ⎥
⎣ z⎦
εy ε z ⎤⎦⎟
⎟
⎟⎠
{ xk
yk
f ( xk −1 ) + uk −1
h( xk ) + vk
(15)
(
= E (G T G )G T ε ρ ((G T G )G
)G T ρ )T ) Wherein the f hh((⋅) are the particle filter state
transition equation and observation equation,
= (G T G )−1G T E ( ρ ρ
T
)G (G T G )−1 where xk represents the system state, yk repre-
sents observations, uk represents process noise, vk
⎡ D( 12 ) 0 0 ⎤ represents observation noise. Use:
T⎢
= c (G G ) G ⎢ 0
2 1 T
D(( 13 ) 0 ⎥⎥
⎢⎣ 0
×G (G T G )−1
0 D( 14 ) ⎥⎦
{
X k x :k = {x0 , x1,, xk }
Yk y :k = {yy1 , yk }
(16)
105
that the observation yk is only with statement xk , sions, ( xt , yt ) is a position in the Cartesian
the state at k time. In these two assumed conditions, coordinate system. The results of TDOA are
the importance of particle filter probability density subject to a Gaussian distribution with a mean
function q( x0:k:k | y :k ) can be decomposed into: of ( xt , yt ) and a variance of σ t2 . Then obtain
the RSSI calculation result ( xr , yr ) , and from
q( x0:k:k | y :k ) q( x0:k: | y :k 1 )q( xk | x :
:k , y :k ) (17) the RSSI channel conditions get σ r2 .
2. Assume that the time is k, when k = 1, initial-
Let the system state is a Markov process, and ise, take two positions in the plane as the two-
the system at a given state of each independent dimensional uniform distribution of a particle.
observations, there Each particle has a weight average w1i = N1
When k is not 1, go directly to the next step.
k 3. Since the system is mainly used for human
p( x0:k ) = pp(( x0 ) ∏ p( xi | xi −1 ) (18) localisation, the motion model of the particle is
i =1
the same as the human walking model, and can
k
be described by the following equation:
p( y1:k:k | x :k ) ∏ p( yi | xi ) (19)
i =1
⎡ x i k ⎤ ⎡ x i k −1 ⎤ ⎡ sin(θ + θ ) ⎤
⎢ yi ⎥ = ⎢ yi ⎥ + ⎢cos(θ + θ ) ⎥ * ( L+Δ
ΔL) (23)
Therefore, the posterior probability density ⎣ k ⎦ ⎣ k −1 ⎦ ⎣ ⎦
function can be expressed as a recursive form:
Wherein L is the average set in the step length,
p( yk | x :k: ,Y
Yk ) p( x :k | Yk 1 ) θ is determined by the direction of movement
p( x0:k | Yk ) = of the compass. ΔL is the error, Poisson distri-
p( yk | Yk −1 )
bution of ΔL L ~ P ( L ), Δθ normal distribu-
p( yk | x :k , ) p( | x0:k , ) p( ||Y
Yk −1 ) tion with mean zero. We can predict the position
= k 1 k :k
: 1
p( yk |Y
| Yk −1 ) of the particle at k by the position of the parti-
cle at time k−1.
p( yk | xk ) p( | xk −1 ) p(( x0:k:k | ) 4. In step 1, we got ( xr , yr )σ t2σ r2 .
= k k 1
p( yk |Y
| Yk −1 ) Due to the system of observational equations:
(20)
⎡ xk ⎤ ⎡uktx ⎤
Recursive form particle weight w (i )
can be Zkt = ⎢ ⎥ + ⎢ ⎥ (24)
k ⎣ yk ⎦ ⎣ uktyt ⎦
expressed as:
⎡uktx ⎤
p( x0( i:k) | Yk ) Wherein ⎢ ⎥ is noise, meet variance σ t2 ,
wk( i )∞
q( x0( i:k) | Yk ) ⎣ uktyt ⎦
mean 0 Gaussian distribution.
p( yk | xk( i ) ) p( xk( i ) | xk( i−)1 ) p( x0( i:k) 1 | Yk 1 )
= Therefore, for the TDOA results, there is a back-
q( xk( i ) | x0( i:k) 1,Yk )q( x ( i:k) 1 | Yk −1 ) (21) ward probability density:
p( yk | xk( ) ) p( xk( ) | k( )1 )
= wk( −)1 1 ⎛ (x xk )2 + ( yt yk )2 ⎞
q( xk( ) | x0( :k: ) −1, k ) Pt (Zkt | X k ) exp ⎜ − t
σ t 2π ⎝ 2σ t 2 ⎟⎠
106
σ 2
P ( Zk | X k ) * Pt (Zk | X k )
σ t2 σ r2
(27)
σt 2
+ * Pr (Zk | X k )
σ t2 σ r2
σ r2
When σ t2 σ r2 is less than the threshold value, we
believe that the results from the TDOA are no
longer credible, then take:
Similarly, when this is less than the threshold Figure 1. Comparison of accuracy of positioning
value, whichever: results.
107
It can be found that the result of the particle Deng, Z., & Wang, X. (2013). The Kalman positioning
filter is better than that of the TDOA, RSSI and algorithm based on TDOA/AOA, Proceedings of 2013
variance weighted fusion in the walk test. World Congress on Industrial Materials-Applications;
It can be concluded that the particle filter Products; and Technologies WCIM 2013 V739), 6.
Xia, J., Deng, Z., & Gao, L. (2015). The research on inte-
method can improve the robustness of the locali- grated communication networks and satellite naviga-
sation process compared with using the TDOA tion positioning technology. Proceedings of 2015 5th
method or the RSSI method alone, so that the International Conference on Computer Sciences and
jitter of the positioning results is gentler and the Automation Engineering (ICCSAE 2015), 5.
accuracy of the positioning result is improved. Yang, Y., & Deng, Z. (2015). Research of TDOA
NLOS error compensation interpolation position-
ing, Proceedings of 2015 2nd International Workshop
ACKNOWLEDGEMENTS on Materials Engineering and Computer Sciences
(IWMECS 2015), 6.
Yin, L., Deng, Z., Xi, Y., Dong, H., Zhan, Z., & Gao, Z.
The National High Technology Research and (2013). A satellite selection algorithm for GNSS multi-
Development Program (“863” Program) of China system based on pseudorange measurement accuracy.
(No. 2015 AA124103) and (No.2015 AA124101). Proceedings of 2013 5th IEEE International Confer-
ence on Broadband Network & Multimedia Technol-
ogy, 4.
REFERENCES
108
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Tiange Yu
Department of Biology, Hong Kong Baptist University, Hong Kong, China
Yang Chen
Life Science Institute, Central South University, Changsha, China
Bowen Zhang
Shenzhen Middle School, Shenzhen, China
ABSTRACT: Analysis of DNA sequence data is important for comprehending the meaningful biologi-
cal information buried in the data set. Due to the high time and computational complexity, developing
efficient and effective analysis methods for processing large-scale DNA sequence data has always been a
crucial task in the post-genomic era. With the recent progresses in computer science and electrical engi-
neering, multiple novel methods have been introduced to the biology regime and applied to the DNA
sequence analysis. These methods significantly improved the efficiency and accuracy of DNA sequence
data analysis. Among these methods, data mining technique, which uncovers the information hidden in
the data, is regarded as one of the most promising and effective approach. This paper provides a compre-
hensive review of recent progress on DNA sequence analysis technologies, and discusses the use of data
mining method in this area.
Keywords: DNA sequence; Bioinformatics; Data mining; Computer science; Biological sequence
109
promoter sequences and phylogenetic footprint-
ing. For instance, Oligo-Analysis, which is based {Γ αβ (d )} {Γ (d ) Γ (d ) Λ Γ (d ) Γ (d )})
on coregulated-genes-promoter-sequences, could (1)
be used to identify the motifs efficiently in Sac-
charomyces cerevisiae. Gibbs sampler, phyloge- Each of these coherence functions are defined
netic-footprinting based that able to do the work as two nucleotides α and β separated by
within several genes, could be used to identify
motifs in proteobacterial genomes. Smith-Water-
man, based on both aspects, was used to identify
{
d Γ αβ (d ) } Pααβ (d ) Pα ∗ Pβ (2)
the motifs in Archaea (M. K. Das and H. K. Dai, where Γ αβ (d ) is the probability that α and β sepa-
2007). Given the availability of numerous meth- rated by d appears together. Pα and Pβ are the den-
odologies, evaluation of various algorithms has sity of α and β on the DNA sequence, given by
becoming increasingly important since the per-
formance of methods varies when they dealing
with motifs with different features for different
⎧Pα
⎪
∑P
β
αβ
110
Table 1. DNA sequence data analysis methods developed in the early years.
Pattern enumerate Enumerate all possible patterns. Algorithm may run MOTIF (H. O. Smith,
method based on in exponential time. Suitable for small scale analysis; 1990), etc.
exhaustive search inefficient for large scale analysis.
Applying prune Reduce computational complexity to fit typical DNA Pratt (I. Jonassen, 1997),
strategy sequences. Allows searching for longer and more TEIRESIAS (I. Rigoutsos
in the search complicated patterns than simple exhaustive search and A. Floratos, 1998), etc.
Iterative heuristic Converge to a local maximum instead of the global Gibbs (C. E. Lawrence,
method optimum. May lose some useful patterns, but is almost 1993), COPIA (C. Liang,
guaranteed to find a pattern as good as possible. 2006), etc.
Constructing Useful to process patterns that are difficult to be EM (C. E. Lawrence and A.
stochastic model described by a simple deterministic pattern and is expressed A. Reilly, 1990), MEME
in form of stochastic model. (W. N. Grundy, 1997), etc.
Methods using Using information from sequence alignment, or global EMOTIF (C. G. Nevill-
additional properties of a sequence. Suitable for analyzing Manning, 1998), etc.
information sequences that contain biological meanings
shines light on the study of the correlation among 4.1 DNA sequence pattern mining
genes which are separated by short- and long-
DNA sequence patterns carries important bio-
spaces. The historic as well as recent analysis meth-
logical meaning in the survival and evolution of
ods is summarized as in Table 1 (Y. X. Yangyong
species, and the identification of such patterns
Zhu, 2007).
is a crucial task for DNA sequence data analy-
sis. Researchers have developed sequence pattern
mining algorithms which are highly efficient and
4 APPLICATION OF DATA MINING suitable to analyze large data sets. Sequence pat-
TECHNIQUES IN THE ANALYSIS tern mining was firstly proposed by Agrawal and
OF DNA SEQUENCE DATA Srikant in 1995 (R. Agrawal and R. Srikant, 1995).
Then in 1996, Srikant et al. described the General-
Since the scale of DNA sequence data sets gener- ized Sequential Patterns mining (GSP) algorithm
ated today is commonly in the order of Megabits (R. Srikant and R. Agrawal, 1996). The GSP algo-
to hundreds of Gigabits, the study and analysis rithm introduced time and conceptual constraint
on such sequences are limited by computational and searches the patterns within the dataset with
capabilities. The analysis methods developed in the a bottom-up Breadth-First-Search (BFS) method.
early years (pre-1990 s) have been shown as inef- However, it has the disadvantage that it generates
ficient for processing these long DNA sequences a large set of patterns which reduces the overall
(A. Brazma, 1998). Therefore, techniques devel- efficiency. Regarding to this issue, Pei et al. pro-
oped in computer science regime have been used to posed the PrefixSpan algorithm which is based on
accelerate the analysis speed and improve the anal- growing pattern sets (J. Han, 2001). The PrefixS-
ysis accuracy. Some of these techniques include pan method reduces the computational complexity
big data analysis, statistics, artificial intelligence, by dividing the overall data set into smaller subsets
machine learning, etc. Data mining, combining the and performing data mining on these individual
advantages in these techniques and aiming at dig- subsets.
ging the hidden information behind the symbols It is soon realized that bottom-up search strat-
and sequences, has been the mainstream method egy such as the GSP algorithm tend to generate
for processing the DNA sequence data. short candidate patterns that are not frequently
The development of efficient and effective DNA used. Therefore, one direction to improve the
sequence data mining methods can be divided efficiency is to remove the infrequently used pat-
roughly into three stages, i.e. statistics-based data terns during the searching process. As another
mining methods; general data mining methods; approach, Ester et al. proposed an up-bottom
and specialized DNA sequences-oriented data algorithm named ToMMSA in 2004 (M. Ester
mining methods (Y. X. Yangyong Zhu, 2007), as and X. Zhang, 2004). To ensure finding all use-
shown in Table 2 ful patterns, ToMMSA firstly perform an initial
The main research areas of DNA sequence bottom-up search to find the maximum length
data mining technology includes the following five of the frequent patterns. Then, starting from the
aspects: sub-sequences that are shorter than the maximum
111
Table 2. Different stages of the development of DNA sequence data mining techniques.
Stage 1: statistics-based Effective at capturing sequential Inefficient for large-scale data set; result
data mining methods constraints present in the data lacks interpretability
Stage 2: general data Effective at the analysis of coherence DNA data need to be mapped to a suitable
mining methods between genes in large scale data sets form; accuracy is usually compromised
Stage 3: Specialized DNA Effective at capturing sequential characteristics,
sequences-oriented and are scalable for large data sets.
data mining methods Especially good at processing DNA
sequences that contains noise
length, the algorithm reduces the size of the pat- 4.3 DNA sequence clustering analysis
tern set by removing infrequent sequences. The
DNA sequence clustering analysis is an effec-
maximum number of candidate patterns generated
tive approach to identify the classifications of
by this method is n * l * (l − ) / 2 which is O ( nl 2 )
unknown DNA sequences, and to reveal the corre-
where 1 is the length of the longest sequence in the
lation between sequences, and therefore to analyze
pattern set, and n is the number of patterns. This is
the function of DNA sequences.
far less than the candidate patterns generated
nerat by a
nerate
bottom-up search method, which is O Σ ( )
m
112
based methods is comparably satisfying in achiev- REFERENCES
ing a good balance among the effectiveness of
characteristic extraction, the accuracy of classifi- Agrawal, R. and R. Srikant, “Mining sequential pat-
cation, and the computational complexity. terns,” in Data Engineering, 1995. Proceedings of the
Eleventh International Conference on, 1995, pp. 3–14.
Agrawal, R., T. Imieliński, and A. Swami, “Mining asso-
4.5 DNA sequence abnormality analysis ciation rules between sets of items in large databases,”
in Acm sigmod record, 1993, pp. 207–216.
DNA sequence abnormality analysis is often Brazma, A., I. Jonassen, I. Eidhammer, and D. Gilbert,
regarded as pre-processing of DNA data min- “Approaches to the automatic discovery of patterns
ing since it can effectively detect abnormal DNA in biosequences,” J Comput Biol, vol. 5, pp. 279–305,
sequences and exclude their negative impact on the Summer 1998.
accuracy of the data mining result. It is an area Bahar, E., “CloSpan: Mining: Closed sequential patterns
that receives relatively less attention than the other in large datasets,” 2003.
aspects of analysis; however, the interest in this C. International., Human Genome Sequencing, “Finish-
area is growing rapidly. For example, Sun et al. ing the euchromatic sequence of the human genome,”
Nature, vol. 431, pp. 931–45, Oct 21 2004.
introduced an abnormal analysis method based on Cheng, Y. and G. M. Church, “Biclustering of expression
Probabilistic Suffix Trees (PST) in 2006 (P. Sun, data,” in Ismb, 2000, pp. 93–103.
2006), which reduced the time and memory cost Day, W. H. and H. Edelsbrunner, “Efficient algorithms
in computation as well as improved the accuracy. for agglomerative hierarchical clustering methods,”
However, there are still many remaining issues in Journal of classification, vol. 1, pp. 7–24, 1984.
this area, calling for more intensive research. Das, M. K. and H. K. Dai, “A survey of DNA motif
finding algorithms,” BMC Bioinformatics, vol. 8
Suppl 7, p. S21, Nov 01 2007.
5 CONCLUSION D’Haeseleer, P., “What are DNA sequence motifs?,” Nat
Biotechnol, vol. 24, pp. 423–5, Apr 2006.
Excoffier, L., P. E. Smouse, and J. M. Quattro, “Analysis
Efficient and effective analysis methods for process- of molecular variance inferred from metric distances
ing huge amount of DNA sequence data has always among DNA haplotypes: application to human mito-
been a crucial task in post-genomic era. Data min- chondrial DNA restriction data,” Genetics, vol. 131,
ing technique, which digs the information hidden pp. 479–91, Jun 1992.
in the data, is regarded as the most promising and Ester, M. and X. Zhang, “A top-down method for mining
effective approach for analyzing large-scale DNA most specific frequent patterns in biological sequence
sequence data. This paper provides a comprehen- data,” in Proc. the Fourth SIAM International Con-
sive review of recent progress on DNA sequence ference on Data Mining, 2004, pp. 90–101.
Gibson, T. J., H. Dinkel, K. Van Roey, and F. Diella,
analysis technologies, and discusses the use of data “Experimental detection of short regulatory motifs
mining method in this area. in eukaryotic proteins: tips for good practice as well
Key questions and major challenges in DNA as for bad,” Cell Commun Signal, vol. 13, p. 42, Nov
data mining lies in multiple aspects. The first key 18 2015.
question is to better understand the so-called Guralnik, V. and G. Karypis, “A scalable algorithm for
“junk” DNA sequences that prevails in eukaryotic clustering sequential data,” in Data Mining, 2001.
genomes. Given the revelation of diverse functions ICDM 2001, Proceedings IEEE International Confer-
carried out by LincRNA, we expect the expedi- ence on, 2001, pp. 179–186.
tion of research in this area with the help of data Grundy, W. N., T. L. Bailey, C. P. Elkan, and M. E. Baker,
“Meta-MEME: motif-based hidden Markov models
mining techniques. Secondly, apart from predict- of protein families,” Comput Appl Biosci, vol. 13, pp.
ing functions from sequence similarity, various 397–406, Aug 1997.
case studies have shown drastic functional changes Han, J., J. Pei, B. Mortazavi-Asl, H. Pinto, Q. Chen, U.
upon gene duplication, subfunctionalization and Dayal, et al., “Prefixspan: Mining sequential patterns
neofunctionalization. It is of great importance to efficiently by prefix-projected pattern growth,” in pro-
use data mining techniques to compare and con- ceedings of the 17th international conference on data
trast motif changes across species in evolutionary engineering, 2001, pp. 215–224.
time. Hoinka, J., E. Zotenko, A. Friedman, Z. E. Sauna, and T.
Given with the rapid development in statistical M. Przytycka, “Identification of sequence-structure
RNA binding motifs for SELEX-derived aptamers,”
and computational methods, it is expected that Bioinformatics, vol. 28, pp. i215–23, Jun 15 2012.
interdisciplinary research combining bioinformat- Jonassen, I., “Efficient discovery of conserved patterns
ics, data mining and molecular biology is going using a pattern graph,” Comput Appl Biosci, vol. 13,
to uncover more meaningful results with high- pp. 509–22, Oct 1997.
throughput, serving as a doorway to future devel- Kaufman, L. and P. J. Rousseeuw, Finding groups in
opment in human medicine and basic biological data: an introduction to cluster analysis vol. 344: John
research. Wiley & Sons, 2009.
113
Liang, C., “COPIA: A New Software for Finding Con- related proteins,” Proc Natl Acad Sci U S A, vol. 87,
sensus Patterns in Unaligned Protein Sequences,” pp. 826–30, Jan 1990.
UWSpace, 2006. Srikant, R. and R. Agrawal, “Mining sequential patterns:
Lawrence, C. E. and A. A. Reilly, “An Expectation Maxi- Generalizations and performance improvements,”
mization (EM) algorithm for the identification and in International Conference on Extending Database
characterization of common sites in unaligned biopol- Technology, 1996, pp. 1–17.
ymer sequences,” Proteins, vol. 7, pp. 41–51, 1990. Sun, P., S. Chawla, and B. Arunasalam, “Mining for
Lawrence, C. E., S. F. Altschul, M. S. Boguski, J. S. Liu, Outliers in Sequential Databases,” in SDM, 2006, pp.
A. F. Neuwald, and J. C. Wootton, “Detecting subtle 94–105.
sequence signals: a Gibbs sampling strategy for mul- Shendure, J. and H. Ji, “Next-generation DNA sequenc-
tiple alignment,” Science, vol. 262, pp. 208–14, Oct 8 ing,” Nat Biotechnol, vol. 26, pp. 1135–45, Oct 2008.
1993. Wang, J. and J. Han, “BIDE: Efficient mining of fre-
Li, Q., D. Ritter, N. Yang, Z. Dong, H. Li, J. H. Chuang, quent closed sequences,” in Data Engineering, 2004.
et al., “A systematic approach to identify functional Proceedings. 20th International Conference on, 2004,
motifs within vertebrate developmental enhancers,” pp. 79–90.
Dev Biol, vol. 337, pp. 484–95, Jan 15 2010. Wang, K., Y. Xu, and J. X. Yu, “Scalable sequential pat-
Mount, D. W., Bioinformatics sequence and genome tern mining for biological sequences,” in Proceedings
analysis vol. 21–22. New York: Cold Spring Harbor of the thirteenth ACM international conference on
Laboratory Press, 2001. Information and knowledge management, 2004, pp.
Nevill-Manning, C. G., T. D. Wu, and D. L. Brutlag, 178–187.
“Highly specific protein sequence motifs for genome Yang, J. and W. Wang, “CLUSEQ: Efficient and effec-
analysis,” Proc Natl Acad Sci U S A, vol. 95, pp. 5865– tive sequence clustering,” in Data Engineering, 2003.
71, May 26 1998. Proceedings. 19th International Conference on, 2003,
Pantazes, R. J., J. Reifert, J. Bozekowski, K. N. Ibsen, J. pp. 101–112.
A. Murray, and P. S. Daugherty, “Identification of Yang, H., “Review of biological sequence data mining
disease-specific motifs in the antibody specificity rep- techniques,” Journal of Hefei University of Technol-
ertoire via next-generation sequencing,” Sci Rep, vol. ogy, vol. 35, pp. 1212–1216, 2012.
6, p. 30312, Aug 02 2016. Yangyong Zhu, Y. X., “DNA sequence data mining tech-
Rigoutsos, I. and A. Floratos, “Combinatorial pattern nique,” Journal of Software, vol. 18, pp. 2766–2781,
discovery in biological sequences: The TEIRESIAS 2007.
algorithm,” Bioinformatics, vol. 14, pp. 55–67, 1998. Zaki, M. J., G. Karypis, and J. Yang, “Data Mining in
Smith, H. O., T. M. Annau, and S. Chandrasegaran, Bioinformatics (BIOKDD),” Algorithms Mol Biol,
“Finding sequence motifs in groups of functionally vol. 2, p. 4, Apr 11 2007.
114
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: With the development of intelligent transportation, the vehicular smart system has
become a focus of the academic and industrial communities. The routing protocol is one of the most
significant issues in the vehicular heterogeneous network. The paper uses the Dijkstra algorithm to obtain
the optimal routing path. To evaluate the performance of the Dijkstra algorithm, it is compared with the
minimum tree model based on the Prim algorithm. The simulation experiments are based on the MAT-
LAB platform. The experimental results indicate the Dijkstra algorithm achieves the best performance.
115
can provide real-time information to the drivers. 3 DIJKSTRA ALGORITHM
The architecture of a vehicular heterogeneous net-
work is described in Figure 1. The network diagram is described as G (V , E ,W ),
Vehicle networks began in Japan in the 1980s. the node set is defined as V = {v 1,v 2,,v p}, and p
Since this time, vehicular heterogeneous networks is the number of V. E and W denote the edge and
have had important functions in transportation weight of the network diagram, respectively. The
management, detection of road conditions, vehi- fundamental steps are as follows.
cle tracking and transportation safety. A lot of
relevant research has been applied. For example, Step 1: Initialisation.
the Germanic Network on Wheels, the Japanese
Cooperative Group Driving, and the Thinking ⎧ 0, i s
Partner of Mercedes-Benz. ⎪
The protocol of vehicular heterogeneous net- d (vi ) = ⎨wij i s & vs ,vi ∈ E
⎪ ∞,i
works include path generation, path selection and ⎩ , i s & vs vi ∉ E
path maintenance. Path generation is based on the
distribution network and demands from the users. The other nodes are d (v j ) = w j ( j , 2, 3,, n ) ,
Based on the information of network state and and S {v1}, R V -S {v2 ,vv3 , ,v p }. Where wij
service state, the best path should be selected. Path denotes the weight of the edge ( i ,v ,v j ), and d (v j )
maintenance is used to maintain the selected path is the weight of the selected nodes.
(Satyajeet, A. R., & S. S, 2016; Shafiee & Leung, Step 2: Calculate the distance of d (vk ).
2012). Find a node vk , and get d (vk ) = min{d (v j )}. Let
In our work, the path selection is mainly dis- S S ∪{vk }, R V -S .
vj R
cussed. The business requirements, network If R = ∅ , end the algorithm; else go to Step 3.
capacity, network characteristics and operating Step 3: Revise the d (vk ) .
environment would be considered in the routing Get d (v j ) = min{
i {d v j )),,dd (vk ) wkkjj }, and go to
protocol. Step 2.
The vehicle network routing protocol can be The flow diagram is described in Figure 2.
divided into three categories: topological routing,
geographic routing and map routing. Topological
routing is based on the network link state, to real- 4 EXPERIMENTS AND ANALYSIS
ise the data transmission. Geographic routing uses
the near nodes and destination node to develop the In this work, the vehicular heterogeneous network
efficiency of routing. According to the GPS posi- is simulated in MATLAB software. There are ten
tioning system, the nodes obtain the geographic vehicles and one signal tower in the simulation net-
information. The positioning system and electronic work. The VANET is shown in Figure 3.
map are used to obtain the routing information for From Figure 3, we define the connectivity of
the map routing. Besides this, map routing can be the 11 nodes. The connectivity indicates that the
used for path planning. conjoint nodes can communicate with each other.
116
Figure 3. Vehicular ad hoc network. Figure 4. Minimum path routing based on the Prim
algorithm.
Node 1 2 3 4 5 6 7 8 9 10 11
1 1 1 0 1 1 0 0 0 0 0 0
2 1 1 1 1 1 0 0 0 0 0 0
3 0 1 1 0 0 1 0 0 0 0 0
4 1 1 0 1 1 0 1 1 0 0 0
5 1 1 0 1 1 1 1 0 0 0 0
6 0 0 1 0 1 1 0 0 1 0 0
7 0 0 0 1 1 0 1 1 0 1 0
8 0 0 0 1 0 0 1 1 1 1 1
9 0 0 0 0 0 1 0 1 1 0 1 Figure 5. Minimum path routing based on Dijkstra
10 0 0 0 0 0 0 1 1 0 1 1 algorithm.
11 0 0 0 0 0 0 0 1 1 1 1
117
Cheng, X., Yang L., & Shen X. (2015). D2D for intelli-
gent transportation systems: a feasibility study. IEEE
Transactions on Intelligent Transportation Systems
16(4), 1784–1793.
Ding, H., Chang, D.F., & University, S.M. (2014). The
courier vehicle distribution route optimization based
on Dijkstra algorithm. Value Engineering.
Dressler, F., et al. (2014). Inter-vehicle communication:
Quo vadis. IEEE Communications Magazine 52(6),
170–177.
Fan, Y.Z., et al. (2010). An improved Dijkstra algorithm
used on vehicle optimization route planning. Compu-
Figure 7. Minimum path routing based on Dijkstra ter Engineering and Technology (ICCET), 2010 2nd
algorithm (V2V). International Conference on 2010:V3-693-V3–696.
Ghazal, A., et al. (2015). A nonstationary wideband
mimo channel model for high-mobility intelligent
minimum tree model needs five hops to achieve the transportation systems. IEEE Transactions on Intel-
same communication. ligent Transportation Systems 16(2), 885–897.
Khairnar, V.D. & Kotecha, K. (2013). Performance of vehi-
cle-to-vehicle communication using IEEE 802.11p in
5 CONCLUSION Vehicular Ad-hoc Network environment. International
Journal of Network Security & Its Applications 5(2),
In this paper, we use the Dijkstra algorithm to Li, L., Xu, Y., & Ma, L. (2015). Vertical handoff strategy
on achieving throughput in Vehicular Heterogeneous
obtain the optimal routing path in the vehicular Network. Vehicular Technology Conference IEEE, 2015.
heterogeneous network. To evaluate the perform- Liu, P., et al. (2014). Path loss modeling for vehicle-to-
ance of the Dijkstra algorithm, the Prim algorithm vehicle communication on a slope. IEEE Transactions
is compared with it. The communication between on Vehicular Technology 63(6), 2954–2958.
a vehicle and the signal tower, and the inter-vehi- Satyajeet, D., A.R., & S.S. (2016). Heterogeneous
cle network is compared. Simulation experiments approaches for cluster based routing protocol in
indicate that the Dijkstra algorithm is superior to Vehicular Ad Hoc Network (VANET). International
the minimum tree model, based on the Prim algo- Journal of Computer Applications 134.
rithm. In further research, a more complex vehicu- Schurch, B., Hodler, J., & Rodic., A.B. (2015) Advanced
technologies for intelligent transportation systems.
lar heterogeneous network should be evaluated International Journal of Radiation Oncology Biology
with the Dijkstra algorithm. Physics 66(4), 1143–51.
Shafiee, K. & Leung V.C. (2012) Hybrid multi-technology
routing in heterogeneous vehicular networks. EURA-
ACKNOWLEDGEMENTS SIP Journal on Wireless Communications and Net-
working 2012(1), 1–19.
This study was supported by the Guang- Shaw, W.T. (2015). Towards smart cities: interaction and
dong Science & Technology Project (Grant synergy of the smart grid and intelligent transporta-
No.2013B010401006), the Guangzhou Science & tion systems. Smart Grid: Networking, Data Manage-
ment and Business Models, 75–81.
Technology Project (Grant No. 2014 J4100019), Wei, S., et al. (2014). Simulation study of unmanned
the Key Collaborative Innovation Project among aerial vehicle communication networks addressing
Industry, University and Institute of Guangzhou bandwidth disruptions. SPIE Defense + Security Inter-
(Grant No. 201604010001), and Yuexiu Sci-ence & national Society for Optics and Photonics, 11730–41.
Technology Project (Grant No. 2015-CY-003). Xu, Y., et al. (2014). Fuzzy Q-learning based vertical
handoff control for vehicular heterogeneous wireless
network. ICC 2014—2014 IEEE International Confer-
REFERENCES ence on Communications, 5653–5658.
118
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Huayong Sun
College of Command Information Systems, PLA University of Science and Technology, Nanjing, China
Bengbu Automobile NCO Academy, Bengbu, China
ABSTRACT: Put forward by studying decision-making agility to improve Command and Control
(C&C) agility. In the relevant problems of C&C decision-making, incomplete decision information com-
bination problem are studied. In order to realise that the express of decision-making preference can be
quickly and accurately under the condition of incomplete information, this paper proposes a mass func-
tions construction method based on linguistic decision-making information. Then the method of Theory
of Evidence can be used in incomplete decision information combination.
119
Theorem 1 Dempster-Shafer combination rule This formula shows that the relationship
Let m1 m2 ,…, mn be n BPA in the same Frame of between the subjective sensation and the stimu-
Discernment Θ, Focal Elements were A1 A2 ,…, An . lus intensity. In the linguistic decision-making, a
For proposition A(A ⊂ Θ), m(A) indicates the is related to the number g of the used language
reliability of the A after multiple evidence are phrase, and the determination of the value is usu-
aggregated. ally done by the experiment or the expert method,
in particular, when g = 7, a ≈ 1.4. This paper pro-
m ( A) poses a method of transforming linguistic 2-tuple
⎧ 0 ,A = ∅ to mass function as follows. The Frame of Dis-
⎪ cernment is Θ = { }.
=⎨ 1 m1 ( A ) m2 ( A )… mn ( An ), A ≠ ∅
⎪⎩1 − K A1 ∩AA2∑
When the evaluation is (si, ρi), the mass function
…∩ An A
can be obtained by the following formula:
(1)
⎧ a Δ (si i )
−1
M c log R (3) Cp ⎣(
⎡ s1p ρ1p ) (s
p
2
p
2 ) … (s
p
Q )⎤⎦ or
p
Q
120
{
mqp = mqp (∅) mqp ( s ) mqp ( n) mqp ( )}, so 3 CONCLUSION
C p ⎡⎣ m1p m2p … mnp ⎤⎦ . First of all, the paper points out that the core func-
tions of C&C are scientific decision-making, and
Step three: Using the evaluation of all the deci- the participation of people in the decision-making
sion-makers, the decision matrix can be obtained: process leads to an increase of uncontrollable fac-
tors. Therefore, the study of decision-making agil-
⎡ m11 m21 … mQ1 ⎤ ity is of great significance to improve the agility
⎢ m2 m22 … mQ2 ⎥⎥
of C&C. In the problem of C&C decision-making,
C=⎢ the decision information combination problem is
1
.
⎢… … … …⎥ studied under the condition of incomplete infor-
⎢ P ⎥ mation based on Theory of Evidence.
⎢⎣ m1 m2P … mQP ⎥⎦
According to “Weber-Fechner’s law”, put for-
ward a method of constructing mass function
Step four: Combine all the mass functions of based on linguistic decision information. By using
experts. For each alternative, using the synthesis the decision-making method proposed in this
Equations (1) and (2) to combine all the experts’ paper not only can we make the decision expres-
mass functions and then the integrated mass sion quickly and accurately, but also handle the
function of all alternatives can be obtained as incomplete decision information. This method can
m1 m2 ,…, mQ . enhance the response and adaptability of the C&C
Step five: According to the practical significance decision-making, so it can enhance the agility of
of the mass function, mq(s) means the degree of C&C to a certain extent.
support for the alternative and the order of the
alternative set can be obtained.
Through the above five steps, the combina-
tion of incomplete decision-making information, ACKNOWLEDGMENTS
which is expressed by a linguistic method, can be
realised. At the same time, the linguistic method This paper was financially supported by National
is more in line with people’s cognitive psychology, Natural Science Found of China (61174198).
with which the decision-makers can express prefer-
ence as quickly as possible. In the decision-making
process, combined with the relevant knowledge of REFERENCES
psychology, the language information is translated
into a mass function, so the transformation is more Alberts, D.S. (2011). The agility advance—A survival
guide for complex enterprises and endeavors. CCRP
scientific and easy to understand. In the combina-
Publication, 283–448.
tion process, D-S Theory of Evidence has a strong Herrera, F. and Martinez L. (2000). A 2-tuple fuzzy
theoretical basis, so the combined result is of high linguistic representation model for computing with
reliability, also it can deal with incomplete infor- words. IEEE Trans on Fuzzy Systems, 8(6), 746–752.
mation. Therefore, this method, to a certain extent, Li, W.B. (2004). History of Western Psychology. Zhejiang
can improve the agility of C&C decision-making. Education Press.
121
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Jianmei Zhou
School of Electronics and Information, Chongqing Institute of Engineering, Chongqing, P.R. China
Hongsheng Zhang
School of Electronic Engineering, Chongqing University of Posts and Telecommunications, Chongqing, P.R. China
ABSTRACT: This work presents a novel non-Foster matching circuit to improve the radiation of small
loop antennas. The designed non-Foster circuit is achieved using grounded Negative Impedance Con-
verters (NICs), which are based on the operational amplifier (op-amp). A passive matching network is
added to offset the input’s negative inductance and negative resistance of the proposed non-Foster circuit.
The extracted S1P data file of the loaded small loop antenna is used to instead of the equivalent circuit
of an antenna in a traditional integrated design. With the novel designed non-Foster circuit, the loop
antenna matched well at 10 MHz–60 MHz frequency band and its reflection coefficient was less than
−20 dB. The good agreements between simulated and measured results validate the design concept.
123
3 SIMULATION AND MEASUREMENT
RESULTS ANALYSIS
R1
ZIN 1 = − (Rant jX ant )
jX (1)
R2
124
Figure 7. Gain improvement of matched loop antenna.
4 CONCLUSION
ACKNOWLEDGEMENTS
REFERENCES
Figure 6. Comparison of the reflection coefficient of
the matched and unmatched loop antenna. Analog Devices Inc. (2000). “Low Distortion Amplifier,”
AD8009 datasheet.
Hansen R.C. and R.E. Collin (2011). Small antenna
The measured reflection coefficients of the handbook. Hoboken, NJ, USA: Wiley.
matched and unmatched loop antenna are Kraus, J.D., R.J. Marhefka, Translated by Wen Xun
shown in Figure 6. The reflection coefficient of Zhang, Antennas: For All Applications Third Edition
the matched loop antenna is less than −20 dB at [M]. Beijing: Publishing House of Electronic Industry,
10 MHz–60 MHz whilst the unmatched one is 2013: 154–171.
almost 0. It should be noted that the discrepan- Marcellis, A.D., G. Ferri, and V. Stornelli (2007). NIC-
based capacitance multipliers for low-frequency
cies between the measured and simulated results
integrated active filter applications. Proc. Res.
of the matched antenna are strong, probably Microelectr. Elect., 225–228.
caused by the fabrication, measurement devia- Sun Xiaozi, Zhang Qimin (2002). Analog electronic
tion and non-ideal characteristics of the com- technology foundation. Xi’an: Xidian University Press.
mercial operational amplifier. Figure 7 shows the Wheeler, H.A., (1947). Fundamental limitations of small
gain improvement of the matched loop antenna. antennas. Proc. IRE, 35, 1479–1484.
125
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
127
TB (eA − eB )
Δd = ×c (2)
2
128
Table 1. Channels and their corresponding frequencies.
1 3494.4 499.2
2 3993.6 499.2
3 4492.8 499.2
4 3993.6 1331.2
5 6489.6 499.2
7 6489.6 1081.6
129
Figure 5. Total data. Figure 7. Total data.
130
Figure 9. Total data.
131
channels for UWB signals is better than that of Deng, Y. (2014). UWB-based indoor accurate navigation
low centre frequency channels. With the same research and implementation. East China University of
centre frequency, the ranging accuracy of wide Technology.
bandwidth for UWB signals is higher than that Gong, S., & Kong, L. (2011). UWB signal ranging
technology based on delay line model. Journal of
of narrow bandwidth. The experimental results Chongqing University of Posts & Telecommunications.
show that the higher the centre frequency and Hu, L., & Zhu, Z. (2005). Simulation and analysis of
bandwidth of the UWB, the better the accuracy UWB signals is clustering property of indoor mul-
of the measurement. tipath channels. Journal of Nanjing University of Posts
4. The experimental data and the correlation theo- and Telecommunications (Natural Science), 25(6),
ries show that the SDS-TWR method based on 17–21.
UWB is better than a current range system such Kristem, V., & Molisch, A.F. (2014). Coherent UWB
as ZigBee. In appropriate configuration of the ranging in the presence of multiuser interference.
parameters, the error can be achieved within IEEE Transactions on Wireless Communications,
13(8), 4424–4439.
the range of ±10 cm in an indoor complex Liu, J., & Wan, J. (2015). A novel energy-saving one-sided
environment. The current RSSI ZigBee rang- synchronous two-way ranging algorithm for vehicular
ing method is controlled within ±0.5 m, as pro- positioning. Mobile Networks & Applications, 20(5),
posed by Zhang & Song (2011). The RSSI of 661–672.
the ZigBee ranging method has finite precision. Shukla, U.K., & Volos, H. (2008). On the effect of
antenna height on the characterization of the indoor
The SDS-TWR method based on UWB, under UWB channel. Global Telecommunications Confer-
the optimal ranging conditions obtained in the ence, 1–5.
experimental results, shows its excellent ranging Ware, R.H., & Fulker, D.W. (2014). Realtime national
performance in an indoor complex environment. GPS networks for atmospheric sensing. Journal of
Atmospheric and Solar-Terrestrial Physics, 63(12),
1315–1330.
ACKNOWLEDGEMENTS Zhang, C., & Song, X. (2011). Research on the
ZigBee-based RSSI ranging accuracy. ZigBee Journal
of Hunan University of Technology, 25(5), 37–41.
Supported by the National Natural Science Foun- Zhang, L., & Yang, G. (2013). Ultra-wide-band based
dation of China (Grant No. 61540027). indoor positioning technologies. Journal of Data
Acquisition & Processing, 28(6), 706–713.
REFERENCES
132
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: This paper analyses the influence of users in Sina Microblog based on interaction of users
in microblogging service. With the data from Open Weiboscope Data Access website, we focus on “active
users” in original data and construct a probability transition matrix of information diffusion. Then we
utilise the measurement of effective distance to define the users’ influence, finding the top influence users
in Sina Microblog. We find that the top users’ effective distance to others are shorter than others. Usually,
they also make more interactions (retweets) in microblogging service. Furthermore, we construct a net
graph of users by selecting the minimum effective distance of users as their connection in graph, finding
that top users are usually located at the centre of network. All the results demonstrate the measurement
of effective distance as a novel perspective and effective tool, which can be well applied to the investigation
of the social network of Sina Microblog.
133
the “effective distance” from one to another. The number of statuses that user i posts, that is tweets
“effective distance” represents the user’s influence of user i, as NTi and the number of statuses that
to others. Shorter “effective distance” means more user j reposts from user i as his/her own tweets, that
influence of users. This method is supposed to help is retweets of user i from user j, as NRTij. Then we
us to find the opinion leader in the social network can conclude the probability of information dif-
of Sina Microblog. fuse from i to j as:
The rest of this paper is organised as follows.
Firstly, we explain the method to get the “effective ⎧ NRT
Tij
distance” between users. Next, we introduce the ⎪ (i j)
pij = ⎨ NTTi (3)
data set of Sina Microblog and the data process-
⎪0 (i j)
ing, followed by presenting the result we get from ⎩
the data. We finally conclude our finding from the
work. Note that we define the pij = 0 when i = j which
means one will not repost the tweets that were
posted by himself/herself.
2 METHODOLOGY
Finally, we utilise the method for calculating the
effective distance, which is noted in formula (6), to
Effective distance is proposed to describe the con-
the social network of Sina Microblog. Through the
nection between two places in a Global Mobility
calculating of the effective distance between users
Network (GMN) by Dirk Brockmann and Dirk
in Sina Microblog, we can get an effective distance
Helbing (Brockmann D et al., 2013). They applied
matrix D as follows:
the measurement of effective distance to the study
for spread of epidemic (2009 H1 N1 influenza pan-
demic and 2003 SARS epidemic) and approved D {d }
ij N N
; i j ∈{ N} (4)
the method effectively. In their research, they con-
structed the GMN with the data of worldwide air where N denotes the number of users in Sina
traffic which contains 4,069 airports with 25,453 Microblog. Similar to the global mobility network,
direct connections. In the GMN, countries are the dij is also not equal to dji here. And in Sina
treated as nodes of network while the flow between Microblog, actually the effective distance dij means
nodes represents number of passengers between the influence of user i to user j, where the shorter
countries. Then they built up a probability transi- distance means the more influence.
tion matrix P between nodes in the network, which
is denoted as follows:
3 DATA DESCRIPTION
P { pij }N N ; i j ∈{ N} (1)
3.1 Data source
where i and j both represent the nodes (countries) The users’ data we adopted in this paper is all
in the GMN., and pij means the probability for a from the Open Weiboscope Data Access website
passenger travelling from i to j. According to the (http://147.8.142.179/datazip/). The Weiboscope
measurement for calculating the effective dis- is a data collection and visualisation project
tance in the research of Dirk Brockman and Dirk developed by the research team at the Journalism
Helbing, the effective distance between nodes is and Media Studies Centre (JMSC), The Univer-
defined as: sity of Hong Kong, which had investigated cen-
sorship on Sina Microblog with this data in 2013
N
(Fu et al., 2013). The dataset, which was collected
dij i ( L − log( P L )ij ) (2)
L =1 during the whole of 2012, contains 226,841,122
tweets from 14,387,628 unique users. The struc-
Now, the dij denote the effective distance from i ture of the original user data is as shown in
to j, but the dij is not equal to dji because of pij ≠ p ji . Figure 1.
The detailed description for computing the effec- In the original user data, only the data in col-
tive distance can be found in the supplementary umn “uid” and “retweeted_uid”, which is marked
text of literature (Brockmann D et al., 2013). with the red rectangle in Figure 1, is useful for our
Similar to the global mobility network, in social research. For ethical reasons, real user ID in Sina
network of Sina Microblog, a probability transi- Microblog is replaced by pseudo ID, but there is
tion matrix P can also be constructed with the data no significant effect on the calculating for effec-
of users’ tweets and retweets in the microblogging tive distance. We select the data which contains
service. We identify the transition probability of retweets to study, and then the data structure can
information as follows. Firstly, considering the be simplified as shown in Figure 2.
134
Figure 1. The structure of the original user data.
135
are created by minority “active users”. That means, In the Table 1, the No. 6 and No. 7 users’ real
even ignoring these users, we will make no signifi- ID are unknown due to their account now having
cant effect on investigating the influence of users in been deleted. We also find that the top 10 users
Sina Microblog and we also can display the main are almost all public accounts which are used for
structure of the network graph of Sina Microblog advertising and marketing, because these influen-
more clearly by focussing on minority “active users”. tial users can deliver information to more audi-
ences than others. The capability of information
diffusion has already attracted the attention of
4 RESULTS
businessmen.
The description for influence of users is based
After the filtering step in section 3, finally there are
on the interaction between users in microblogging
4,977 “active users” left for our research. With the
service. Then we explore the relationship between
data of these users and the method for calculating
number of users’ retweets and influence of users,
effective distance, we get the effective distance matrix
and the result is displayed in Figure 4.
D of 4,677 users. In order to determine the influence
In Figure 4(A), the axis represents the num-
of users in the whole network, we define the average
ber of users’ retweets NRTi/NTi while the hori-
effective distance di as the influence of user i.
zontal axrepresents di (influence of user i). The
distribution of the users’ influence di is shown in
1
∑ j =11/ dij
N
di = (5) Figure 4(B). In Figure 4(B), we find that the value
N of di is divided into two parts; the part below the
dotted lines consist of influential users. Mean-
By comparing the influence of all users, we sort while, the left part of the dotted line in Figure 4(A)
the di of users and then get the rank of all users. denotes that the value of NRTi/NTi, which is nega-
Because the real user ID is replaced by pseudo tive correlated with the users’ influence di.
ID, we only give the top 10 users’ real ID in Sina In order to show the clear structure of the net-
Microblog, which is shown in Table 1, by looking work, we figure the net graph of the Sina Micro-
for the text of users in the microblogging service. blog. Based on the influence between the users
in Figure 5, we select the minimum value of
Table 1. Top 10 influential users. dij j , 2, , N ) as the only connection of user i.
The steps for selection are as follows: firstly, if
Rank Pseudo ID Real ID dik {
i dij j }
N , then there is a con-
nection from i to k. It means that each user only
1 uP2ZBBHYQ has one connection to others in the net graph, but
2 uNEGDMAAR that user can have more than one connection from
3 uPA3 LIZDC others.
4 uRLOV35GT In Figure 5, we show several users’ real ID which
5 uK3RR2Y53 Cherry occupy the centre of a small network. We can find
6 uYC3IT2 JD Unknown that these users mainly contain the celebrities and
7 uS5 WUDXRU Unknown some interesting public accounts which have more
8 uM1U0 NZOG IN audiences than normal users. These users are also
9 uP2ZBBHYQ “influential users” because they can deliver infor-
10 uNEGDMAAR mation to more normal users more quickly.
Figure 4. The distribution of users’ influence di and its relationship with NRTi /NTi.
136
microblogging service, the analysis did not cover
all users in Sina Microblog. Otherwise, the result
could have been more complete in the paper.
REFERENCES
137
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Zhigang Tian
Tsinghua University, Beijing, China
ABSTRACT: This paper proposes a Cloud Evolved Packet Core (CEPC) architecture based on Soft-
ware-Defined Networking (SDN)/OpenFlow technology, which separates the control plane and data
plane of a Serving GateWay (SGW) and a PDN gateway (PGW) completely, and runs the control func-
tions of a Mobility Management Entity (MME), SGW-C and PGW-C of the LTE-Evolved Packet Core
(LTE/EPC) architecture in the cloud controller. By simulating the initial attach process of the CEPC
architecture and the traditional LTE/EPC architecture, it is concluded that the CEPC architecture has a
lower paging signalling load, and the network flexibility and programmability are higher.
139
Figure 2. Initial attachment procedure.
140
in the architecture. CC runs all MME on the LTE/ allocated and session is established; these functions
EPC, SGW-C, and PGW-C control functions. CC on the CC and the MME are virtualised and pack-
runs all control functions of the MME, SGW-C, age them as applications.
and PGW-C in the LTE/EPC. The main task of SGW-D, PGW-D: GW-Ds (SGW-D and
the CC is to manage the forwarding plane of eNB PGW-D collectively) are located between the CC
and SGW-D, which is responsible for the establish- and the PDN network or the Internet, and corre-
ment of user sessions and the load monitoring of spond to an OF switch that handles GTP packets.
the data plane. According to the OF protocol, the The purpose is to remove the GTP header of the
main entities of the framework function as follows: packet to the network and add a GTP header to
CC: It is responsible for setting up user ses- the packet arriving at the CC.
sions, installing the forwarding table for PGW-D eNBs: The wireless function in 3GPP is main-
and SGW-D and monitoring the network. MME tained and the data plane is programmed accord-
is an application on the CC and is responsible for ing to the instructions received from the CC.
mobility management and UE authentication. It
connects to the CC through the API interface.
4.2 Initial attachment
SGW-C, PGW-C: They are the control func-
tions of SGW and PGW. They are responsible for During the initial attachment process of the PC
assigning the Tunnel Endpoint Identifiers (TEIDs) architecture, the UE registers to the network which
when the GTP tunnel is established, the UE IP is authorises the UE and obtains an IP address which is
141
used for data transmission. Compared to the 3GPP the traditional LTE/EPC architecture of the initial
LTE/EPC initialisation attachment procedure, no attachment process. In addition to the authentica-
session is established between the SGW and the tion and authorisation steps, the total number of
PGW, thus reducing the exchange of information messages entering and leaving the MME entity is
between the CC and the PGW for the establishment ten messages. Thus, the total signalling load of the
of this session. In this process, the CC assigns an IP MME entity caused by the initial attach process is:
address to the UE through the PGW-C application,
used to initialise the attachment process, as shown Sm ( k ) = 10 P ρA
AC (1)
in Figure 5. First, the UE sends an initial attach
Nue
request to the eNB, this message is embedded in ρ= ( / km 2 ) (2)
an OpenFlow Initial UE message and is sent to the S
CC. The CC sends the message to the MME and
triggers the process of authenticating and authoris- where P is the probability that the UE initiates the
ing the UE. After the authentication and authorisa- attachment to the network, Nue is the total number
tion process, the PGW-C application allocates an of users, and S is the area of the experimental area.
IP address to the UE.
5.2 CEPC architecture
5 PERFORMANCE ANALYSIS In the same way, the total signalling load at the
CC caused by the CEPC architecture during
In this part, this paper analyses the signalling load the initial attachment process is easily obtained.
of the control entity of the CEPC architecture and The signalling load caused by the initial attach-
the 3GPP LTE / EPC architecture, and compares ment process is:
them. The control entity of the 3GPP LTE/EPC is
an MME, the control entity of CEPC framework Sc ( k ) = 6 P ρA
AC (3)
is a CC. In the initial attachment process, the sig-
nalling load of these control entities will be used as
an evaluation metric. 6 RESULTS ANALYSIS
In the signalling load analysis, the signalling
analysis model described in Widjaja (2009) and This section compares the total signalling load
Kumar (2012) is used in this paper to analyse the of the traditional LTE/EPC architecture and the
signalling load generated during the initial attach- CEPC architecture and presents the numerical
ment process. Assume that each UE is a smart results of the equations described above. The val-
phone, which supports K application types, such as ues of the parameters in the equation are derived
WeChat, e-mail, voice and so on. λk is the average from (Krishna, 2015), as shown in Table 1. In this
arrival rate of the type-k session, P is the probabil- paper, the MME and CC of the total signalling
ity of the UE initiating the session, and a region load is evaluated.
is selected as the experimental region. C, A and ρ The relationship between the number of users
represent the number of eNBs in the experimental and the total signalling load of the two architec-
area, the area of the cell and the density of the UE tures is simulated through Equations (1) - (3) and
in the test area. Sm and Sc represent the signalling the values given in Table 1. In Figure 6, the solid
load of MME, CC respectively. line and the dotted line respectively represent
changes in the total signalling load of the control
5.1 Traditional LTE/EPC architecture entities of the traditional LTE/EPC architecture
In a network architecture, the signalling load of
the controlling entity is proportional to the num- Table 1. Parameter for evaluation.
ber of messages entering and leaving these entities
and the average arrival rate of the UE sessions. Parameter Description Value
Because this paper assumes that each UE is a
smart phone and capable of supporting a variety P Probability that a UE initiates an 0.2
attachment procedure
of application types, the signalling load is affected
A The area of a cell 200
by the average arrival rate of sessions generated
C Total number of eNBs in a 500
by an application in the UE. However, during the considered region
initial attachment procedure, the signalling load is Nue Total number of UEs
not affected by the sessions arrival rate, since the S Area of a considered region (km2) 500
initialisation attachment process does not depend ρ UE density (UEs/km2)
on what type of application the user is using. So in
142
Figure 6. Comparison of the results.
and the CEPC architecture as the number of users (No. KM201511232011) and Bejing Nova Pro-
increases during the initial attachment process. gram (Z161100004916086).
The simulation results show that the total signal-
ling load increases linearly with the number of
users, and the growth of the total signalling load REFERENCES
of the CEPC architecture is slower than that of
the traditional LTE/EPC architecture. The CEPC 3GPP (2014). GPRS Enhancements for E-UTRAN
architecture has a lower paging signalling load and Access [EB/OL]. http://www.tech-invite.com
is more flexible and programmable compared to 3GPP (2015). General packet radio service (GPRS)
the traditional LTE/EPC architecture. enhancements for evolved universal terrestrial radio
access network (EUTRAN) access [EB/OL]. http://
www.3 gpp.org/
Cooney, M. (2011). Gartner: the Top 10 Strategic Tech-
7 SUMMARY nology Trends for 2012[EB/OL]. www.networkworld.
com
In this paper, a architecture based on SDN is pro- Kobayashi, M., S. Seetharaman, G. Parulkar, G, Appen-
posed, and the control functions of the LTE/EPC zeller, J, Little, J, van, Reijendam, P, Weissmann, and,
with MME, SGW-C and PGW-C are run on the N, McKeown. Maturing of OpenFlow and software-
cloud controller. with the traditional LTE/EPC defined networking through deployments. Elsevier
network architecture, the signalling load increases Computer Networks, (61), 151–175.
linearly with the number of users through simula- Krishna, M, Sivalingam, Sakshi, Chourasia. (2015) SDN
tion, but the growth of the total signalling load of based evolved packet core architecture for efficient
user mobility support. IEEE Network Softwarization
the CEPC architecture is slower than that of the (NetSoft).
traditional LTE/EPC architecture. So the CEPC Kumar, C.S., R.V., Rajakumar, Pankaj, Kumar, Gupta.
architecture that makes the network more opti- (2012). Analysis of impact of network activity on
mised has a lower paging signalling load and is energy efficiency of 3GPP-LTE[C]. IEEE India Con-
more flexible and programmable compared to the ference (INDICON), 665–669.
traditional LTE/EPC architecture. Nowoswiat, D., G. Milliken. (2013). Alcatel-Lucent:
Managing the signaling traffic in packet core [EB/
OL]. http://www.alcatel-lucent.com/techzine/.
ACKNOWLEDGEMENTS Widjaja, I., P. Bosch, H. La, Roche. (2009). Compari-
son of MME signaling loads for long-term-evolution
architectures. Vehicular Technology Conference Fall,
This work was supported in part by the (1), 1–5.
National Natural Science Foundation of China Zheng, Yi, Hua, Yiqiang, He, Xiaofeng. (2013).
(No. 61402044), by China’s 863 Plan Pro- Characteristics, Development and Future of SDN.
gram (No. 2015 AA01 A706), by the Science Telecommunications Science, (9), 102–107.
Foundation of Beijing Education Commission
143
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Xiaolei Zheng
Logistics College, Beijing, P.R. China
Ji Ren
Equipment Demonstration Center, Beijing, P.R. China
ABSTRACT: Given the characteristics of military information requirement systems, a military req-
uirement system based on the reconstruction conjecture in graph theory was proposed to analyze the
hierarchy of needs and resolve the relationships between objects. The steps of the military requirement
system construction were determined. By combining quality and quantitative methods, the developed
information system can fully meet the customers’ requirements.
145
Figure 2. The schematic diagram of the demand
relationship.
146
The concept of requirement system accessibility 3.2 The division of military requirement system
matrix is as follows: accessibility matrix
Suppose D is the relational graph of the military
In order to analyse the hierarchical structure of the
requirement system S {r r rn } composed of
requirement system through the demand accessi-
n demands, then the element
bility matrix, the relationships between demands
given by the accessibility matrix need to be divided.
⎧ if starting from rj to ri by passing
⎪1, several branches:
mij = ⎨ 3.2.1 Hierarchical division, πl(P)
⎪⎩0, otherwise
w First, the definitions of an accessible set and
advanced set are given. For every demand ri,
The n × n matrix M is called the accessibility the set composed of accessible demands is
matrix of the relational graph D. If it goes from defined as the accessibleset R(ri) of ri, namely
rj to riby passing k branches, then it is accessible { }
R(ri ) = rj rj ∈ S mij = . The set composed of the
from rj to ri, and its length is k. demands ri is defined as the advanced set A(ri) of
The computing method of the military require-
ment system accessibility matrix is
{
ri, namely A(ri ) = rj rj ∈ S m ji = . }
The intersection of A(ri ) and R(ri ) is the same
as R(ri ). Therefore, the condition of the upper-
A ∪ A2 ∪ ∪ An (2) most required ri is
Supposing any demand to itself is accessible, R(ri ) = R(ri ) ∩ A(ri ) (7)
then
The requirement system of all hierarchies can
M = I ∪ A ∪ A2 ∪ ∪ An (3)
be divided with the same method. Supposing
The accessibility matrix can be calculated by the L1 L2 , …, Ll are hierarchies from top to bottom,
above formula. And then the hierarchical division of requirement sys-
tem S can be expressed as:
( )n = I ∪ A ∪ A2 ∪ ∪ An (4)
π l (P ) {L L Ll } (8)
Thus, the even powers of ( ) can be calcu-
lated, namely ( )2 ( )4 , ( I ∪ A)8 , …, if The specific iteration steps are
( ) 2i 1
≠( ) =(
2i
) 2ii+1
(5) 1. Where, L0 = ∅, and Lj means the j level, j ≥ 1;
Then Lj {r ∈ P i L0 − L1 L j −1 |
R j (ri ) ∩ Aj (ri ) = R j (ri )} (9)
( I ∪ A) 2
i
M (6)
147
Table 1. The hierarchical division of military require- otherwise, N is included. I includes the demands
ment system. of disconnected parts, whereas N includes the
demands of strongly connected parts. On special
Requirement occasions, I and N can be empty sets, but not at
i R(ri) A(ri) R(ri) ∩ A(ri)
the same time.
1 1, 3, 4, 5, 6, 81 1
2 2, 3, 4, 5, 6, 82 2 3.2.3 Circuit set division, πG(N)
3 3 1, 2, 3, 4, 5 3 The goal of circuit set division is to find the cir-
4 3, 4, 5, 6, 8 1, 2, 3, 4, 5 3, 4, 5 cuit set from the strongly connected subset. Every
5 3, 4, 5, 6, 8 1, 2, 4, 5 4, 5 demand in the circuit set can be reached from
6 6, 8 1, 2, 4, 5, 6, 6 other demands and is able to reach other demands,
7, 9, 11 namely πG(N) can be divided into:
7 6, 7, 8, 9, 10 7 7
8 8 1, 2, 4, 5, 6, 7,
8, 9, 10, 11
8 πG (N ) {C C Cy } (13)
9 6, 8, 9, 10 7, 9, 11 9
10 8, 10 7, 9, 10, 11 10 where, Ci (i = 1, 2, …, y) is the largest circuit set, and
11 6, 8, 9, 10, 11 11 11 y is the number of the largest circuit set.
148
technology and object-relation analytic technique.
When the hierarchical relationships between
demands were easily recognized, the demand hier-
archical induction technology was adopted; when
they were more complicated, the object-relation
analytic technique was employed.
REFERENCES
149
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: This article highlights the Function of Data Link Layer based on the PCIE 2.0 proto-
col. After the in-depth study of the protocol, Verilog is adopted for the forward design. Simulation was
performed using NC which is the Cadence’s simulation tool. The transmission rate is 5.0 G/second/lane/
direction. In the end, we use SMIC 65 ns to synthesis. According to the simulation results, it is confirmed
that the design works properly and meets the protocol requirements.
Keywords: PCI Express; Data Link Layer; ACK/NAK; TLP replay mechanism
151
1. Swapping the packets InitFC1 DLLP and InitFC2 DLLP for flow
2. Sending DLLP control initialization.
3. Error detection and data retransmission 3. DL_Active: The link works normally. In this
state, the link will normally process TLP.
Data Link Layer achieves the main functions of
processing the TLP and DLLP two types of data DLCMSM model is shown in Fig. 4 (Wang Qi,
packets. The PCIe hierarchy layers of TLP pro- 2011):
cessing is shown in Fig. 2 (PCI-SIG P C I, 2006). It
can be seen that adding TLP sequence number and
CRC in the Data Link Layer. The Data Link Layer 2.2 ACK/NAK
uses all the fields of the received TLP to calculate The Data Link Layer needs to use ACK/NAK to
the CRC value. The purpose of the CRC check is guarantee the correctness of the data packet trans-
to ensure the integrity of the packet transmission. mission when handling TLP. In this paper, we use
Adding serial number can target the wrong packets device A and device B as an example to illustrate.
during transmission, so that ACK/NAK can real- The transmitter is the sending part of the device
ize the error replay mechanisms to ensure reliable A and the receiver is the receiving part of the peer
transmission of data packets. device B. From the sending TLP to the receiving
In the Data Link Layer transmission process TLP, ACK/NAKDLLP is processed by order. This
will appear another kind of packet-DLLP, which article describes the order. The elements of ACK/
includes ACK/NAK DLLP, InitFC1, InitFC2 and NAK are shown in Fig. 5 (Budruk R, 2004):
UpdataFC and so on. The ACK/NAN DLLP is After receiving the TLP, the transmitter uses
used in the ACK/NAK protocol to inform the peer the counter to add a 12-bit sequence number to
whether the received TLP is correct. InitFC1 and the received TLP. Once a TLP is sent, the sequence
InitFC2 DLLP are the flow control initialization number will be incremented. When the value of
packets just after the link are established, used the counter reaches 4095, the counter will return
to inform the credit size to the peer. UpdataFC to 0 if an additional operation is performed. 32-bit
DLLP is an update packet, the Data Link Layer CRC will calculate the redundant code according
uses this packet to periodically update and inform to the TLP and the newly added sequence number.
the credit size to the peer. DLLP format is shown The transmitter transmits the received TLP add-
in Fig. 3 (Wilen A, 2003): ing sequence number and CRC to the MAC, and
stores the copies in the replay buffer. After Receiv-
2.1 DLCMSM ing TLP, the receiver will calculate the CRC to
determine whether the calculated CRC value equals
The Data Link Layer monitors the status of the the CRC area’s value. If they are equal, the next
MAC through the Data Link Control and Man- step is to determine whether the sequence number
agement State Machine (DLCMSM), then informs
the transaction layer. DLCMSM includes three
states:
1. DL_Inactive: After reset, this state is initial
state. In this state, the Data Link Layer is com-
pletely reset. It clears the TLP that exists in the
replay buffer, and submits DL_Down status
information to the transaction layer.
2. DL_Init: Flow control initialization phase. This
state is divided into two parts, FC_INIT1 and
FC_INIT2. In this state, DLCMSM will send Figure 4. DLCMSM.
152
Figure 5. Elements of the ACK/NAK protocol.
of TLP is the received sequence number. If there transmit TLP, according to the received sequence
is no CRC error and the sequence number of the number to find the corresponding TLP in the replay
received TLP is the desired sequence number, buffer. The transmitter will also use the REPLAY
the receiver will decide whether to send the ACK TIMER and a 2-bit REPLAY_NUM counter to
DLLP immediately or wait for more correct TLPs determine whether the link is faulty. The REPLAY
to be received before sending. The reason for this is TIMER is used to measure the time from the TLP
that sending an ACK DLLP every time a correct is sent to the corresponding ACK or NAK DLLP
TLP is received affects the efficiency of the link. is received. REPLY_NUM stores the number of
In order to determine when to send ACK DLLP, attempts to retransmit due to an ACK DLLP or
the receiver uses a counter and a timer. If any one REPLAY TIMER timeout. When REPLY_NUM
of them exceeds its threshold, the receiver sends jumps from 2’b11 to 2’b00, it indicates there is an
an ACK DLLP. If the CRC values do not match error in the link connection. The Data Link Layer
or TLP sequence number is not the desired value, notifies the MAC to retrain the link. The Data
it indicates that the received TLP is wrong, then Link Layer will send multiple types of data pack-
you need to generate NAK DLLP and transmit ets. There is a certain priority relationship in send-
to the transmitter to inform its data packets are ing packets. According to the recommendations of
wrong. When the receiver detects that an error has the agreement, we use the following transmission
occurred in the received TLP, it discards the TLP priority:
first, sets a NAK_SCHEDULED flag while dis-
1. The DLL or TLP that is currently being sent
carding the packet, and generates a NAK DLLP.
2. NAK DLLP
The receive flag is cleared only when the correct
3. ACK DLLP
TLP is received again. When the flag bit is set high,
4. FC_Update DLLP
all received TLPs are discarded.
5. Replay TLP
When the transmitter receives the ACK DLLP,
6. Normal TLP
since the ACK DLLP contains the sequence num-
ber, the transmitter can determine whether the
TLPs before the sequence number are correctly 3 DATA LINK LAYER DESIGN
received and then clear the copies in the replay
buffer. The size of the replay buffer should be large This paper is based on the PCIe 2.0 protocol to
enough to ensure that the transaction layer will not design endpoint mode Data Link Layer. Verilog
be blocked due to the buffer overflow. When the language (Thomas D, 2008) is used for the design
transmitter receives the NAK DLLP, the transmit- of the Data Link Layer. The overall block diagram
ter will prevent the transaction layer to continue to of the design structure is shown in Fig. 6.
153
Figure 6. Design structure.
DLCMSM: It is responsible for monitoring tx_arb: Only TLP and DLLP are transmitted
the status of the link. It receives the MAC sig- on the link, and TLP is divided into replay TLP
nal indication and jumps to the appropriate state and normal TLP. In order to ensure the correct-
according to the indication signal. It generates the ness of data transmission and improve the utili-
corresponding instruction signal in different states zation rate of links, it is necessary to select the
to control the other parts of Data Link Layer, and corresponding data packets according to the
generates indicating signal to notify transaction priority of the data packets. In this design, the
layer whether it can send packets or not. module is responsible for the TLP and DLLP
tx_tlp: When the transaction layer indicates that data arbitration. This module will also process
the beginning of transmission of TLP, it will add the flag signal, which is transmitted to the TLP
the sequence number to the TLP. At the same time, package module (tl_tlp module) and DLLP
the TLP will also be sent to the LCRC. After the package module (tx_tllp module) and generates
verification, CRC module will add32 bits CRC the corresponding signal which is sent to the
redundancy code to the end of the packet. As the MAC.
serial CRC efficiency is too low to affect the per- tx_dllp: The main function of the module is
formance of the design, in this design, we use a generating all kinds of DLLP based on different
parallel mode. The CRC polynomial used has coef- DLLP request. In this design, DLLP requests
ficients express as 04C11DB7H. include flow control DLLP and ACK/NAK
tx_buff: When a packet with a sequence number DLLP. The DLLP generated by this module also
and a CRC is sent, a copy is stored in the replay need to be added 16 bits CRC redundancy code
buffer for use when an error occur during sending. In and then sent to the arbitration module.
the design, the buffer will also store the start and end rx_tlp_handle: This module extracts the entire
address of each packet. When the data packet needs TLP packet from the received data according to
to be replayed according to the sequence number, the the indication signal. It will calculate the CRC
buffer can find the corresponding data packet’s start value, parsing 32 bits LCRC carried by the
address, then lock the data packet. This mechanism TLP, and then it will compare the calculated
can ensure the correctness of the replay mechanism. CRC with the carried CRC. The module will
rx_dllp_handle: The module will separate DLLP also detect the sequence number to determine
from the received packets. It will check the received whether it is the expected sequence number.
CRC, and then determine the type of DLLP. If it After CRC and sequence number are checked, if
is the correct data packet, this module will gener- there is no error in TLP, ACK DLLP transmis-
ate corresponding control signal to send the corre- sion request is generated. If the TLP is repeated,
sponding module. Error detection is performed for a DUP ACK DLLP transmission request is gen-
each step when parsing a DLLP packet, including erated; if the TLP is incorrect, an NAK DLLP
CRC errors, sequence number errors and bad packet transmission request is generated. If there is an
and so on. When an error occurs, the packet is dis- error, the TLP errors on the Data Link Layer are
carded and an error signal is generated and reported reported to the upper layer, and bad packets are
to the error handling module for processing. discarded.
154
4 SIMULATION WAVEFORM state. In this state, dl_up is set to high, informing
the transaction layer that it can send packets.
After completing the code, we use Cadence’s simu- Fig. 8 shows the transmitting of ACK DLLP.
lation tools (Cadence Design Systems, 2008) for When the condition of sending ACK DLLP is
function testing to check whether it meets the design satisfied, dlrx_req_ack is set high, and tx_dllp will
requirements. The test results are as follows in Fig .7: send ACK DLLP. It can be seenin Fig.8, dlrx_req_
When linkup is high, DLCMSM jumps to state acknak_seq represents the sequence number to be
Init1.It starts receiving InitFC1p, InitFC1np, sent, which is 2. dltx_mac_dllp_sot indicates the
InitFC1cpl DLLP, after InitFC1cpl DLLP is start signal of DLLP. dltx_mac_dllp_data is the
received, then initFC1 initialization is completed. packet to be transmitted, whose size is 16 bits per
When receiving InitFC1cpl, dlrx_rcvd_fc1cpl is period. 16’h0000 indicates that the packet is ACK
set to high, and the state jumps to InitFC2 state. DLLP, while the next 16’h200 indicates that the
In this state, DLCMSM starts receiving InitFC2, received TLP with sequence numbers 0, 1, 2 is cor-
InitFC2p, and InitFC2np DLLP after InitFC2cpl rect. Besides, replay buffer can clean up the copies
DLLP is received, and hence InitFC2 initialization of these TLPs. The signal dltx_mac_dllp_eot indi-
is completed similarly. Then dlrx_rcvd_fc2cpl is set cates the end of the packet.
to high, indicating that flow control initialization When the packet error occurs, NAK DLLP will
is completed. DLCMSM jumps to the dl_Active be sent. The simulation results is shown in Fig. 9.
155
It can be seen from the Fig. 9 that when the error tion is carried out. The transmission rate is 5.0G/
packet is received, the NAK SCHEDULED flag is second/lane/direction, and the data width of sin-
set while the NAK DLLP is sent. dltx_mac_dllp_ gle channel is 16 bits. After transmitted to MAC,
sot indicates the start signal of DLLP. dltx_mac_ all packets will be stripped into two channels, and
dllp_data is the packet to be transmitted, whose the data width of single channel is 8 bits. There-
size is 16 bits per period.16’h0010 indicates that the fore, the clock frequency is 500 MHz in our design
packet is NAK DLLP, and the next 16’h500 indi- and the data width is 16 bits. We also use SMIC
cates that the received TLP with sequence numbers 65 ns technology library to synthesis. The design
5 is wrong and needs to be resent. Moreover, the can work normally under the 500 MHz clock, and
signal dltx_mac_dllp_eot indicates the end of the achieves the goal that is expected.
packet. When receiving ACK DLLP, dltx buf_halt_
dltx is set high to prevent the transmitter sending
new data packets. Besides, the dltx_buf_halt_tltx REFERENCES
signal is also set high to prevent the transaction
layer transmitting new packets. After the current Budruk R, Anderson D, Shanley T. PCI express system
TLP is completed, the retransmission mechanism architecture [M]. Addison-Wesley Professional, 2004.
is initiated. The TLP whose sequence number is 5 Cadence Design Systems, Inc., “NC-Verilog Simulation
is extracted from the replay buffer and sent to the Help,” Product Version 8.2, Nov. 2008.
PCI-SIG P C I. Express Base Specification Revision
link. In Fig. 9, txretry_sot indicates the beginning 2.0[J]. 2006.
of replay packet, while txretry_tlp indicates the Thomas D, Moorby P. The Verilog ® Hardware Descrip-
data of replay packets, and txretry_eot indicates the tion Language [M]. Springer Science & Business
end of the replay packet. Media, 2008.
Wang Qi. PCI Express architecture guide [M], 1st.
Beijing: China machine press, 2011.
5 CONCLUSION Wilen A, Thornburg R, Schade J P. Introduction to PCI
Express [M]. Intel, 2003.
This paper introduces the design and implemen-
tation of Data Link Layer in PCIe2.0 endpoint
mode. Based on the design, the function simula-
156
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: In recent years, indoor positioning technology has been widely used in many fields. It
changes people’s lives deeply, and has become a hot topic in the field of LBS research. This paper dis-
cusses the problem of signal tracking in the TC-OFDM (Time & Code Division-Orthogonal Frequency
Division Multiplexing) indoor positioning receiver, which is based on ground mobile radio network. In
the TC-OFDM indoor positioning system, due to the complex structure of the indoor environment, and
serious signal attenuation, a great challenge is presented to the performance of the carrier tracking loop,
and also the positioning accuracy is greatly affected. This paper refers to the high dynamic carrier track-
ing loop, designs a dynamic threshold carrier tracking loop based on FLL and PLL, which is equipment
with multiple status to adapt to the requirements of carrier tracking in different situations. This carrier
tracking loop is designed with a joint judged threshold based on the residual frequency offset of FLL
and the residual phase offset of PLL, with the convergence of the loop. The carrier tracking loop will
correspondingly change the work status to track the signal stably when the discriminator value of the
FLL and PLL and the threshold meet a certain condition. In addition, we emulate the algorithm with
the TC-OFDM positioning receiver, and it can significantly improve the stability of the signal tracking on
the complex indoor environment.
157
Figure 2. Third-order loop filter’s architecture.
Figure 1. Loop filter schematics.
final filter output in the same filter. The output when compared with the input signal. However,
adjusts the carrier NCO so that the signal can be the second-order or higher order phase-locked
stably tracked (Deng et al., 2013). loop can accurately track the frequency step sig-
Ui(t) is the continuous time signal inputted by nal. In order to track the dynamic signal stably,
the system, Vos(t) and Voc(t) are sinusoidal carrier the phase-locked loop is designed as a third-order
and cosine carrier replica signals, respectively: loop. Because of the existence of message hopping
in the navigation data signal, the phase-locked
Ui(t) = √2aD (t) sin (ωit + θi) + n (1) loop uses Costas loop, which is insensitive to the
Vos(t) = √2asin (ω0t + θ0) (2) message jump.
Voc(t) = √2acos (ω0t + θ0) (3) The transfer function is:
Ip (t) = aD (t) cos (ωet + θe) (6) 2.3 Design of the FLL loop
Qp (t) = aD (t) sin (ωet + θe) (7) Because the phase-locked loop uses a third-
The filtered Ip(t) and Qp(t) are fed into the fre- order loop (Liu et al., 2014), so the second-order
quency discriminator and the phase discriminator to frequency-locked loop Jeffrey-Rutin filter, the
calculate the frequency value ωe and the phase value architecture is shown below
Φe into the threshold calculation module to calcu- The transfer function is:
late the dynamic threshold. It will then be used to
calculate the weight in the next module. Finally, the 1⎛ ω 2⎞
F (s) = a2ω n + n ⎟ (10)
weighted value is added to the loop filter to perform k ⎝ s ⎠
the fusion filtering. The result of the filtering is used
to adjust the carrier NCO generator, so as to realise The symbol function sign () can detect the
the stable tracking of the signal (Deng et al., 2015). 180 degree phase transition caused by the data bit
transition. This method is insensitive to the data bit
2.2 Design of the PLL loop transition and the computation is relatively small:
158
outputs of the phase discriminator and the frequency
discriminator are respectively weighted as follows:
159
with the traditional PLL, FLL and FPLL carrier
loops, the tracking performance is better under
the excitation of the step signal. The next step is to
simulate the Doppler shift of the ramp excitation
to further optimise the performance of the carrier
tracking loop.
ACKNOWLEDGEMENTS
REFERENCES
Deng, Z., Li, X., Ma, W., Fang, Y., & Zeng, H. (2015).
Design and Implementation of Indoor & Outdoor
Positioning Service Platform Based on Beidou and
Base Station System[C], The 5th China Satellite Navi-
Figure 6. Comparison of new carrier tracking loop and gation Conference, 2015.
FPLL carrier tracking loop. Deng, Z., Yu, Y., Yuan, X., Wan, N., & Yang, L. (2013).
Situation and development tendency of indoor posi-
Figure 4 and Figure 5 show that the new carrier tioning [J]. China Communications, 10(3), 42–55.
tracking loop can stably track the 2 KHz step sig- Liu, X., Chen, D., He, X., & Liu, J. (2014). FPLL car-
nal. Figure 6 shows that the convergence rate and rier tracking loop simulation and high dynamic GPS
tracking accuracy of the new carrier tracking loop signal test[C]. 11, 1329–1333.
are better than the traditional FPLL loop under Tian an Jian-ping Zhang Ruo-bing. Tracking error anal-
ysis and simulation of FLL-assisted PLL.
the same conditions. Xie, G. (2009). Principles of GPS and Receiver Design
[M]. Beijing: Publishing House of Electronics Indus-
try, 376–384.
4 CONCLUSION Xu, Z., Cui, C., & Yu, J. (2012). Based on a combination
of frequency-locked loop and phase locked loop car-
In this paper, a new carrier tracking loop is rier tracking technology. 52(4), 558–561.
designed and simulated in MATLAB. Compared
160
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Hongbo Yan
National Technological Innovation Method and Tool Engineering Research Center, Hebei University of
Technology, Tianjin, China
College of Mechanical Engineering, Inner Mongolia University of Science and Technology, Baotou, China
Runhua Tan
National Technological Innovation Method and Tool Engineering Research Center, Hebei University of
Technology, Tianjin, China
ABSTRACT: Aimed at the shortcomings of the existing project management software Six Sigma and
the training process, this paper describes the design and development of the Visual Basic (VB) based on
the idealised Six Sigma software. First, by using the VB programming language on the basis of the Six
Sigma DMAIC model, the corresponding tools are added to each stage to form an ideal Six Sigma theory.
Then the VB programming language is used to combine the idealised Six Sigma software and Goldfire
software, so that the Goldfire software simplifies the search step and across the language barriers. Finally,
an intuitive simple window mode required to introduce the training content is presented. The use of the
process shows that the software is easy to use, so that the ideal of Six Sigma is easier for enterprises and
training institutions to implement, the enterprise staff to the idealised Six Sigma has a deeper understand-
ing, in order to facilitate the use of the future.
161
Figure 1. Fusion tool.
DMAIC are shown in Figure 1. Combined with in KT theory and CRT in TOC theory are added
the Goldfire, it makes the software more complete. in the analysis period. IFR, evolution model, con-
Every tool plays different roles in the software. flict model and separation principle in TRIZ the-
ory, DA and PPA in KT theory, CRD and FRT
1. The function of TRIZ
in TOC theory and problem building method are
ISQ and IFR output the report of the survey
added in the improvement period. Conflict matrix
to the problems. Secondly, it ensures that the
and AFD in TRIZ theory and standard work and
process characteristics and the current lev-
anti-bugging method in LP theory are added in
els using 76 standard solutions and a conflict
the control period. The added tools in different
matrix. Thirdly, it makes innovative solutions
periods of DMAIC of Six Sigma are shown in
by conflict matrix, evolution pattern, IFR and
Table 1.
separation principle. Finally, it keeps the modi-
The flows using the software to solve problems:
fying effect using conflict matrix and failure
prediction. 1. Definition (D) period
2. The function of KT is to find questions and ISQ questionnaire is used to investigate in depth
sort them; it finds the change caused by Rea- the information or materials relating to problems
sons of Problem; it eliminates the reason by the to provide the team with a full understanding at
safest method; it formulates protection plans. the initial period of project. IFR is used to get the
3. The function of TOC is to find the root reason final purpose and the goal. SA is used to sort out
of the questions, and to find the conflict inside massive information and materials, and rank the
the questions. goals of the project.
4. The function of LP is to improve the produc- 2. Measurement (M) period
tion efficiency by the best combination of per- Conflict matrix and 76 standard solutions are used
son, machine and object, eliminate the mistakes to find the conflicts in the project and develop
and keep the disadvantages at the lowest level. new methods when the measurement methods and
5. The function of Resolve is to provide a founda- tools are insufficient.
tion for the rank of the solutions. 3. Analysis (A) period
6. Goldfire is software to achieve CAI completely. PA in KT theory and CRT in TOC are used to
It includes sophisticated concepts, problem improve problem analysis ability and determine
solving, opportunity analysis, and knowledge the root causes or problems, and the core problems
acquisition of internal and external. 4. Improvement (I) period
IFR, evolution model, conflict matrix and sepa-
ration principle in TRIZ, DA and PPA in TRIZ,
3 SOFTWARE DESIGN CRD and FRT in TOC theory, and problem build-
ing method, are used to increase the opportunities
The paper mainly uses VB programming language of getting innovative plans in the period, assess
to design the software and integrate theories into and select the plans and make relevant protective
a whole from different angles. ISQ and IFR in measures to improve the safety of plan implemen-
TRIZ theory are SA in KT theory, and are added tation. TRIZ is mainly used to a produce inno-
in the definition period of the DMAIC model. 76 vative solution. TOC is used to identify variable
standard solutions and conflict matrices in TRIZ conflicts. Problem building method is used to pro-
theory are added in the measurement period. PA vide the improvement order of variables.
162
Table 1. Tools for each phase of DMAIC.
163
information obtained in the previous investigation TOC, LP and problem building method. The con-
in the definition period. The nature of process venience of software is improved through multiple
and current level are determined in measurement classification and various interfaces. The structure
period. The root causes and core problems are chart of the menu bar of design of DMAIC model
found in the improvement period through multi- of idealised Six Sigma are shown in Figure 5.
ple methods to provide convenience for problem All of those tools are integrated in the DMAIC
solving. Improvement effects and the stable state model of Six Sigma, forming a new DMAIC model
are maintained in the control period. The prob- with innovation ability to eliminate the weaknesses
lems are solved well through the five steps. of traditional the DMAIC model. Each module in
the software is introduced in detail. The basic knowl-
edge and use of methods of corresponding theories
4 SOFTWARE ENGINEERING can be elaborated clearly. For example, in the evo-
lution model, the software clearly expresses the
The main interface menu bar, quick entry, and content of each module of the evolution model; the
access entry of mouse are designed. In the design software adds an example to each module to explain
of the menu bar, DMAIC model of Six Sigma, the the content and the use of the module methods, mak-
tools integrated by Six Sigma and different classifi- ing them easy to understand. In the menu of evolu-
cation ways are used to find the required modules tion model, modules can be added with the increase
more conveniently and rapidly. The design drawing of theoretical knowledge to make software more per-
of the main interface is shown in Figure 3 and the
design drawing of menu bar is shown in Figure 4.
The previous design of the main window men-
tions that the design of the menu bar is divided
into the DMAIC model of Six Sigma and the
tools integrated by Six Sigma. The DMAIC model
is divided into five parts: defined, measures, ana-
lyse, improve and control. The tools integrated by
Six Sigma are divided into five parts: TRIZ, KT,
Figure 4. The design drawing of the menu bar. Figure 6. The sketch of evolution model software.
164
models of Six Sigma through the analysis of TRIZ
theory, KT theory, TOC theory, problem building
methods and lean production. Those theories are
not only the tools solving problems but they have
their own unique ideological connotation. There-
fore, they can be used in the learning, reinforce-
ment and checking of basic knowledge of idealised
Six Sigma personnel in the company. They are also
the tools helping idealised Six Sigma personnel
find the root cause of problems and to more con-
veniently and rapidly solve problems.
REFERENCES
Figure 8. The sketch of the disabled predicting AFD
software.
Chen, Z. & Tan R. (2013). Principle and application of
idealizing six sigma: The innovation method of prod-
fect. The sketch of the evolution model software is uct manufacturing process. BeiJing: Higher Education
shown in Figure 6. The checking of relevant knowl- Press.
Feng, C. (2007). Six Sigma theory and implementation.
edge can be done. For example, a corresponding
Ship Science and Technology.
invention principle can be obtained after choosing Feng, F. (2009). Samsung group innovation method is
an improved universal engineering parameter and applied to analysis of the experience. Science & Tech-
a worsened universal engineering parameter in the nology Progress and Policy.
conflict matrix; this saves the time in table checking Lin, M.. (2004). The six sigma management [M]. Beijing:
and improves the efficiency. The sketch of conflict Renmin University of China Publishing House.
matrix software is shown in Figure 7. Tan, R. Innovative design. (2002) Beijing: Mechanical
If you need to learn the knowledge of one mod- Industry Press.
ule, the software can elaborate the theories of cor- Tan, R. The invention problem solving theory [M].
Beijing: Science press. 2004.
responding modules. For example, in the disabled
Tan, R. (2010). TRIZ and applications—The process and
predicting AFD, the module elaborates the knowl- methods of technological innovation. Higher Educa-
edge content of the disabled predicting AFD step tion Press.
by step. Also, each window elaborates the knowl- Tan, R, Yang B. & Zhang J. (2008). Study on patterns of
edge of relevant modules correspondingly, and idea generation for fuzzy front end using TRIZ. China
systematically introduces the content of the disa- Mechanical Engineering.
bled predicting AFD. The sketch of the disabled Wei, M. (2011). Motorola 6 Sigma control software.
predicting AFD software is shown in Figure 8. Printed Circuit Information.
Yang, J. (2005). Toyota’s business school: 68 details of the
meticulous management. Beijing: Enterprise Manage-
5 CONCLUSION ment Publishing House.
Zhen, H.E., Zhou Y. & Gao X. (2006). Lean six sigma
and its application. Journal of Xidian University.
The paper mainly introduces the functions, struc- Zhu, N. & Zhu, Y. (2009). Use TRIZ to avoid six sigma
tures and especially the problem solving flows of bottlenecks. Science and Management.
idealised Six Sigma software. It improves the low Zuo, T.Y. (2004). Resolve [M] Wang Haiyan, Makin,
degree of automation, problem solving ability, low Beijing: Central Compilation and Translation Press,
efficiency and other defects of traditional DMAIC 2004.
165
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: FlexRay is recognised as the next generation of high speed vehicle communication stand-
ards. The real-time and reliability of the dynamic message transmission has an important effect on vehicu-
lar communication safety. For the FTDMA, the media access control of the dynamic segment, a two-layer
message scheduling mechanism based on the Periodic Servers (PSS) is proposed. The worst case response
times of messages under PSS are analysed, and also a sufficient schedule ability condition is deduced. The
parameter configuration for the dynamic segment and PSS is modelled as the binary non-linear integer
programming to maximise the utilisation under the constraint of schedulability of the dynamic segment.
The experimental results show the effectiveness of the PSS and parameter configuration, which can effec-
tively improve the utilisation and the real-time of the dynamic segment.
167
the Static Segment (SS), the Dynamic Segment messages in the DS, while the communication con-
(DS), the Symbol Window (WS) and Network Idle troller independently implements the FlexRay pro-
Time (NIT). The static segment adopts the Time tocol services.
Division Multiple Access (TDMA) media access In terms of each FID allocated to a node, the
and consists of a number of isometric static slots; host correspondingly maintains a message Queue
the dynamic segment adopts the Flexible Time (Q) and a Periodic Scheduler (PS). When the spo-
Division Multiple Access (FTDMA) media access. radic message in the DS is produced for the func-
Within the dynamic segment a set of consecutive tionalities by the tasks in the host, it is not directly
dynamic slots that contain one or multiple mini- sent in the FlexRay bus but is put into the respec-
slots are superimposed on the mini-slots. The tive message queue in accordance with its prede-
duration of a dynamic slot depends on whether or fined priority and waits for the scheduling of the
not frame transmission takes place. The dynamic periodic scheduler, which is periodically activated
slot only consists of one mini-slot if no message is for the message transmission. When the periodic
transmitted; otherwise, it has a length equal to the scheduler is in the activated state, the message
number of mini-slots needed for the transmitted with the highest priority is selected from the mes-
message. The message can be allowed to send on sage queue and is put into the respective buffer of
the dynamic segment if the following conditions CHI to transmit in a given DYS. In the paper, the
are satisfied: 1) the slot counter of the dynamic deadline-monotonic-priority is adopted, i.e. the
slot is equal to the frame ID of the message; 2) the message with the smallest deadline is assigned the
rest of the dynamic segment is enough to accom- highest priority and is put at the head of the mes-
modate the transmission of the message. sage queue, in which the messages are sorted by
decreasing priority (Schmidt & Schidt, 2009).
A single example is provided to demonstrate the
2.2 Frame and coding message scheduling of the above model, as shown
The FlexRay frame header contains 5 bits of indi- in Figure 1. The sporadic messages m1, m2, m3, m4,
cator, 11 bits of frame ID, 7 bits of payload length, m5 and their parameters are given in Figure 1(a).
11 bits of header CRC and 6 bits of cycle count. Let c and d be the length and the deadline of
The payload segment is composed of 0–254 bytes m1-m5. Furthermore, it is given that the DS is lim-
and the frame tail consists of 3 bytes of frame ited to 70 ms and a FlexRay cycle is 5 ms. The peri-
CRC. The Transmission Start Sequence (TSS), odic schedulers PS1, PS2, PS3, PS4, PS5 and their
the Frame Start Sequence (FSS), the Byte Start parameters are given in Figure 1(b). Let P,θ and
Sequence (BSS) and the Frame End Sequence m be the period, the phase and the corresponding
(FES) are used in the frame encoding. TSS is used message of PS.
to mark the beginning of a transmission. FSS is Assume that all messages arrive at the begin-
used to compensate for a possible quantisation ning of the DS. Consider the case without PS in
error. BSS is used to provide bit stream timing Figure 1(c). Although m5 arrives in FC 0, it cannot
information for each byte and FES is used to mark be transmitted until FC 5 is coming and, hence,
the end of the last byte sequence of a frame. For a has to miss its deadline. This results from the
dynamic frame, the coding length lb can be calcu- transmission of m2-m4 with the smaller FID, which
lated by (1) where s is the payload of a frame and makes the remaining DS in FC0-FC4 shorter than
LTSS, LFSS, LBSS, LFES represents the length of TSS,
FSS, BSS and FES, respectively.
168
the length of m5. Consider the case with PS in guarantee the requirements of the message dead-
Figure 1(d). Although m0, m5 arrive at the same line. For a sporadic message, it may be represented
time in FC 0, due to the fact that the PS1 is not acti- by the triples (T, d, c). T is denoted as a period
vated, m1 cannot be transmitted while m5 is sent which characterises the minimum time interval
in FC 0. Actually, for this case it is easy to deduce between two consecutive message releases. Like
that all messages can be transmitted before their Figure 1(a), d is the deadline and used to describe
deadlines. the largest tolerable time interval between the
From the above example, it can be seen that the release and the transmission of the message, while
message scheduling with PS can adjust the message c is the length of the message that can be computed
transmission sequence and provide a guaranteed as in (2), including the payload s in the form of
opportunity to each message to be transmitted two-byte words, the DYS idle phase σ.
before its deadline.
c [ lb × bt / tMS ] (2)
3.2 Periodic scheduler
In order to reduce the burden of the host, the A periodic scheduler PS for a node n is a 5-tuple
host can implement each periodic scheduler by (n, P,θ, l, FID) with the period P ∈ N, the phase
the clock-driven method (Liu, J. W. S., 2003). If θ ∈{ ,1, , P − 1}, the executing time l and the
the parameters of each PS are known, a peri- corresponding frame ID of the PS. The actual
odic Scheduling Table (ST), for the hyperperiod period of the PS is P tC and θ is used to denote
H of each PS in a node, could be easily con- the first activated time of the PS. At all FCs
structed. An item of ST consists of the decision ( ), k ∈ N0 , the PS is activated to transmit
time tk and the activated PS at tk, i.e. PS (tk). the message and the executing time is l MS, while
The decision time tk can be got from a timer. The in the remaining FCs the PS is sleeping and no
implementation for PS scheduling is shown in transmission of messages with the FID takes place.
Figure 2. Assume that some parameters, such as the dura-
tion of MT, mini-slot and dynamic slot idle phase,
can be picked up from commercial FlexRay net-
3.3 System parameters
work design software (Wang & Zhang, 2016). In
To support the mechanism of message schedul- this paper, only two parameters are considered. The
ing in the above system model, three kinds of FlexRay cycle duration tC is one important param-
parameters, i.e. message, periodic scheduler and eter. Considering the transmission of messages in
FlexRay network, should be taken into account. the FlexRay static segment, tC can be chosen as
The parameters of the message are given as a the great common divisor (gcd) of all messages, i.e.
priori knowledge and the optimal parameters of tC d j ). The other important parameter is the
the FlexRay network and PS should be carefully length of the dynamic segment tDS. For the given
designed according to the message scheduling to sporadic message set and tC, if all messages do not
miss their deadlines, the smaller tDS means that the
utilisation of the dynamic segment is better.
If the Worst Case Response Time (WCRT)
refers to the largest time interval between the
release and the transmission of the message, two
definitions are listed as follows:
Definition 1 Given a set of sporadic messages,
the DS of FlexRay can be called being schedula-
ble if the WCRT of each message is less than its
deadline.
Definition 2 Given a set of sporadic messages,
the sum of the WCRT of all sporadic messages is
called message total WCRT, i.e. ∑WCRT Ti .
According to the above definitions, the design
of previous parameters can be easily viewed as an
optimisation problem. That is, for a set of sporadic
messages, how to assign each message to a PS and
how to design P,θ, l, FID of each PS so that tDS and
message total WCRT is minimised and the DS is
Figure 2. Operation process of periodic scheduler. guaranteed to be schedulable.
169
4 TIMING ANALYSIS OF THE SCHEDULE priority messages and ϕk denotes the time that
passes in the last FC until mkj is sent. They are
Let the FlexRay nodes in N { , 2, , n} and the shown in Figure 4.
set of all sporadic messages in node k ∈ N be Clearly, from Figure 4, the delay σk is the longest
M k m1k , mk2 mk3 ,}. The entire
n
set of sporadic when all periodic schedulers whose FIDs are less
messages is denoted as M ∪ k =1M k , the number than FIDi do not send any messages at the FC. So
of messages in M is denoted as |M| and mkj M k the value of σk is:
can be represented by triples ( kj , d kj , kj ). Assume
that PSi is an arbitrary periodic scheduler in node σ k = tc − tss − ( FID
IDi − ) ⋅ tMS (7)
k and its corresponding messages set is Gi M k .
In the paper, the period Pi and the executing time li
of PSi can be chosen as: In terms of ω k (d kj ), it can be produced because
of the following causes: 1) Periodic schedulers with
(3) lower FID than FIDi send messages, the remain-
Pi = min {[ d kj / tc ] − }
mk Gi der of DS is not enough to transmit mkj , and mkj
(4) has to be delayed for the next FCs. 2) The higher
li = max {ckj } priority messages in Gi, i.e. their deadlines are less
mkj Gi
than d kj , delay the transmission of mkj until all
Define the binary variables xij ∈{ ,1} and of them are transmitted. According to constraint:
gij ∈{ ,1} . xij takes the value 1 if M kj Gi , i.e. mkj
1) in theorem 1, the DS is enough for transmitting
is assigned to Gi and is 0 otherwise. gij takes the messages at any FCs; 2) for ω k (d kj ) cannot exist.
value l if the PSi phase θ i is in the j th FC and is 0 So ω k (d kj ) is only generated by the transmission
otherwise (Traian et al., 2006). of higher priority messages in Gi, and the value of
Theorem 1. For a set of sporadic messages ω ( kj ) can be computed by:
M ∪ k =1 M k , assume there are the periodic sched-
n
170
5 PARAMETERS OPTIMISATION
For s = 1,…, | M | , ∑g
k =0
ss,k
k =γs (15)
6 EXPERIMENTS AND ANALYSIS
If ∀ k Gs 1 h Gs ⊆ M k
then (16)
All experiments are made in the CANoe, which
where Y is a vector with all variables xs,j and gs,k. is an automotive electronic network tool devel-
Only one periodic scheduler is selected for each oped by the Vector Corporation in Germany. The
mkq and exactly one FC can be determined as its transmission speed C is 10 Mbit/s, tC is 5000 s,
phase for each PSs. They are formulated by the tSS is more than 3000 s. The parameters of all the
constraints in (14) and (15), respectively. The con- dynamic messages are shown in Table 1.
straint (16) denotes that all messages in Gs must The optimised parameters of P,θ, l, FID, G can
be from the same node. The parameters tDS, P,θ, be obtained by solving the model of (13)-(16) and
l, G can be easily deduced from the solution of the using the algorithm in Figure 4. The results are
above optimal problem with the objective function shown in Table 2. The messages m1, m2,…, m13 are
in (13) and the constraints in (14)-(16). allocated to 7 different periodic servers and the
optimal tDS is 546 μs.
To verify the method proposed in this paper, the
5.2 Minimise message total WCRT
message scheduling based on PSS and non-PSS is
If the tDS, P, θ, l, G of each PS are determined, the implemented in CANoe according to Table 1 and
message total WCRT of M has the close relation Table 2, respectively. It takes the same time to carry
171
out the two experiments and the results are shown in
Figure 4. The Mean Response Time (MERT) of a
message from the non-PSS is less than that from the
PSS. But the Maximum Response Time (MART)
of the messages m1, m2, m6, m10 is longer than their
deadlines. Obviously all of them miss their deadlines
and the dynamic segment is not scheduled under
non-PSS scheduling. For the PSS scheduling, the
under non-PSS scheduling. For the PSS scheduling,
the MART of all messages is less than their dead-
lines and the dynamic segment can be schedulable.
These indicate that the PSS can not only improve the
utilisation of the dynamic segment, but also guaran-
tee the schedulability of the dynamic segment. Figure 5. Total response time for different methods.
To further verify the proposed method in this
paper, the methods NIP and BIP are also used to
N1 m1 50 3 4
m2 125 5 6
m3 95 9 9
m4 97 17 20
m5 50 25 40
N2 m6 80 5 6
m7 85 9 12
m8 50 25 26
m9 65 33 35
N3 m10 65 3 5
m11 80 5 11
m12 110 5 20
m13 115 9 22
N1 PS1 5 45 4 2 m2
PS2 1 36 2 0 m1,m3,m4,m5
N2 PS3 2 30 4 3 m6,m8
PS4 3 32 8 7 m7,m9
N3 PS5 7 25 2 1 m10
PS6 4 42 4 1 m11,m13
PS7 6 40 4 0 m12
172
design the same parameters according to Table 1. REFERENCES
The related parameters from the design are con-
figured to the CANoe, and the above experiments Cheng, C. et al. (2013). Analysis and forming con-
are also done. The total response time of message struction of an on-vehicle communication protocol
(TMRT) is shown in Figure 5. With the increase FlexRay network. Journal of Automotive Safety and
in time, the TMRT from three methods gradually Energy, 04(1), 75–81.
Lange, R., & De Oliveira, R.S. (2014). Probabilistic
increases. However, the TMRT from the proposed scheduling of the FlexRay dynamic segment. IEEE
method in this paper is the shortest. This indi- Intern-ational Conference on Industrial Informatics
cates that the proposed method can improve the IEEE, 2012-06.
response time of the system due to the optimisa- Liu, J.W.S. (2003). Real-time systems. USA: Prentice
tion on the message of FID. Hall.
Milbredty, P., & Glab, M. (2012). Designing FlexRay-
based automotive architectures: A holistic OEM
7 CONCLUSION approach. Proceedings of Design, Automation &
Test in Europe Conference & Exhibition. Dresden,
Germany, 276–279.
The design of FlexRay is one of the most impor- Ouedraogo, L., & Kumar, R. (2014). Computation of the
tant works for vehicle design. Pointing to the precise worst-case response time of FlexRay dynamic
dynamic segment of FlexRay, a two-layer message messages. IEEE Transactions on Automation Science
scheduling mechanism called a PSS is presented & Engineering, 11(2), 537–548.
in this paper and the time analysis is made for the Park, I., & Sunwoo, M. (2010). FlexRay network param-
PSS. Considering both the network utilisation and eter optimization method for automotive applications.
the message schedulability, a method to design the IEEE Transactions on Industrial Electronics, 58(4),
parameter configuration of the dynamic segment 1449–1459.
and PSS is proposed. The experimental results Schmidt, E.G., & Schidt, K. (2009). Message schedul-
ing for the FlexRay protocol: The dynamic segment.
validate the method. In the future, the optimisa- IEEE Transactions on Vehicular Technology, 58(5),
tion of the PSS should be focused so that the pro- 2160–2169.
posed methods could be extended to the design of Traian, P. et al. (2006). Timing analysis of the FlexRay
a larger and more complicated FlexRay network. co-mmunication protocol. Proceedings of Euro-micro
Conf-erence on Real-Time Systems, 203–216.
Wang, G. et al. (2012). Analytical method for dynamic
ACKNOWLEDGEMENTS segment time optimization in FlexRay network. Com-
puter Engineering, 38(10), 241–243.
This work was supported by NSFC (61202096) Wang, Y., & Zhang, Y. (2016). Communication fault
detection and management methods of car FlexRay
and FRFCU (2013HGCH0014). This paper was network under AUTOSAR. Transactions of the
also supported by STSP (15czz02039), NSF- Chinese Society of Agricultural Engineering, 32(4),
HEI (KJ2012A226) and NSF (1708085MF157) 105–111.
of Anhui, Project of Jianghuai Auto (W2014
JSKF0086, W2016 JSKF0394).
173
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: Considering of power, size and cost of micro-satellite, MEMS gyroscope, sun sensor and
magnetometer are chosen as attitude sensors. In this paper, a Federated Kalman Filter, consisting of two
sub-filters and one master filter, is designed to estimate micro-satellite’s attitude. Simulation shows that it
performs well and has a better accuracy when compared to traditional method of Runge-Kutta. Besides,
it has less calculation load and good fault tolerance which is significant for micro-satellite application.
Keywords: Federated Kalman Filter; Attitude determination; Gyroscope; Magnetometer; Sun sensor
175
velocity of micro-satellite’s body relative to orbit 3 FEDERATED KALMAN FILTER IN
coordinate system: ATTITUDE DETERMINATION
S
b S b + ηs (7) 1
q bo = q bo ⊗ ω bo (11)
2
2.3 Measurement model of magnetometer
1 1 1
The measured geomagnetic vector B
is the out-
b
Δq = − ˆ bo ⊗ + ⊗Δ bo + ⊗ ω̂ˆ bo
put of magnetometer when fixed along inertial 2 2 2
1
axis of micro-satellite. On the other hand, the ref- ≈ −ωˆ bo ⊗ Δ + Δω bo (12)
erence geomagnetic vector B E can be calculated 2
from International Geomagnetic Reference Field According of the measurement model of
model (IGRF) given in the northward, eastward MEMS gyroscope in section 2.1, Δω
ω bo , Δω
ω bi can
and radially inward coordinate system (NED). If by defined by:
the noise of magnetometer ηB is assumed as a
zero-mean Guass white noise, the measurement Δω bo = bo −
ˆ bo = Δ bi − (A( ) − A( ˆ ))ω oi
A(q))
model of magnetometer can be given by: ≈ Δω bi + 2 Δq ⊗ A(q)ˆ ω oi
(13)
176
Figure 1. The main process of Federated Kalman Filter in attitude determination.
Δ
Since the state vector of Federated Kalman Fil-
ηb (15)
ter is X [ Δq Δ Δbbb]T , (18) should be transformed
to (19), which is the measurement equation of sub-
when the state vector is X [ Δq Δ Δbbb]T , the state filter S1:
equation of Federated Kalman Filter in micro-
satellite attitude determination is: Δ ηs (19)
b s
= F( (16)
X F )X G( )W And H s = [ 2[Sˆ s ] 0 3 × 3 ];
Similarly, according to measurement model
where of magnetometer mentioned in section 2.3, it’s
⎡ [ˆ ] × ⎤ ⎡ −0 5 × ⎤ easy to derive the measurement equation of sub-
⎥, ( ) = ⎢
bi
F(( ) ⎢ ⎥ filter S2:
⎣ × × ⎦ ⎣ × ⎦
−B
ΔB b = B ˆ (20)
b b
⎡ 0 ωˆ biz
bi ωˆ biy
bi
⎤
and [ωˆ × ] = ⎢ ωˆ 0
⎥
ˆ bxi ⎥ ;
bi ⎢ bibiz ΔB b = A(q)B o + ηB − A(q̂ˆ =( ˆ ˆ )B o
⎢ ωˆ bbiy ωˆ bix 0 ⎥⎦
o
⎣ b + ηB ≈ −2 Δ ⊗ ˆ ) o + η B = 2 ˆ ⊗Δ +η
B b B
177
tors β1, β2. Two sub-filters S1 and S2 complete the The simulation time step of Federated Kalman
measurement update separately and give the esti- Filter is 0.2 s and the initial state vector is
mated results to master filter M1. The master filter X [Δ [ Δq Δ
Δbbb]T [ 01× 6 ]T . Fig. 2 shows the attitude
M1 finishes data fusion of two sub-filters and out-
puts the final attitude determination information. Table 1. Orbit parameters of micro-satellite.
The main process of Federated Kalman Filter can
be described as follows: Altitude 600 km
Real Velocity ω bi ω bi = [ 0 0 0 ]T
3. Measurements Updating: Sub-filters calculate
q bo = [ ] T
ˆ
the Kalman gain Ki , k , the estimated state X Real Quaternion q bo
i ,k
and the estimated error covariance Pi , k :
Simulation Time 2000 s
Ki , k T
Pi , k / k H ((H i , k Pi , k / k H
i ,k
T
k Rk ) −1 (25)
ˆ = K (Z − H X
X ˆ ) (26)
i,, , , , , / 1
Pi , k ( Ki , k H i,k )P
(I Pi , k / k −1 (27)
Pk 1 P −, k1 + P2−,1k (28)
ˆ =P (
X 1 ˆ 1 ˆ ) (29)
k k 1 11,, k 2 2,, k
⎡ 1− ˆ 2 ⎤
qk = ˆ k ⊗ ⎢ k ⎥ (30)
⎢⎣ ˆk ⎥⎦
b = bˆ + Δbˆ
k k k (31)
4 SIMULATION
178
of Federated Kalman Filter is better than both
of them. Therefore, the Federated Kalman Filter
proposed in this paper has a better performance in
micro-satellite attitude determination.
5 CONCLUSION
REFERENCES
179
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Jing Wan
The Second Artillery Armament Academy, Beijing, China
Yue Ren
Unit 96819, Beijing, China
ABSTRACT: In this paper, according to the characteristics of meteor burst communication network, a
meteor burst network is designed based on OPNET simulation environment. Then the simulation results
of the data amount of the corresponding nodes and the total amount of communication are obtained.
Compared with the data of point-to-point node communication, the simulation results show that the sim-
ulation network can meet the characteristics of meteoric meteorological communication, and the design
of the networking method improves the meteoric traces communication efficiency, which provides a refer-
ence for meteoric burst network construction.
181
2.3 Tree topology modes of operation between the master and
slave determine the node model is slightly differ-
Tree topology is a structure whose nodes are linked
ent. The master station uses full-duplex mode,
hierarchically and information exchange is mainly
slave from half-duplex mode, so the main station
between the upper and lower nodes, data exchange
needs a transmitter, while the need for six receiv-
between adjacent nodes or peers is generally not car-
ers and master and slave communication, and slave
ried out.
only connected with the main station half-duplex
Therefore, only a pair of transceivers are required
(Shen & Cai 2014).
3 THE MODELING OF METEOR BURST
COMMUNICATION NETWORK BASED
3.2.1 Master node model
ON OPNET
App module of the master node in the top-level
represents the application layer and generates
OPNET provides a comprehensive development
application packets at regular intervals. IP module
environment that supports communication net-
which is below the app module represents the net-
works and discrete system modeling, it is a power-
work layer and selects the corresponding route. IP
ful network simulation tool (Chen 2004).
module which is below the app module represents
the network layer and selects the corresponding
3.1 Meteor burst communication network route. Cut module is mainly applied in dividing
model established the application packets which is in the application
layer into the packets transmitted on the physical
In the OPNET simulation of the network structure channel in sender. What’s more, at the receiving
shown in Figure 1, there are four main stations, end, the received packet combination is restored
namely node 10, node 20, node 30, node 40, each to an application layer service packet to realize
master corresponds to two from the station, and the conversion of the packet and the application
such as the master node 10 subordinate two from packet. It is shown as Figure 2.
the nodes are node 11 and node 12 respectively. The
corresponding slave nodes of node 20 are node 21 3.2.2 Slave node model
and node 22 respectively. The corresponding nodes The difference between the master node model and
of node 30 are node 31 and node 32 respectively. the slave node model is the MAC layer which con-
The corresponding nodes of node 40 are node 41 trols channel access. The slave station only sends its
and node 42 respectively. Node 0 as an interface to own information to the master or receive informa-
use the main role is to read the channel data. tion from the same master, so the paper set a trans-
mitter and a receiver. It is shown as Figure 3. In the
design of antenna, the beam inclination, ground
3.2 Node model design and implementation
conductivity, antenna height and other factors are
Node model of simulation experiment must mainly considered. To facilitate the observation of
have transceiver module and processing module. the simulation results of the data, the transmission
Because network emulation is required, a routing delay and receive packet rate attributes are added
module must be included. However, the different as the observation.
Figure 1. Meteor burst network model. Figure 2. Master node structure diagram.
182
Figure 4. Slave node structure diagram.
183
amount of information jump stage, reflecting the
meteor burst characteristics. And that the nodes
20, 0.5 s to 1 s, 1 s to 2 s are also consistent with
the design of the link off to achieve the simula-
tion result.
To compare the performance of meteor burst
cluster and point-to-point communication, we
need to collect the data of point-to-point commu-
nication. The results are shown in Figure 7.
The above figure is the simulation experiment
under the same conditions for 18 s. The commu-
nication data of the networking model designed
in this paper are selected every 3 s. It can be seen
through the network experiment, effectively
improve the information transfer rate.
6 SUMMARY
184
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Xutao Li
School of Electronics and Information Engineering, Beihang University, Beijing, China
Yuxiang Liu
Department of Materials Science, Fudan University, Shanghai, China
ABSTRACT: With the developments in technique, people are paying more attention to high speed com-
munication, which has excellent prospects for the future. As is known, the next type of communication
system rate can be up to 10 Gb/s. In this paper, communication quality measured by bit error rate is dis-
cussed. We will analyse the results of simulations. The probability density function is discussed and the
divergence angle and transmission diameter are also analysed. We will further analyse the relationship
between parameters can bit error rate. This can help us understand the character of high-speed commu-
nication performance.
Keywords: Space wireless communication; BER; Atmospheric turbulence effect; MSK scheme
185
time, 1/Ts is the speed, and the other parameters
can be seen in Campbell et al. (2014).
In a ground-to-satellite downlink wireless com-
munication, the BER of the system is affected by
the scintillation and beam wander. The PDF can
be expressed as (Shu & John, 2015):
∞
1 r
Pw ( I ) = ∫ σ ( r, L ) σ r 2
2πσ 2
(2σ r 2 ))
exp( − r 2 / (2
0 Ι
1 ⎛ ⎛ Ι 2r 2 σ Ι2 (r L ) ⎞
2
⎞
× exp + + ⎟⎠ / 2σ Ι (r L )⎟
2
ln
I ⎝ ⎝ ( , L) W2 2 ⎠ Figure 2. BER versus transmission power.
(4)
where I ( , L ) = α PT D / 2W is the average inten-
2
r
2
= ∫ BER
Rm ⋅ Pw ( I )dI (5)
0
The evolution of PDF versus received opti- The evolution of BER versus transmission
cal power is shown in Figure 1. In the figure, all power is shown in Figure 2. As is shown in the
four curves gradually increase to a point and then figure, all four curves continually decline. In the
decline when the received optical power ranges region of divergence angle 30 μrad, the BER con-
from 0 nw to 600 nw. In the region of divergence stantly reduces when transmission power ranges
30 μrad, the PDF reaches its maximum of 8.8*10e6 from 1 w to 10 w. Furthermore, in Figure 2, the
when received optical power is approximately highest BER is around 10e-5 when transmission
220 nw. By increasing the divergence angle from power is 1 w. After increasing the divergence angle
30 μrad to 45 μrad, the highest values of PDF of from 30 μrad to 45 μrad, the highest BER at the
the curves increase while the received optical power transmission power of 1 w does not change. How-
gradually declines. PDF reaches its peak at 14*10e6 ever, the BER would decline when the divergence
when the divergence angle is 45 μrad and received angle increases if the transmission power is fixed.
optical power is around 100 nw. It indicates that This indicates that BER is more sensitive to trans-
PDF is able to increase when the divergence angle mission power when the divergence angle is higher.
increases and received optical power declines. In terms of specific communication system
parameters, receiving diameter/transmission dia-
meter versus BER is shown in Figure 3 with a dif-
ferent divergence angle. When we increase the ratio,
the BER will correspondingly decrease in a differ-
ent divergence angle. Thus, in order to increase the
communication performance, the ratio should be
controlled to a certain level. We can also figure out
that the different divergence angles work when the
ratio is larger than four.
4 CONCLUSION
186
of atmospheric turbulence at various divergence Campbell, J.F., Lin, B., Nehrir, A.R., Harrison, F.W., &
angles is discussed. From the simulation results, we Obland, M.D. (2014). Binary phase shift keying on
can see that the PDF is affected by the divergence orthogonal carriers for multichannel CO2 absorp-
angle. In the region of divergence 30 μrad, the PDF tion measurements in presence of thin clouds. Opt.
Express, 22, A1634–A1640.
reaches its maximum of 8.8*10e6 when received Djordjevic, I.B., & Stefanovic, M.C. (1999). Performance
optical power is approximately 220 nw. By increas- of optical heterodyne PSK systems with Costas loop
ing the divergence angle from 30 μrad to 45 μrad, in multichannel environment for nonlinear second-
the highest PDF values of the curves increase while order PLL model. J. Lightw. Technol., 17, 2470–2480.
the received optical power gradually declines. In the Kikuchi, (2012). Characterization of semiconductor-
region of divergence angle 30 μrad, the BER con- laser phase noise and estimation of bit-error rate
stantly reduces when transmission power ranges performance with low speed offline digital coherent
from 1 w to 10 w. Furthermore, as seen in Figure 2, receivers. Opt. Express, 20, 5291–5302.
the highest BER is around 10e-5 when transmis- Le, S.T., Blow, K.J., Mezentsev, V.K., & Turitsyn, S.K.
(2014). Bit error rate estimation methods for QPSK
sion power is 1 w. After increasing the divergence co-OFDM transmission. J. Lightw. Technol., 32,
angle from 30 μrad to 45 μrad, the highest BER at 2951–2959.
the transmission power of 1 w does not change. Ma, J., Jiang, Y.J., Tan, L.Y., Yu, S.T., & Du, W.H.
When we increase the ratio, the BER will corre- (2008). Influence of beam wander on bit-error rate in
spondingly decrease in a different divergence angle. a ground-to-satellite laser uplink communication sys-
tem. Opt. Lett., 33, 2611–2613.
Masa, K. & Akira, M. (2014). Decision-directed Costas
ACKNOWLEDGEMENTS loop stable homodyne detection for 10 Gb/s BPSK
signal transmission. IEEE Photon. Technol. Lett., 26,
319–323.
This work was financially supported by Beihang Shu, Z. & John, C.C. (2015). A SSP-based control method
University fund. for a nonlinear Mach-Zehnder interferometer DPSK
regenerator. J. Lightw. Technol., 33, 3788–3795.
Wei, C.C, Astar, W., Chen, J., Chen, Y.J., & Carter,
REFERENCES G.M. (2009). Theoretical investigation of polariza-
tion insensitive data format conversion of RZ-OOK
Aamer, M., Griol, A., Brimont, A., Gutierrez, A.M., to RZ-BPSK in a nonlinear birefringent fiber. Opt.
Sanchis, P., & Hakansson, A. (2012). Increased sen- Express, 17, 4306–4316.
sitivity through maximizing extinction ratio of SOI Yang, L., Gao, X.Q., & Alouini, M.S. (2014). Per-
delay-interferometer receiver for 10 G DPSK. Opt. formance analysis of relay-assisted all-optical FSO
Express, 20, 14698–14704. networks over the strong atmospheric turbulence
Andrews, L., Phillips, R., & Hopen, C. (2001). Laser beam channels with pointing errors. J. Lightw. Technol., 32,
scintillation with applications. New York: SPIE Press. 4011–4018.
187
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: Solving difficulties in kernel technologies is the critical issue in developing the Internet Of
Things (IOT). The technologies related to IOT, such as RFID (Radio Frequency Identification Devices),
wireless sensor network and semantic grid as well as by margining multiple key technologies to solve dif-
ficult applicatioin problems are researched in focus. The semantic grid integrates the machine readable
of the semantic Web and the powerful computing capability of grid technology; the semantic P2P tech-
nology solves the communication bottleneck due to information overload. These make the deployment
of sensor nodes easier and the sensor network can be expandable. Information semantic interaction and
sharing in IOT are implemented by adopting ontology technology; this allows proper and prompt under-
standing of the information in IOT.
Keywords: Wireless sensor network; Semantic grid; Cloud computation; Internet of Things (IOT)
189
At present, the information collection mainly the traditional sensor is miniaturised, intelligent,
uses electronic tags and sensors, etc. In the sens- information and network gradually. At the same
ing technology, electronic tags are used for stand- time, we are seeing a move from a traditional sen-
ardised identification to collect information, data sor to the intelligent sensor to the embedded Web
acquisition and control equipment through the sensor development process.
RFID reader, a two-dimensional code reader
implementation.
2.2 Wireless sensor networks
RFID technology is a kind of communication
technology, using radio signals to identify specific A number of communication, computing power of
targets and to read and write data, established the sensor through the wireless connection, mutual
between the mechanical or optical contact with- cooperation, with the physical world to interact
out the recognition system and the specific goal; with each other to complete the specific applica-
it is a kind of automatic recognition technology of tion of the task, the composition of the sensor net-
non-contact. At present, the RFID technology in work (sensor network). Sensor network integrated
the field of manufacturing and assembly, aviation sensor technology, embedded computing technol-
baggage handling, mail and express parcel, library ogy, distributed information processing technology
management, document tracking and automatic and wireless communication technology, and other
recognition of moving vehicle logistics manage- multi-disciplinary cross technology. In the sensor
ment has been, or is being, put into practice. network, wireless communication independently
The concept of Internet of things, RFID tags constitutes a multi-hop self-organising system,
are stored in the specification and interoperability providing data acquisition and processing network
of information through the wireless data commu- coverage of the sensing information, flexible moni-
nication network, collecting them automatically toring. It deals with this information, and at the
to a central information system, and achieving same time, with the transmission of information
identification of goods. Then it realises the infor- to the user, the possession of goods through the
mation exchange and sharing through the open RFID networking equipment and Internet con-
computing network, as well as the transparent nection, and realises intelligent identification and
management of the goods. RFID has become a management.
key technology in the application of Internet of The main function of the sensor network is
things, and its application is still expanding. The to collect the data of some kind of environmen-
most basic RFID system consists of three parts: tal things. The related research of sensor network
the electronic tag (tag), the antenna (antenna) and includes three aspects: sensor, communication and
the reader (Reader). Each tag has a globally unique Computing (including hardware, software and
Identification Number (ID). The ID cannot be algorithm). On the one hand, a sensor network can
modified and copied, so as to ensure its safety. The be regarded as the Internet information, sharing
electronic tag is attached to the object to identify function expansion to include integrated network
the target object; antenna for RF signal transmis- information collection, information processing
sion between the reader and tag the ID, namely the and information utilisation; the information collec-
label data information; the reader for reading (or tion function enhances the information processing
writing) electronic label information equipment, process. On the other hand, a sensor network can
can be designed to be portable or fixed. be regarded as sensor nodes for the development
At work, the RFID reader transmits a signal of of a new information processing network that has
a certain frequency through the antenna. When the the interconnect structure.
RFID label into the field, by sending the obtained In sensor networks, a large number of sensor
current energy product information stored in the nodes (node sensor) are scattered in a particular
chip, or by taking the initiative to send the signal area, and are divided into different clusters (clus-
of a certain frequency, then the reader reads and ter) according to the geographical coordinates.
decodes the information and transmits the data Each cluster has a sensor node as the master
to the central information system for the data node (master node), which is responsible for the
processing. cluster routing and other management. There is
The machine sensor is the awareness of the phys- a host node to communicate with the Internet for
ical world. It is the “sense organ” to environmental such as the backbone network in all nodes (sink
parameters of the sensing information collection node). Compared with the traditional sensor, the
points. It can sense heat, light, electricity, sound, sensor network is easy to deploy; that is, the sen-
force and displacement signals, system processing, sor node position does not need to be determined
transmission, analysis and feedback to provide in advance or carefully designed to allow arbi-
the original information for the Internet of things. trary placement. At the same time, sensor net-
With the development of electronic technology, work deployment and maintenance of low-cost,
190
high-flexibility sensor networks consists of a large processing platform is used to provide integrated
number of cheap nodes that can be placed in the information services for users and Applications
physical phenomenon in the scope to obtain high (computing, storage access, etc.). It can realise the
accuracy observation; but this has a high price. A comprehensive sharing and collaboration of net-
sensor network has a large number of redundant work resources, and solve the problem of resource
nodes. Even if some nodes fail, it will not affect heterogeneity, distribution and dynamic change.
the function of the whole system, so it has good The semantic grid can be widely used in e-com-
robustness. In addition, the sensor network node merce and Internet of things. As a new interactive
also has the computing power, and can cooperate platform in the future, it has a strong effect, per-
with each other to complete tasks which the tradi- sonalized, operational and interactive, the tradi-
tional sensor cannot. tional plane and the Internet media have a strong
impact. Grid technology has greatly improved the
ability of mass information collection and clas-
2.3 Semantic grid and cloud computing
sification processing. The development of the
Typically, the grid is considered to be the next gen- grid promotes the cloud computing (Computing
eration of Internet technology, while the semantic Cloud) technology. Cloud computing will provide
Web is considered to be the next generation Web. powerful computing capabilities for the Internet of
Grid and semantic Web have many similarities, but things. Cloud computing is a distributed comput-
their emphasis is different. The traditional mean- ing technology. The most basic concept is through
ing of the grid focuses on the computation, but the the huge computing network which will automati-
semantic Web is more inclined to reasoning and cally split into numerous smaller subroutines. Then
proof. the search and analysis in large systems composed
At present, the lack of machine readable and of many servers will return the results back to the
understandable data semantics, means lack of user. Through cloud computing technology, net-
good cooperation between people and machine work service providers can be reached within a few
support. It is difficult for machines to process seconds to deal with tens of millions or even bil-
heterogeneous resources, realise resource sharing, lions of information, to achieve and “super com-
and automatically generate knowledge accord- puter” equally powerful network services.
ing to the needs of users. While the semantic Web The Peer To Peer (P2P) technology mainly
realises the sharing of resources (including hard- refers to the information control technology which
ware and software resources), but it is difficult to is formed by the hardware, and its representative
meet the growing computational requirements. form is the software. In a simple way, P2P makes
While the semantic network has realised the shar- it easier to communicate and share and interact
ing of resources (including hardware and software more directly, eliminating the middlemen. Another
resources), it is difficult to meet the needs of KT important feature of P2P is to change the status
benefits growth. The semantic grid describes all of the Internet now as the centre of the Ethernet,
the resources, including the service using machine- to return to the non-centre, and the right to return
understandable semantic information, to realise the to the user.
interaction with no ambiguity. The development
of the semantic grid cannot be separated from the
2.4 Technology integration and intelligent
development of the Web, semantic Web and grid.
technology
The grid is the improvement of Web in computing
power, and the semantic grid is the extension of the The combination of RFID technology and sen-
semantic ability of the grid. From the other point sor network technology is a development trend
of view, the semantic Web enhances the semantic of the Internet of things in the future. Due to the
function on the existing Web, and the semantic poor anti-interference performance of RFID and
grid is the extension of the computing function of the effective distance of generally less than 10 m,
the semantic Web. its application is limited. If the wireless sensor is
The emerging semantic grid, using the Inter- combined with RFID, the effective radius of the
net and geographically widely distributed rules former is as high as 100 m, the wireless sensor net-
of resources (including computing resources, work is formed, and the application prospect of
storage resources, bandwidth resources, software the wireless sensor network is immeasurable. Sen-
resources, data resources, information resources, sor networks generally do not care about the loca-
knowledge resources, equipment and even peo- tion of the node, so the nodes are generally not the
ple, generally represented by ontology (ontology overall use of the logo, and RFID technology for
is a kind of expression of resource specification)) the node’s logo has a unique advantage. Combined
together to make the network become a global together, the network can mutually compensate for
information resource database. The information each other’s shortcomings. The main focus will be
191
concentrated on the data network, when there is a into the P2P, the formation of the semantic P2P.
need for specific consideration to a specific node The proposed semantic P2P makes the information
information, which can also use RFID functions structured, easy to query and understand. Infor-
to easily find the location of the node. mation is stored in the form of the body. Ontology
The Internet of things is made up of a large is defined as the basic terms and relations that con-
number of sensor network nodes. In the proc- stitute the vocabulary of the relevant domain, and
ess of information sensing, it is not feasible to the definition of the rules of the extension of these
use individual nodes to transmit data to the sink terms by using these terms and relationships.
node separately. Because there is a large amount In addition, semantic P2P technology also
of redundant information in the network, it will solves the problem of the centralised architecture
waste a lot of communication bandwidth and val- brought about by the difficulty to maintain. In a
uable energy resources. In addition, it will reduce distributed environment, different nodes perform
the efficiency of the collection of information, the tasks such as processing and managing knowledge
timeliness of the impact of information collection, in the information exchange. Participants in the
and it is necessary to use the data fusion and intel- semantic P2P architecture, the management bur-
ligent technology to deal with it. den reduction, knowledge sharing and information
The so-called data fusion is the process of retrieval are also simplified. Semantic P2P applica-
processing a variety of data or information, com- tion of Internet of things can improve the speed of
bined efficiently in-line with the needs of users of the network, to achieve resource sharing.
the data. Intelligent analysis and control infor-
mation mass is relying on the advanced software
engineering technology, mass storage and fast 3 CONCLUSION
processing of all kinds of information on the Inter-
net of things, and the results of various real-time Internet of things is an important means of sup-
feedback to the networking control unit. port from the manufacturing country to manu-
Intelligent technology is to achieve a certain facturing powerhouse, and vigorously promotion
goal, by using knowledge analysis of the various of the Internet of things has important practical
methods and means. By implanting an intelligent significance. In the advent of the information rev-
system in the object, it can make the object have olution, the Chinese government and enterprises
a certain intelligence, active or passive, to achieve should pay special attention to this opportunity,
communication with the user, which is also one and strive to third wave as an opportunity to real-
of the key technologies of the Internet of things. ise the rise of China’s information industry, driven
According to the connotation of the Internet of by the rapid development of China’s economy. The
things, we can know that the real things need to focus of China’s development of the Internet of
be aware, transmission, control and intelligent and things is to address the key technologies involved
many other technologies. The study of Internet of in the Internet, and the integration of these tech-
things will drive the whole industry chain or pro- nologies to various industries. In this paper, a vari-
mote the common development of the industrial ety of technology characteristics are applied to the
chain. Research and application of information Internet of things, to lower the cost of the opera-
technology, network communication technology, tion of the Internet of things. It has a strong use
data fusion and intelligent technology, and cloud value.
computing technology, will directly affect the devel-
opment and application of the Internet of things.
Only comprehensive research can solve these key
problems; things can get rapid promotion, to ben- REFERENCES
efit the human society, and provide good wishes to
Atzoria, L. et al. (2014). The internet of things: a survey,
realise the wisdom of the earth. Computer Networks, 54(15), 2787–2805.
In the P2P architecture, the information Kevin, A. (2015). That ‘Internet of Things’ thing. RFID
resources are oriented to the human rather than Journal, 22 July 2015.
the machine. The information on the node is a Kyildiz, I. Su W. Sankara E. (2013). Wireless sensor net-
chaotic data rather than knowledge, the ontology works: a survey. Computer Networks, 38(3), 393–422.
192
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: It’s very important to research gas-sensing analysis systems for the development of gas
sensors. The early ceramic devices mainly based on semiconductor oxides have been widely used for com-
mercialisation, while the gas-sensing analysis systems designed for the analysis of the ceramic devices
cannot be appropriate for all of the novel devices. The new gas sensors based on the planar technology
can make up for the deficiency in the fabrication process of ceramic sensors. The novel analysis systems
exploited for planar devices will play an important role in the development of gas sensors. This paper
mainly introduces several novel gas-sensing analysis systems.
193
3 SEVERAL GAS-SENSING which measure the materials grown, assembled or
ANALYSIS SYSTEMS coated on the substrate. The material and probe
are observed by microscope in order to connect
3.1 Chemical Gas Sensor-8 (CGS-8 series) the probe and electrode accurately. The minimum
adjustable distance of the probe is 5 microns. The
The CGS-8 series were manufactured for ceramic
gas-sensing properties of a planar device placed
devices by Beijing Elite Tech Co., Ltd, China. The
on the heating area are measured by adjusting the
series can meet the needs of a different range with
temperature. The CGS-1 TP system is able to meet
low current, which avoids the damage of materials
testing requirements of low resistance, high resist-
caused by self-heating. This system could change
ance and wide resistance of materials. The range
range automatically, which greatly facilitates the
of resistance is from 1 Ω to 2000 MΩ, and the
screening and testing of the device. The CGS-8 sys-
range of temperature is from room temperature to
tem is suitable for a resistance type gas sensor. The
500°C. Continuous measurements are carried out
characteristics of the system are: resistance as the
in the whole range. The system provides conveni-
output; a range from 1 Ω to 500 MΩ; and a heat-
ent conditions for the development of new types
ing temperature from room temperature to about
of gas sensors.
400°C. The eight channels can be independently
The output of CGS-1 TPU is a voltage signal in
controlled, and the temperature of each channel is
addition to measuring the voltage. The design is in
set by a heating current. Multiple devices can be
good agreement with CGS-1TP.
measured simultaneously under the same tempera-
Compared with the CGS-8 series, the CGS-1TP
ture, they can also be tested independently under
series are especially suitable for the analysis of sen-
different temperatures. Test data can be trans-
sitive gas-sensing materials, and the measurement
ferred to an external computer via USB ports in
of a variety of materials including powder, block,
real time. Sensitive properties of materials can be
porous, thin film and thick film. Even micro-
observed visually.
nano devices combined with the FIB techniques
The CGS-8U system is suitable for a voltage
can be tested. In addition, the CGS-4 TPS series
type gas sensor. The properties of the system are:
were designed with four groups of probes, except
a voltage range from 100 μV to 1 V; a preamp out-
for keeping excellent performances of the CGS-1
put impedance from 1 Ω–1000 MΩ. In a nutshell,
TP series, as shown in Figure 2. The test speed
the CGS-8 series are the preferred systems for the
is greatly accelerated because of the four devices
analysis of ceramic devices.
tested simultaneously.
The ways of gas distribution for the CGS series
3.2 CGS-1TP series are provided by Beijing Elite Tech Co., Ltd, China
with the static distribution system including air
To meet the demands for the development of new
chamber, injection drilling, heater, fan etc. The
gas-sensing devices, intelligent gas-sensing systems
vacuum system can be connected to a dynamic dis-
were fabricated including CGS-1TP (resistance
tribution system by reserved air inlet and air outlet.
type) and CGS-1TPU (voltage type).
Users can also customise the dynamic distribution
The CGS-1TP system includes several modules
system according to their needs. The static distri-
such as temperature control, probe control, vac-
bution system can be used to roughly analyse the
uum, distribution system, data acquisition and test
property of quick response and screen a device.
software, as shown in Figure 1. The system can-
The dynamic distribution system is suitable for
not destroy the morphology and structure of the
materials without grinding and roasting process,
194
measuring various gases with higher response Research Staring Foundation for Jilin Agricultural
value and less fluctuation, but the gas configura- University (No. 2015021). Beijing Elite Tech Co.,
tion process takes buffer time. Therefore, users can Ltd, China is kindly acknowledged for introduc-
choose a distribution pattern according to their tions of gas-sensing systems.
actual needs.
The gas-sensing analysis systems can realise
diversified measurements (voltage, current, resist- REFERENCES
ance), but the testing accuracy is not high, and it is
difficult to achieve a wider range of measurements. Chung, W.-Y., Lim, J.-W., Lee, D.-D., Miura, N., Yama-
The main direction of efforts will be more accu- zoe, N. (2000). Thermal and gas-sensing properties of
rate, modes and integrated analysis in the future. planar-type micro gas sensor. Sensors and Actuators
B: Chemical, 64, 118–123.
Ferrara V.L. (2011). Nanopatterned platinum electrodes
4 CONCLUSION by focused ion beam in single palladium nanowire
based devices. Microelectron. Eng., 88, 3261–3266.
Hou, L., Gu, H., Li, S., Fang, D. (2015). Wireless
Over half of a century, ceramic devices based NH3 sensors with high sensitivities fabricated from
on semiconductor oxides have been commer- Au-doped In2O3 nanofibers. Sensor Letters, 13,
cialised. However, new planar devices based on 848–851.
semiconductor processing are more suitable to the Li, W.Y., L.N. Xu, Chen J. (2005). Co3O4 nanomateri-
demands of a variety of materials, such as powder, als in Lithium-Ion batteries and gas sensors. Advanced
thin film and thick film. The novel analysis systems Functional Materials, 15, 851–857.
exploited for planar devices will play an important Lloyd, A., Spetz, et al. (2001). SiC based field effect gas
role in the development of gas sensors. sensors for industrial applications. Physica Status
Solidi (a), 185, 15–25.
Riegel, J., Neumann, H., Wiedenmann, H.M. (2002).
Exhaust gas sensors for automotive emission control.
ACKNOWLEDGEMENTS Solid State Ionics, 152–153, 783–800.
Temofonte, T.A., Schoch, K.F. (1989). Phthalocyanine
This work was supported by the 13th Five-Year semiconductor sensors for room-temperature ppb
Research Projects for Education Department level detection of toxic gases. Journal of Applied
of Jilin Province (No.2016168), the Scientific Physics, 65, pp. 1350–1355.
195
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: With the emergence of cooperative communications for cellular networking, attention has
been paid to clustering techniques, especially clustering algorithms. In this paper, we firstly simply intro-
duce the state-of-the-art in Wireless Sensor Networks (WSNs) and clustering algorithms, and expound
classical clustering protocols and the principle of the conventional K-means algorithm. Next, we propose
a new clustering algorithm for WSNs based on the conventional K-means algorithm. Lastly, simulation
studies show that our proposed clustering algorithm can adaptively get the number of clustering K, fur-
thermore, the clustering result is more uniform, and the improved K-means algorithm is more suitable for
high density network scenarios than the conventional one.
197
communication between the CHs and the base sta- the selected CHs criteria of LEACH adapts the
tion. The existing election mechanism of CHs for typical energy standards. But, in the LEACH algo-
a specific target to control is difficult to make a rithm, the threshold of the selected CHs does not
better trade-off among effectiveness in energy con- take into account the energy factors and needs to
sumption, load balance and the number of CHs. assume that the initial energy of each node is equal,
According to the hop-count from the CHs to the which is inconsistent with the actual situation.
base station, the cluster structure in general can The Deterministic Cluster-Head Selection
be divided into single hop networks and multiple (DCHS) algorithm improves the disadvantages of
hop networks. A single hop communication mode the LEACH algorithm by considering the energy
intra-cluster needs all the nodes and the CHs to be factor with the threshold function of the selected
in direct communication. Long distance communi- CHs. The experiments show that the DCHS algo-
cation can quickly consume the energy of the CHs, rithm effectively increases the network lifetime by
and lead CHs far away from the base station node 20%~30% compared to the LEACH algorithm.
to soon die, which reduces the network connectiv- Heinzelman et al., based on the LEACH algo-
ity and decreases the network life cycle. While the rithm, present a LEACH-Centralised (LEACH-
multi-hop communication mode does not need C) algorithm to resolve the problems that nodes,
CHs, it has the ability to directly communicate according to a random number, decide whether to
with the base station, which avoids the direct com- be elected as the CH and per round the generated
munication with the base station that takes a lot CH has no certain quantity, position and other
of energy. Of course, this increases the energy con- issues, and greatly improves the generated quality
sumption of the CHs close to the base station. But of the CH. Because each node must periodically
compared with the single hop method of long dis- report its own energy, position and other informa-
tance communication, the multi-hop method can tion to the base station, the overhead of clusters
relatively reduce the network energy consumption. is larger, and the network traffic, time delay and
The rest of this paper is organised as follows. the probability of the LEACH-Fixed (LEACH-
In Section II we introduce the classical clustering F) algorithm also centralises the CHs to produce
protocols, and the K-means algorithm is described an algorithm by the base station, being responsi-
in Section III. Section IV proposes the improved ble for selecting CHs. Relative to the LEACH-C
K-means algorithm, and gives the numerical results algorithm, the LEACH-F algorithm does not need
compared with the conventional K-means algo- to loop-construct new clusters per round, and
rithm. Finally, the paper is terminated with conclu- reduces the overhead of the constructing clusters.
sions in Section V. However, because the LEACH-F algorithm does
not dynamically process the joining, failing and
mobility of the nodes, and increases the signal
2 CLASSICAL CLUSTERING PROTOCOLS interference inter-cluster, it is not suitable for the
real network application.
The Low-Energy Adaptive Clustering Hierarchy A Hybrid Energy-Efficient Distributed cluster-
(LEACH) algorithm is first suggested in the clus- ing (HEED) protocol was proposed by Ossama
tering routing protocol of WSNs. The basic idea et al. in 2004. The selection of the CHs mainly
is, through equal probability, to choose the CHs draws on two parameters: primary and second-
with random cyclic, equally distribute the energy ary. The primary parameter relies on the residual
load of the whole network to each node, so as to energy to randomly select the initial CHs set. The
achieve the target of prolonging the network life- nodes with more residual energy will have the
time. When the energy appears inconsistent, it uses larger probability of temporarily becoming the
the counts of nodes becoming the CH as the selec- CH, while whether this node becomes the CH is
tion standard, as shown in the formulation (1). dependent on the residual energy and whether
this is much larger than that of the surrounding
⎧ P nodes. Considering the intra-cluster communica-
⎪⎪ ,n G tion overhead after clustering, the HEED takes
⎛ 1⎞
T ( n ) = ⎨1 − P * r mod ⎟ (1) the achievable average energy intra-cluster as
⎪ ⎝ p⎠ measuring the standard of the communication
⎪⎩ 0, n ∉G cost intra-cluster.
198
distance of the object. The K-means divides the Secondly, the selection of the initial CH has an
objects close to the location into the same cluster, impact on the clustering results. The K-means algo-
so that the final result is to achieve a compact and rithm firstly randomly selects K objects from the
independent cluster. data set as the initial CH, and then loop-calculates
The K-means algorithm has two input param- the two-stage. The subsequent selecting CH is
eters: the data object set and the number of clus- related to the initial CH, and a different initial CH
tering. The essence of the K-means algorithm is may acquire very different clustering results. There-
two process with recycle: First select the initial fore, the K-means algorithm has great depend-
Cluster Head (CH), and allocate the remain- ence on the initial CH, and the selected initial CH
ing objects to the nearest CH. Then calculate the should be a uniform distribution in the data set.
mean square error. If it does not achieve the mini- Lastly, the complexity of the repeated iteration
mum, it continues the calculation, the new CH is time during two stages is higher. As can be seen
the average value of all objects in the intra-cluster, from Figure 2, the K-means needs a continuous
until the result of the clustering does not change. cycle object for classification and adjustment, and
The concrete implementation process is as shown recalculating the CH. When the input data set is
in Figure 2. Lastly, the achieved clustering result fairly big, the execution time of the algorithm is
includes K clustering, the object layout of the sin- longer. Thus, the K-means algorithm requires an
gle intra-cluster is closely, and different clusters improvement according to the division of the big
are far apart and independent of each other. The data set in order to reduce the complexity of time.
K-means algorithm is suitable for a wide difference
of intensive data sets between clusters.
The K-means algorithm has the following three 4 THE IMPROVED K-MEANS
disadvantages. ALGORITHM
Firstly, the number of clustering K is an input
parameter to be predetermined. In the K-means In the K-means algorithm, the number of cluster-
algorithm, the input parameter K needs to be prede- ing K needs to be predetermined, and then the
termined. Under most conditions, we cannot evalu- selection of the initial CH has a severe effect on
ate the data set on the number of categories. This is the clustering results. With regards to the above
the main deficiency in the K-means algorithm. disadvantages, this paper proposes an improved
K-means algorithm for the high density family
base station network. The specific process flow is
as shown in Figure 3.
Figure 2. The flow chart of the K-means algorithm sig- Figure 3. The flow chart of the improved K-means
nal interference increase. algorithm.
199
Based on the above algorithm flow in Table 1,
we get the results of the two clustering algorithms
through the simulation of MATLAB. In Figure 4,
the black solid circle denotes the CHs, the black
hollow circle denotes the Cluster Members (CMs),
and the black solid line connects the CMs and
their corresponding CHs. The parameters of the
simulation use N = 40 and K = 4, i.e. when deploy-
ing 40 nodes within the scope of a small area with
a radius of 200 metres, according to the improved
K-means algorithm, the achieved number of clus-
ters is 4. To make the results comparable, K = 4
is taken as an input parameter of the standard
K-means algorithm, and at the same time the two
schemes use the same position coordinates of the
nodes. Note that the K-means takes the average
value of all objects intra-cluster as the clustering
centre of the new cluster, and the acquired cluster-
ing centre often conforms with the position coor-
200
the superiority of our enhanced K-means algo- Klein, T.E. (2014). Energy Efficient Wireless Networks
rithm to the reference algorithm. In future work, Beyond 2020. //Proc of the Workshop on Research
we will focus on applying it to different scenarios. Views on IMT Beyond 2020, 2(11). Geneva: ITU-R.
Lee, J.S., & Kao, T.Y. (2016). An improved three-layer
low-energy adaptive clustering hierarchy for wire-
less sensor networks. IEEE Internet Things J, 1(9),
ACKNOWLEDGEMENTS 99–104, doi: 10.1109/JIOT.2016.2530682.
Lin, S., & Tian, H. Clustering based interference man-
This work was supported by the Collaborative agement for QoS guarantees in OFDMA femtocell.
Fund Project of Science and Technology Agency //Proc of the WCNC, 5(16), 649–654. Piscataway, N.J.
in Guizhou Province Marked by the word LH on Parker, T., & McEachen, J. (2016). Cluster head selec-
7487 [2014], the National Natural Science Founda- tion in wireless mobile ad hoc networks using spectral
tion of China (NO.61562703), and the project of graph theory techniques. HICSS, 7(24)2, 5851–5857,
education and cooperation for talent team word in doi: 10.1109/HICSS.2016.724.
Sohn, I., et al. (2016). Low-energy adaptive clustering
Guizhou in 2015 (NO:[2015]67). hierarchy using affinity propagation for wireless sen-
sor networks. IEEE Commun. Lett, 20(3), 558–561,
doi: 10.1109/LCOMM.2016.2517017.
REFERENCES Sucass, V., et al. (2016). A survey on clustering techniques
for cooperative wireless networks. Ad Hoc Network,
Amis, A., et al. (2000). Max-min d-cluster formation in http://dx. doi. org/10.1016/j.adhoc.2016.04.008.
wireless ad hoc networks. Nineteenth Annual Joint J. W et al. (2011). A cooperative clustering protocol for
Conference of the IEEE Computer and Communica- energy saving of mobile devices with Wlan and Blue-
tions Societies Proceedings, 1(20), 32–41, doi: 10.1109/ tooth interfaces. IEEE Trans. Mobile Comput, 10(4),
INFCOM.2000.832171. 491–504, doi: 10.1109/TMC.2010.161.
Jia, D., et al. (2016). Dynamic cluster head selection
method for wireless sensor network. IEEE Sens, 16(8),
2746–2754, doi: 10.1109/JSEN.2015.2512322.
201
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Xianhui Li
NARI Group Corporation, Nanjing, China
China Realtime Database Co. Ltd., Nanjing, China
Sheng Zhou
State Grid Zhejiang Electric Power Research Institute, Hangzhou, China
Shengpeng Ji
NARI Group Corporation, Nanjing, China
China Realtime Database Co. Ltd., Nanjing, China
Gang Zhen
State Grid Zhejiang Electric Power Research Institute, Hangzhou, China
Yang He
NARI Group Corporation, Nanjing, China
China Realtime Database Co. Ltd., Nanjing, China
Wei Li
State Grid Zhejiang Electric Power Research Institute, Hangzhou, China
ABSTRACT: This paper presents a new method for the reconstruction of the real-time data centre of
power grid enterprises based on the big data technology. Through the transformation of the real-time
data centre data access interface, we can realise the real-time data access component based on Hbase
data. Based on the Hbase table structure design and parameter tuning, we realise the standardisation of
storage grid enterprises in the real-time data access interface. On account of the UAPI design of large
data components with real-time data centre standard based on migration and smoothing the application
of real-time data transition upper business centre. This method has been verified by the relevant power
enterprises in the national Power Grid Corp, which confirms the feasibility of the method.
Keywords: Real-time data centre; Big data technology; Hbase; Real-time data management; Data access
203
Figure 1. State Grid Corporation of real-time data cen-
tre architecture diagram. Figure 2. Overall structure diagram.
204
4 TECHNOLOGY ARCHITECTURE
205
Figure 8. Application and query schematics.
Figure 7. Real-time data storage diagram.
206
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Xin Liu, Ruqiang Dou, Yuben Yang, Ping Wu & Xuanyu Xiao
School of Mathematics and Physics, University of Science and Technology Beijing, Beijing, China
Sen Chen
Basic Experimental Center for Natural Sciences, University of Science and Technology Beijing, Beijing China
Jianing Sun
School of Automation and Electrical Engineering, University of Science and Technology Beijing, Beijing, China
ABSTRACT: The technology of wireless powers transfer is a potential method of electrical energy
transmission in the future. We made a Wireless Power Transmission (WPT) device via strongly magnetic
coupling resonant, and explained the multiple basic physical phenomena such as frequency splitting and
skin effect etc. Furthermore, we used mathematical software to calculate our WPT model, which can offer
us a theoretical support. We have set experiments courses for both undergraduates and junior students in
Beijing.
Keywords: Wireless power transmission; Strongly magnetic coupling; Frequency splitting; Skin effect
207
The first type is through electromagnetic induc- energy to load. In terms of the strong coupling
tion. Its physical principle is similar to that of the theory, transfer efficiency between two coupling
transformer. It produces induced energy by Lenz’s resonant coils is determined by the degree of cou-
law, which has a high efficiency in transfer. How- pling of these two coils. We defined a ratio rela-
ever, the transmission distance is 1 mm–20 cm. tion of strong coupling and dissipation capacity as
The second type is through electromagnetic cou- follows:
pling resonant. It can be mainly divided into two
types: electric coupling and magnetic coupling.
κ ω 2L ω M π Nr 3 D
Generally, it transfers energy due to the same reso- = = = μ0σ
σππf ⋅ ⋅ (1)
nant frequency of resonators mutual coupling with τ R R ( + ) 2
3
2
2L
each other in the form of a electromagnetic field
in the space. Compared to the electric field, strong where μ0 = Vacuum Permeability: 4π × 10−7
magnetic coupling is safer to explore as the mag- σ = Electrical Conductivity of Copper Conduc-
netic field is safe for people inside. According to tors: 5.998 × 107 S/m.
theoretical calculation, its transmission distance of The strong coupling coefficient is κ. The dissipa-
strongly magnetic coupling is in the range of 10 cm tion capacity is τ. r is the radius of the coil. d is the
to 5 m. Also, in terms of the characteristics of the distance between the centres of the device coils. D
magnetic field, it can penetrate the non-magnetic is the device coil diameter, and N is the number of
substance, which does not change the characteris- coil turns. If the ratio between strong coupling and
tic of the distribution of electromagnetic field. We dissipation capacity is greater than 1, the coupling
think it is the theory model with the most potential. between those is very obvious, and the transmis-
The third type is electromagnetic radiation mode. sion efficiency will be greatly improved.
Energy is transmitted through microwave and laser According to the strong coupling model, the
by using transmit and receive aerials, which can higher the quality factor, the higher transmission
achieve a long-distance transmission. However, it efficiency will be, but the quality factor will also
has directivity and a very low efficiency. affect the waveform distribution of its frequency.
In other words, it is possible to make the bimodal
vicinity of frequency division become a single peak,
3 KEY FACTORS OF SMALL WIRELESS making it difficult to control the resonant point.
POWER TRANSFER VIA STRONG According to the coupling model, the quality
MAGNETIC COUPLING RESONANT factor is calculated as follows:
Currently, the model of wireless power transfer R0 + Rr ω
device via magnetic coupling resonant is divided Γ= Q= (2)
into two categories. The first is the high-power 2L 2Γ
transfer device model with the basis of three-coil
On the other hand, in the high frequency case,
structure. Aanother is the four-coil (Kiani, 2011)
the coils will not only have ohm capacitances RO,
structure and is suitable for small WPT. For small
but also have a strong radiation resistance called
power transfer, the structure of four coils is more
R r.
stable. As Figure 1 shows:
The driving coil carries a high-frequency signal
transferred between the driving coil and the trans- μOω l
RO = × (3)
mitting coil via mutual inductance. The transmit- 2δ πa
ting coil and the receiving coil are coupled by the
magnetic field. The coupling coefficient is denoted μ ⎡ π ⎛ ωr ⎞ 4 2 ⎛ ωh⎞ ⎤
2
208
transmission effect. We observed a large transmis-
sion voltage between the two peaks and on both
sides when it exhibits a certain frequency division
characteristic, and that it provides a good band-
width for device making. The bandwidth generated
by frequency division is large due to high frequency,
so we can find a resonant frequency with a reason-
able value in the instrument error range to WPT.
4 THEORETICAL ANALYSIS
AND ACHIEVEMENT
Figure 2. The relation between Q and f.
After theoretical analysis, we use copper conductors
to spiral two same coils as our device coils with radius
10 cm, height 10.5 cm and wire diameter 0.1 mm.
We calculate that the theoretical resonant frequency
is 10.5 MHz. The ratio model of strong coupling to
dissipation capacity is showed in Figure 4.
If the dissipation part is less than the coupling
part, we can receive energy from the receive coil.
Under our theoretical resonant frequency 10.5 MHz,
we can predict that the distance of our model with
the most effective transmission is about 100 cm.
When resonant frequency is an independent
variable, as Figure 5 shows, we can enhance the
transmission distance by improving resonant fre-
quency, which provides us with an effective design
method of our model.
Figure 3. Data of frequency splitting of different
designs.
μ0 J ( r )⋅J ( r )
L=
4π I 0
2 ∫ ∫ drdr ′∫∫ (5)
r r′
1 1 ρ (r )ρ (r′ )
=
C 4πε ο qο 2 ∫∫ drdr ′ r r′
(6)
209
In terms of our calculation above, we make a skin effect. And the formula of skin depth can be
wireless power transmission device via magnetic deduced due to Maxwell’s equations.
coupling resonant. We can achieve wireless charg-
ing in a cell phone 70 cm away and illuminate a 2
light-bulb at 98 cm away, as shown in Figure 6. δ= (8)
ωμσ
Two certain resistances are connected to sepa-
rately driving and load coils. A diode is used to as
a signal reflecting the energy transmission. We use In our experiment, we use two wires with differ-
an oscilloscope to measure the volts of the driv- ent lengths connected to the two same light-bulbs.
ing coil and load coil. According to the calculating The longer one is darker than the shorter one. It
formula: can be explained by the skin effect, which plays a
huge impact on the transmission efficiency.
U12 U 22 P1
P1 = P2 = η= × 100%, (7) 5 CONCLUSION
R R P2
We focus on several important aspects of the mag-
we can get a transmission efficiency distribution as
netic coupling resonant wireless power transmission
shown in Figure 7. We can discern when the trans-
model such as calculation of capacitance, induct-
mission distance is less than 70 cm that the trans-
ance, quality factor and resonant frequency. We use
mission efficiency is above 80%, which can meet
the ratio of strong magnetic coupling to dissipation
the basic requirement of the experiment.
capacity to predict how far our device can transfer
When the receive coil is 100 cm away, the trans-
energy. Furthermore, we conduct experiments to
mission efficiency is about 40%, so it causes a lot
explore the effect of resonant frequency between
of energy waste. For the sake of keeping our power
the driving coils’ turns, size and transmitting coils’
amplifier safe, we do not improve the output
size, and we can observe skin effect using two dif-
power. We therefore cannot ignite a light-bulb at
ferent lengths of wires. Eventually, we make a small
that distance or charge a cell phone. However, we
power wireless transmission device. We have opened
still can detect a voltage signal on the oscilloscope.
experiments for undergraduates in University of
As a result of high-frequency alternating cur-
Science and Technology Beijing (USTB) supported
rent, the whole device has a huge impact due to
by Physics Experiment Center USTB. In addition,
this device has become a sub-item course of Open-
ing course held by Beijing Municipal Commission
of Education. We have now set experiment courses
for more than 1,000 junior students in Beijing.
ACKNOWLEDGEMENTS
210
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Jing Wan
Equipment Academy of the Second Artillery Force, Beijing, China
Yue Ren
Unit 96819, Beijing, China
ABSTRACT: Aiming at the influence of jammers on shortwave communication, a simulation and veri-
fication method of shortwave communication based on OPNET is proposed. Analysing the working
principle of shortwave communication, the node model of shortwave communication based on OPNET is
established, and the module nodes are interconnected by modular programming. Accordingly, the short-
wave communication scenario, based on the node model, is constructed to perform the commutation
process as well as to verify the influence of the interference on shortwave communication, and validate
that the average bit error changes under different conditions. The experimental results show that the
proposed model can effectively validate the influence of interference on shortwave communication, and
provide an effective basis for shortwave communication performance evaluation.
212
3.1.6 Interference node
This module is the interference packet generation
module, including the transmitter and antenna.
213
4 SIMULATION AND ANALYSIS the first minute, respectively, because the network
simulation starts running. A minute later the frame
The data obtained through the operation of simu- error rate begin to slowly rise, and tends to be gen-
lation from first level of nodes 1 and 2 is shown in tle between 0.24 and 0.26. However, Figure 9b
Figure 9. shows that under interference, the frame error rates
As shown in Figure 9a, without interference, the not only begin to be gentle between 0.26 and 0.30,
frame error rates from nodes 1 and 2 rise rapidly in but also their slope is greater, so this phenomenon
indicates that they change largely in the unit time.
Through the simulation of the shortwave com-
munication, it proves that the interference which
leads the error rate, the number of retransmissions
to have a greater change on shortwave communica-
tion is more obvious.
5 SUMMARY
REFERENCES
214
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: To solve the problem of frequency hopping signal detection and investigation, first the
Short-Time Fourier Transform (STFT), Gabor transform, Wigner Distribution (WVD), Pseudo-Wigner
Distribution (PWVD), Smoothed Pseudo-Wigner (SPWVD), Wavelet Transform (WT) and other common
non-stationary random signal analysis methods are introduced. Then, the frequency hopping signal detec-
tion by these methods is simulated on computer, obtaining the map of each method. The advantages and
disadvantages of every method when applied to the analysis of frequency hopping signal are obtained,
providing the foundation for choosing the frequency hopping signal analysis method.
1 INTRODUCTION +∞
STFT
TS (tt f ) )h (
∫ s(τ )h − t)e− j fft
dt (1)
The frequency hopping communication system has −∞
anti-interference ability, strong anti-interception
capability, etc. It is therefore is widely used in the 2.1.2 STFT of the discrete signals
military communication field. With the develop- The STFT of discrete signals via short-time
ment of electronic warfare technology, more infor- Fourier is:
mation about frequency hopping signals needs to
be acquired to come up with a better method for +∞
interference and jamming. STFT
TS (nn f ) ∏ s(m ))hh (m − n) e
−∞
−j ffm
(2)
Time-frequency analysis is a commonly used
method in time-varying non-stationary random
signal description. The time domain information STFTS (t, f) is for the STFT of the signal; h(t) is
and frequency domain information of signals will for the window function.
be mapped to a two-dimensional plane; thisover-
comes the disadvantage that the “positioning” 2.2 The Wigner distribution
of single time and frequency domain description 2.2.1 The Wigner distribution of continuous-time
method is not strong. The frequency hopping sig- signal
nal is a typical signal which is discontinuous and The Wigner distribution of continuous-time signal
non-stationary in the time domain. Therefore, the is described:
time-frequency analysis method will be applied to
analyse the frequency hopping signal to get more +∞
time-frequency information. Wx (t, ω ) ∫ x(t + τ /
−∞
)x* (t / 2 )e j ωττ
dτ (3)
215
2.3 Gabor transform
Gabor transform is a method which, similar to
Fourier transform analysis, constructs a group
locating easily in time and frequency domains.
216
Figure 2. The time-frequency map of frequency hop- Figure 3. The time-frequency map of frequency hop-
ping signal via STFT. ping signal via WVD and its improved methods.
217
4 CONCLUSION
REFERENCES
218
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Tong Liu
Department of Information Engineering, Chongqing Vocational Institute of Engineering, Chongqing, China
Can Dong
Department of Electrical Engineering, Chongqing City Management College, Chongqing, China
Xi Jiang
Department of Information Engineering, Chongqing Vocational Institute of Engineering, Chongqing, China
ABSTRACT: Through relay selection and power allocation can achieve the purpose of improving
the performance of Two-way relay system. This paper considered the probability of outage, proposed a
Relay Selection Strategy based on Probability of Outage (RSSPO) in Two-way AF relay system. In order
to enhance the sum-rate of Two-way relay system, a new Power Allocation Scheme based on Convex
Optimization (PASCO) is proposed when total power is limited. Simulation result shows that both of the
strategies can enhance the performance of the networks.
1 INTRODUCTION N2 to the relay this coefficients is hn2,r. It’s easily get hn1,r
= hr,n1, hn2,r = hr,n2 because the channels are reciprocal.
Previous works has shown that a cooperative In the first timeslot, N1 and N2 transport signals
diversity gain is available in distributed wireless to the relay. Relay node broadcasts the received
networks where nodes help each other by relaying signals that is amplified in the second timeslot.
transmissions. Shannon analyzed channel status
of relay system in (Shannon C E, 1961). (Rankov 2.1 RSSPO (Relay Selection Strategy based
B, 2007; Knopp R, 2007) analyzed the capacity of on Probability of Outage)
Two-way relay system and got the value boundary.
The number of relay nodes in our research is n.
(Huang W, 2007) chose the best coordinated
The SNR threshold value is γth. Outage happened
node by comparing the outage probability of every
when the SNR value is lower than γth. We can get
relay node, and regard the relay with minimum out-
the expression of outage probability in the i link as
age probability as the best transmit node. Author
in (Hui Hui, 2009) introduced a two-step method i
Pout = P (γ i < ) i = 1, 2, 3, 4.
tth (1)
to get the best relay node. We proposed a new way
called RSSPO to choose the best cooperative node 2
based on the probability of outage in each link. γ i is the SNR of the i link, γ i Ei fi / σ 2 . Ei
(Wonjae Shin, 2009) presented a power alloca- means the power allocated to the transmitter of the
tion method to improve the capacity of Two-way link i. fi is the channel coefficient and σ 2 means the
DF relay system. We proposed a power allocation noise and interference.
strategy based on convex optimization in Two-way According to the math analysis, we can get the
AF relay system. expression of outage probability of each link
∞ 1
2 STRATEGIES TO IMPROVE
i
Pout 1 ∫rth _
e − ( γ / γ i )d γ i = 1, 2. (2)
THE PERFORMANCE γi
We consider multiple cooperative relays networks The system get channel state information by
with one source node N1 and one destination node N2 sending the training sequence in all links between
in the system, and the number of relay nodes is n. hn1,r N1 to N3i and get the value of outage probability of
is the channel coefficient of N1 to the relay and from each link by (2), then save the values in Γ:
219
Γ( ) {M M ( ) = P } i
out i = 1, 2, 3, ,n (3) max Rsum
(10)
s.t. E1 E 2 + E3 Et
We can get set Φ of outage probability of the
link N2 to N3i by the same way We regard the Two-way system as two one-way
systems in our research which means the two-way
relay system is consisted by N1 → N2 and N2 → N1.
Φ( ) {N N(( ) = P } j
out j = 1, 2, 3, ,n (4)
We can maximum the capacity of Two-way system
by maximum the rate of two One-way. We decom-
In the next step, we define the function S(tk) pose (10) into two sub-model.
(argument value from t1, t2, t3, …, tn) which can Sub-model 1:
rank the argument value from bottom to the top.
The value of S(tk) is equal to the number of posi- max R12′
tions that tn is ordered in all arguments when (11)
s.t. E1 + E3 ≤ Et1
k = n.
i
Finally, we add the value of Pout and Poutj ,
the relay with the lowest value will be chosen as Et1 is the power allocated in the link N1 → N2.
the best partner. The last step of RSSPO can be R12′ means the sum-rate of the link N1 → N2 which
expressed by can be expressed by
220
⎧α > 1 2
hr 2, n > hr1
2
⎪ r1, n
⎪ 2 2
⎨α = 1 hr 2, n = hr1
r1, n
(17)
⎪ 2 2
⎪α < 1 hr 2, n < hr1
⎩ r1, n
α2
E1′ = pt
α + α +1
2
1
E2′ = 2 pt (18)
α + α +1
α Figure 2. Comparison of PASCO and power equal
E3′ = 2 pt
α + α +1 allocation.
ACKNOWLEDGMENTS
REFERENCES
221
Knopp R, Two-way wireless communication via a relay Wonjae Shin, Namyoon Lee, Jong Bu Lim, An Optimal
station. GDRISIS meeting, 2007. Transmit Power Allocation for the Two-way Relay
Rankov B, Wittneben A, Spectral efficient protocols Channel Using Physical-Layer Network Coding.
for halfduplex fading relay channels. IEEE Journal IEEE International Conference on Communications
on Selected areas in communications, 2007, 25(2): Workshops, 2009: 1–6.
379–389.
Shannon C E, Two-way communication channels. Proc.
4th Berkeley Symp. Math. Stat. Prob. 1961: 611–644
222
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: An updated dynamic channel reservation scheme based on priorities, which works for dif-
ferent classes of service in the Low Earth Orbit (LEO) satellite system, is proposed in this paper. With the
deterministic and predictable LEO satellite motion, user location is not necessary. To obtain the overall
system’s optimal quality of service, the proposed scheme redefines the thresholds distribution for reserved
channels and the method for solving the dynamic thresholds. Then, the analytical approach is described
including the LEO satellite mobility model, the channel allocation model based on Markov chain and
the solution of the thresholds with the method of genetic-particle swarm optimisation hybrid algorithm.
It has been proved by simulation results that the proposed scheme has the capability of offering more accu-
racy and flexibility for the dynamic channel reservation of different classes of service as well as effectively
reducing handover failures. Moreover, the quality of service for the overall system has been improved.
223
Figure 1. LEO satellite systems coverage geometry.
224
Figure 4. Rectangle cell model for considered LEO satellite systems.
meets the Poisson process with mean rate λn, and + ( + ) μend π j + km < j < km +1
the handover call arrival process obeys the Pois-
son process independently to the former. Besides, (3)
the uniform traffic is considered and the call dura- ⎛ 2
⎞ ⎛2
⎞
tion time follows exponential distribution with ⎜⎝ ∑ λ q μend π j
⎠
∑ λqi π j −1
⎝ i =1 ⎟⎠ (4)
i =1
a parameter μ. Therefore, the parameters for the + (j ) μend π j +1 km+1+ < j < km′
LEO mobility model (Cho & Sungrae, 2000; Zhou
et al., 2015) are adopted as shown below.
⎛ 2 ⎞ ⎛ 2 i⎞
⎜⎝ ∑ λ q μend π j
⎠
∑ λ q π j −1
⎝ i m ⎟⎠ (5)
i m +1
3.2 Channel allocation model
+ ( j + ) μend π j +1, j k′km
Based on the mobility model above, one cell could
be modelled as an M/M/C/C Markov process with ⎛ 2 ⎞ ⎛ 2 i⎞
state space, as shown in Figure 5. Among them, ⎜⎝ ∑ λ q μend π j
⎠
∑ λ q π j −1
⎝ i m +1 ⎟⎠ (6)
C is the total number of channels in each cell and i m +1
the state denotes the number of occupied channels. + ( j + ) μend π j +1 km′ < j < km′ 1
The global balance equations for the Markov
process are shown below, where the steady state
To discuss the performance of channel reservat-
probability of the state j, which means j chan-
ion schemes, the well-known parameters (Maral
nels occupied, is denoted as πj. Among them,
et al., 1998; Papapetrou et al., 2005; Boukhatem
( ), k2′ = C and ∑ j = 0 π j = 1.
C
(2)
QoS ∑β ( (
i =1
i Pbi ) + ( )
− Pdi ) (7)
225
Table 1. Parameters for LEO mobility model.
Parameter Description
2
λ ni denotes the new call arrival rate of the i class service.
λn i λ n , ∑ li = 1
i =1
Pni ( e t
)( t ) , Pqi = e − μt max Pni and Pqi respectively denote the new call and handover call
handover probability of the i class service.
(
λ qi = N ni Pni + Nqi Pqi tmax ) N ni and Nqi respectively denote the new call and the handover
call number of the i class service in the previous cell. λ qi denotes
the handover call rate of the i class service.
PNW λn ( n q ) W = λq
PQQW ( n + q ) PNW and PQW respectively denote the probability of occurrence
of new calls and handover calls.
(
μend = 1 PNW E (TNW
W) PQQW E TQQW ) μend denotes average departure rate of the calls.
Parameter Description
C
Pbi denotes the new call blocking
Pbi = ∑ π j probability of the i class service.
j ki
C
Pdi denotes the handover call failure
Pdi = ∑ π j probability of the i class service.
j ki′
226
discussed in this section. Referred to (Zhou, J
et al., 2015), the following assumptions are made
during the process. Class-1 service and class-2 ser-
vice are considered. For different classes of service,
the mean rate of new calls is λ n λ n λ n 2 . The
fixed channel number of one cell is C = 80. The
call duration TC = 1/180 s, and the maximum time
going through one cell is tmax = 57.52 s. In addition,
for the DCRP scheme, at the set-up time, K is set to
{k1 k1′ = 70 k2 k2′ = 80} according to the
FCR scheme. For the UDCRP scheme, K is set to
{k1 k2 = 70 k1′ k2′ = 80}. Evolution gene-
ration is set to 100, and the population is set to
20. Generally, the QoS parameters are set as
α 0 1 α1 10, β1 β2 0.6.
The horizontal axis represents the traffic inten- Figure 8. Handover failure probability for class-1.
sity λn, and the curves are described as a function
of that.
Figure 7 and Figure 8 respectively compare
the handover failure probability of class-2 and
class-1 service between UDCRP, DCRP and FCR.
For class-2 service, with the increasing traffic inten-
sity, UDCRP performs better in terms of hando-
ver failure probability due to the more efficient and
accurate algorithm for solution of thresholds. For
class-1 service, UDCRP achieves obviously lower
handover failure probability mainly because of
higher priority of handover call.
As shown in Figure 9 and Figure 10, the new
call blocking probability of UDCRP for class-2
and class-1 service is higher than FCR and DCRP
because of lower priority of new call, which makes
sacrifice for the quality of service of the overall
system. Among them, DCRP has a lower new call Figure 9. New call blocking probability for class-2.
blocking probability of class-2 service because of
higher priority of class-2 service.
Figure 11 shows that the UDCRP scheme has a
better performance of average quality of service for
the system than FCR and DCRP, especially when
the traffic intensity is heavy. Dynamic channel res-
ervation helps reduce the cost of channel resources
227
satellite UMTS multimedia broadcast multicast ser-
vices. International Conference on Communication
Technology Proceedings (pp. 1078–1081). Beijing,
China.
Boukhatem, L., Beylot, A.L., Gaïti, D. & Pujolle, G.
(2003). TCRA: a timebased channel reservation
scheme for handover requests in LEO satellite sys-
tems. International Journal of Satellite Communica-
tions and Networking, 21(3), 227–240.
Cho & Sungrae (2000). Adaptive dynamic channel
allocation scheme for spotbeam handover in LEO
satellite networks. Vehicular Technology Conference
(pp. 1925–1929). Boston, MA.
Del Re, E., Fantacci, R. & Giambene, G. (1995). Efficient
dynamic channel allocation techniques with handover
queuing for mobile satellite networks. IEEE Journal
on Selected Areas in Communications, 13(2), 397–405.
Figure 11. Average quality of service for the overall Dosiere, F., Zein, T., Maral, G. & Boutes, J.P. (1993). A
system. model for the handover traffic in Low Earth-Orbiting
(LEO) satellite networks for personal communica-
tions. International Journal of Satellite Communica-
5 CONCLUSION tions, 11(3), 145–149.
Fossa, C.E., Raines, R.A., Gunsch, G.H. & Temple, M.A.
A UDCRP which works for different classes of (1998). An overview of the IRIDIUM (R) Low Earth
service in LEO satellite system, is proposed in this Orbit (LEO) satellite system. Aerospace and Electron-
ics Conference IEEE (pp. 152–159). Dayton, OH.
paper. Compared with DCRP scheme, the thresh-
Gao, L., Gao, H. & Zhou C. (2005). General particle
olds distribution for reserved channels and the swarm optimization model. Chinese Journal of Com-
method for solving the dynamic thresholds have puters, 28(12), 1980–1987.
been redefined. The proposed scheme prioritises Karaliopoulos, M., et al. (2004). Satellite radio interface
handover calls of lower class service over new calls and radio resource management strategy for the deliv-
of higher class service. The GA-PSO algorithm ery of multicast/broadcast services via an integrated
has been adopted to calculate the reserved channel satellite-terrestrial system. IEEE Communications
numbers according to traffic conditions. In addi- Magazine, 42(9), 108–117.
tion, the channel allocation model has been estab- Karapantazis, S. & Pavlidou, F.N. (2007). Dynamic time-
based handover management in LEO satellite systems.
lished based on Markov process. Similar to DCRP
Electronics Letters, 43(5), 57–58.
scheme, with the deterministic and predictable Maral, G., Restrepo, J., Del Re, E., Fantacci, R. &
LEO satellite motion, user location is not required Giambene, G. (1998). Performance analysis for a
in the updated scheme. guaranteed handover service in an LEO constellation
The simulation results have shown that, com- with a ‘satellite-fixed cell’ system. IEEE Transactions
pared with the FCR and DCRP schemes, the on Vehicular Technology, 47(4), 1200–1214.
proposed scheme can offer more accuracy and Papapetrou, E. & Pavlidou, F.N. (2005). Analytic study
flexibility for the dynamic channel reservation of of Doppler-based handover management in LEO sat-
different classes of service as well as effectively ellite systems. IEEE Transactions on Aerospace and
Electronic Systems, 41(3), 830–839.
reducing handover failures. Moreover, the quality
Salman, A., Ahmad, I. & Al-Madani, S. (2002). Particle
of service for the overall system has been improved. swarm optimization for task assignment problem”.
Microprocessors and Microsystems, 26(8), 363–371.
Wang, Z. & Mathiopoulos, P.T. (2001). Analysis and per-
ACKNOWLEDGMENTS formance evaluation of dynamic channel reservation
techniques for LEO mobile satellite systems. Vehicular
The National Natural Science Foundation of Technology Conference, (pp. 2985–2989). Rhodes.
China (No. 61272518) and the National 863 Wang, Z., Mathiopoulos, P.T. & Schober, R. (2009).
project (xxx) have supported this work, and the Channeling partitioning policies for multi-class traf-
fic in LEO-MSS. IEEE Transactions on Aerospace and
corresponding author is Jinchun Gao.
Electronic Systems, 45(4), 1320–1334.
Zhou, J., Ye, X., Pan, Y., Xiao, F. & Sun, L. (2015)
“Dynamic channel reservation scheme based on pri-
REFERENCES orities in LEO satellite systems. Journal of Systems
Engineering and Electronics, 26(1), 1–9.
Albertazzi, G., Corazza, G.E., Neri, M. & Vanelli-
Coralli, A. (2003). Performance of turbo coding for
228
Technologies in energy and power, cells,
engines, generators, electric vehicles
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: In order to coordinate relations between charging facility configuration and charging
of Electric Vehicles (EVs), two coordinated charging strategies based on uniform electricity price or
the conventional constant power charging ways were presented here for EVs according to conventional
load types at workplace, parking characteristics of EVs and matching of parking space and charging
infrastructure. In detail, they were parallel charging strategy and grouping serial charging strategy.
Workplace power distribution systems were subsequently constructed for such two strategies. Besides, the
average annual operating cost of charging station was used as an objective function to establish an EV
charging optimization model. Finally, the corresponding simulation results indicated that, comparing with
the parallel charging strategy, the grouping serial charging strategy was able to not only bring down oper-
ating costs of charging stations and charging costs of EVs, but alleviate impacts on a power grid. In this
manner, an effective solution could be provided for charging facility configuration and EV charging.
231
of users cannot be satisfied once they missed the and there are parking EVs there, such parking lots
specified charging duration. can be adopted to park cars and satisfy charging
Charging facility redundancies corresponding demands of EV simultaneously. In this way, new
to the above two configuration schemes are dif- elements are added into traditional electric equip-
ferent. As a result, diverse charging costs can be ment and its load. To be specific, while both charg-
incurred to users. The reasons are as follows. (1) ing facilities and EVs are integrated into electric
To increase the universality of charging facilities, equipment, conventional load is thus provided
manufacturers give considerations to charging with charging loads of EVs.
demands of a variety of EVs at the time of charg- According to related statistics, conventional
ing facility design and manufacturing (mainly loads required by different workplaces have dif-
referring to power output range here) rather than ferent characteristics (Wang, et al. 2007). On one
being confined to charging demands of some hand, some conventional loads are featured with
particular EVs. In other words, it is less likely for significant peak valley fluctuations. On the other
manufacturers to customize a charging facility for hand, others can be very smooth. Therefore, influ-
an EV alone and the problem of charging facility ences of conventional loads are not considered
redundancy exists to some extent. (2) The employ- in this paper temporarily. In line with a constant
ment of diverse charging strategies can also give power charging mode, parallel or grouping serial
rise to charging facility redundancy. Charging charging strategy is employed to charge EVs. The
facilities with different redundancies need differ- corresponding power distribution system struc-
ent costs of configuration. When the redundancy tures are shown in Figure. 1.
is excessively large, operating cost of the charging
facility can be dramatically increased. As a result,
charging costs are brought up for users. Otherwise,
charging costs of users may drop.
At present, charging facility planning and EV
charging are studied separately in a majority of
literatures (Sun, et al. 2013, Zhao, et al. 2015, Lu,
et al. 2014, Xu, et al. 2014, Zhang, et al. 2014).
Especially for studies on EV charging, it is always
assumed that charging facilities have been config-
ured completely, together with presenting a simple
scheme. That is, a certain number of charging piles
of the same type are allocated without considering
relevant redundancy.
To sum up, workplace is selected as charg-
ing station running area targeted at EV charging
problems that are still in presence at present. Then,
impacts of EV charging on charging stations, users
and power grids based on diverse charging strate-
gies are comparatively analyzed. Accordingly, an
effective solution is provided for charging facility
configuration and coordinated charging of EVs.
It is of extensive theoretical and application values.
232
Different charging strategies need different elec- where 1, 2 and u are all serial numbers of levels;
tricity price guidance mechanisms. EV users who among them, u depends on the highest level of a
make use of parallel charging strategy are not charging piles selected for study.
involved with a problem of charging order. There-
fore, electricity price similar to peak-valley price or
3.2 Objective function
the uniform electricity price of charging can be used
as electricity price of EV charging for these users. Normally, operating cost of a charging station
Comparatively, EV users of grouping serial charg- consists of two parts. One is static cost that cov-
ing strategy are associated with this problem and ers purchase and installation costs; the other is
they have special requirements for electricity price dynamic cost that only contains maintenance cost.
forms of charging. In the case that the uniform elec- As far as charging piles are concerned, the lower
tricity price of charging is adopted, such EV users their operating costs are, the more beneficial it will
can be insensitive to charging order that otherwise be to improve the related economic benefits. Pro-
fails to affect their willingness of grouping charging. vided that charging demands of EVs are satisfied,
However, if an electricity price of charging shar- operating costs of charging stations can be mini-
ing some resemblances with the peak-valley price, mized by means of EV charging control (the aver-
such users become sensitive to charging order so as age annual operating cost of charging stations is
to exert an impact on effective implementation of adopted here). Objective functions corresponding
grouping charging. Considering this, uniform elec- to the parallel charging strategy can be written into
tricity price is employed in this paper with an aim to a formula below.
remove impacts of various electricity forms on EV
charging based on diverse charging strategies. ⎡ u n
⎤
F1b (X ) = min ∑ ρ ( i )∑ ( xk ) ⎥ (3)
⎣ i =1 k =1 ⎦
3 EV CHARGING OPTIMIZATION MODEL
where ρ (i) stands for the annual operating cost of
3.1 Optimization variable a single charging piles of type I; and, min [⋅] for a
function with a minimum value. H (xk) can be fig-
According to statistics, a majority of EVs used for ured out according to the below equation.
working have short mileages inside cities (Chen,
et al. 2015) while only a very small number of ⎧1, if xk i
them travelled for a long distance. In addition, Η( k )=⎨ (4)
they stay in workplaces for a very long time and ⎩0, else
diversified charging demands of EVs can be satis-
fied by conventional charging piles in most cases. where xk is the type of a single charging pile
In conformity with charging rate of these piles, corresponding to an EV k.
they are classified into m levels, such as Level 1, Objective functions corresponding to the
Level 2, …, and Level m. On this basis, charging grouping serial charging strategy can be written
piles of diverse levels are adopted by EV charg- into a formula below.
ing to meet the corresponding charging demands
on the premise of taking diversity of EV charging F1 (X ) =
demands and constraints over stopping time into ⎧ u ⎡ n f xk ) ⎤⎫
account. Before optimization, the level of charging min ⎨∑ ρ(i ) Int ⎢ ∑ Δ ( xk ) + Ω( xk )⎥ ⎬ (5)
⎩ i =1 ⎣ k =1 T ⎦⎭
piles that every EV is equipped with is still unclear.
Resultantly, optimization variable is set as the type
of charging piles configured for each EV and it is where Int [⋅] is an integer function that refers to the
also independent of charging strategies (that is, number of type i charging piles configured; T is
grouping serial/parallel charging). Thus, optimiza- operating cycle of a charging station (unit: hour);
tion variables for such two charging strategies are f(xk) is the time taken by an EV k to be charged
expressed into the following equation. by a charging pile xk; Δ(xk) and Ω(xk) are both
modified functions that can be worked out as
X [ x1, x2 , , xk xn ] (1) follows.
⎧1, if xk i
where n is the serial No. of an EV; and, xk is the ( k )=⎨ (6)
type of a single charging pile matched with an EV ⎩0, else
k and its value can be denoted as below.
⎧1, if ( xk ) < xk
Ω( )=⎨ (7)
xk ∈{{ , 2,
k
, u}, k , ,n (2) ⎩ 0, else
233
Another optimization objective of charging is to is charging power of EV k. Moreover, in the case
reduce impacts of EV charging loads on power grid. that EVs are charged by the corresponding charg-
As influences of conventional loads are not consid- ing piles, the charging power is not permitted to go
ered, reduction in volatility of EV charging loads is beyond the upper limit of charging pile output that
able to bring down the relevant impacts on power can be denoted as follows.
grid. Normally, power batteries of an electric vehicle
are charged based on a two-stage charging method 0 ( k ) a ( k ), k 1, …, n (10)
of constant current and constant voltage (Zhao,
et al. 2015). Regarding electric vehicles of conven- In addition, types of charging piles optimized
tional charging approaches, most charging time are must be within a type collection chosen for this
concentrated at the constant current charging stage study. In other words, value of charging pile type
(the constant voltage charging stage can be neglected) xk should satisfy,
and charging power at this stage changes a little. Con-
sidering this, the constant power charging method is 1 xk u, k 1, …, n (11)
adopted for power batteries of EVs described in this
paper. For EVs of parallel charging strategy, parking Above constraint conditions (8)–(11) are all
durations can be uniformly used as the charging time used for parallel/grouping serial charging strategy.
without optimizing the control over charging power. To sum up, EV charging optimization model can
Charging demands of time of EVs are adopted to be solved by COMPLEX and unnecessary details
obtain the associated charging power so as to further will not be further given here.
define charging facility configuration. Evidently, the
total charging load of EVs is at the minimal level, so is
the volatility. But, when it comes to EVs of grouping 4 SIMULATION
serial charging strategy, they are charged by charging
piles of the maximum output to determine the cor- To be specific, a workplace parking lot is used as the
responding charging facility configuration. Then, operating area of charging station in this paper to
charging powers related are adjusted to achieve the construct a power distribution system correspond-
minimum total charging loads of electric vehicles. In ingly. Based on relevant statistical data, perfor-
this way, the volatility is also at the minimal level. mance parameters involved with EVs and settings
Based on the above analysis, the electric vehicle of this charging station, charging situations of EVs
charging optimization model can be used to carry are simulated. The cycle lies between 8:00 and 18:00.
out optimizations according to an individual objec- It is divided into 10 durations and each duration
tive functions (to reduce operating costs of charging lasts 1 hour. The simulation step size is 1 minute.
stations) in the first place. Subsequently, another
objective function is adjusted (to reduce charging 4.1 Basic parameter settings
load volatility of EVs) to acquire the least value. In this chapter, the individual mileage survey statis-
tics of vehicles derived from the National House-
hold Travel Survey 2009 (NHTS2009) are utilized
3.3 Constraints conditions as the mileage of EVs going to work in the work-
To meet charging demands of EVs, the charg- place under study (Chen, et al. 2015). Therefore, it
ing time is not permitted to exceed the maximum is assumed based on mileage statistics of EVs that
charging time when charging piles are used by workplace EV mileages are distributed as shown in
charging stations for EV charging. That is, the Figure 2. Size of workplace EVs is set to be 200.
operating cycle of charging stations is,
f xk ) ≤ T , k = 1,, n (8)
ε Lk
xk ) = , k , ,n (9)
P ( xk )
234
Table 1. Workplace EV Mileage (unit: mile).
1 2.0 2.4 2.6 3.3 4.0 4.9 9.9 13.2 19.4 33.0
2 1.5 2.5 3.7 3.9 4.0 4.4 8.5 17.5 18.6 32.0
3 1.8 2.0 2.5 2.8 2.8 3.3 8.3 14.6 24.5 34.7
4 1.6 2.0 2.3 2.4 3.3 3.3 9.5 16.0 24.2 33.4
5 1.1 2.8 3.5 4.1 4.6 4.8 8.9 12.6 23.4 32.5
6 1.8 2.7 2.9 3.0 4.3 6.1 7.9 13.9 23.6 32.3
7 1.5 1.6 2.6 4.4 4.4 6.3 8.6 14.7 22.9 31.9
8 1.5 2.1 3.5 3.7 4.4 4.8 8.0 13.6 28.7 28.9
9 1.9 2.0 2.4 3.0 3.1 6.8 8.5 13.7 24.3 34.1
10 1.5 2.7 3.5 4.1 4.4 4.7 8.6 14.9 23.0 32.5
11 1.0 1.7 2.6 5.0 7.6 8.4 9.3 13.2 19.6 32.2
12 2.4 2.5 2.8 3.5 3.9 8.1 8.5 16.2 18.9 33.9
13 2.0 2.9 3.2 4.1 4.6 4.8 11.7 13.2 19.9 35.0
14 1.1 3.1 3.3 3.3 4.4 6.7 8.9 17.8 23.0 30.0
15 1.9 2.1 2.4 2.6 2.8 4.7 6.2 17.4 28.4 33.7
16 1.1 4.0 4.0 4.1 4.1 4.9 11.4 13.2 21.5 34.0
17 1.3 1.8 2.1 2.7 3.6 3.8 11.6 17.7 24.8 33.1
18 3.1 4.1 4.7 5.0 6.9 7.2 7.7 9.1 21.2 34.6
19 1.4 2.6 3.3 3.4 4.4 7.6 12.5 17.9 18.1 32.5
20 3.5 3.6 4.2 4.8 7.8 7.8 9.2 12.6 17.2 34.7
235
annual operating costs of charging piles in three lev- purchase cost and yield of charging facilities at the
els can be figured out by supposing that the service time of formulating the electricity price of charging.
life is 6 years and they are 210, 330 and 400 dollars Hence, in the case that there exist definite yield and
separately. Additionally, the uniform electricity price power purchase cost of charging stations, grouping
of charging employed in this chapter is based on serial charging strategy is able to substantially bring
charging cost and charging facility operating cost. It down operating costs of charging facilities if com-
plays a role in guiding coordinated charging of EVs. pared with the parallel charging strategy. Further-
Nevertheless, specific setting of relevant electricity more, the electricity price of charging formulated for
price of charging is not studied here. charging stations based on a grouping serial charg-
ing strategy is also lower. In other words, the group-
ing serial charging strategy can reduce charging
4.2 Analysis
costs for EV users. According to this strategy, the
According to basic parameters given in Part 4.1, charging pile optimal distribution scheme is given
under a circumstance that coordinated charging in Fig. 3 where ellipses in orange represent EVs
of EVs in two charging scenarios is carried out charged by L2 charging piles and blue ellipses stand
based on different charging strategies (EV charg- for those charged by L3 charging piles.
ing controllable), concrete simulation results and Figure 3 indicates that 46 vehicles in a parking
comparative analysis of impacts of charging sta- lot are charged by L2 charging stations according
tions, EV users themselves and power grid are as to a grouping serial charging strategy, while 154
follows. vehicles are charged by L3. Considering EV park-
Regarding a charging station, 200 L1 charging ing positions and charging facility layout, EVs of
piles are equipped in a condition of parallel charg- two kinds are grouped as follows. EVs charged by
ing strategy, while 3 L2 and 8 L3 charging piles are L2 are divided into 3 groups and the number of
provided for the grouping serial charging strategy. vehicles in each group is 14, 16 and 16 respectively.
Charging pile configuration costs and the average With regard to those charged by L3, they are clas-
annual operating costs incurred by both charging sified into 8 groups and the quantities of vehicle
strategies are given in Table 3 below. in each group are 18, 18, 18, 20, 20, 20, 20 and 20.
Table 3 shows that, comparing with the parallel There are varieties of EV grouping schemes in con-
charging strategy, purchase cost, installation cost, crete. Here, only one optimal grouping scheme of
maintenance cost and the average annual operating EV charging is presented, as shown in Figure 4.
cost of charging piles in a condition of grouping In consistency with Figure 4, EVs in every two
serial charging strategy are all lower. Among them, lines are on behalf of a group from top to down.
the average annual operating cost reduces by 90% In total, there are 11 groups. Every group of EVs
(that is, 37,810 dollars). Therefore, the grouping serial
charging strategy has a better capability than the
parallel charging strategy to enormously bring down
the operating cost of charging stations. In addition,
charging facility utilization factors of both charging
strategies are 26.74% and 97.81% respectively (here,
operating duration of a charging facility is 10 hours,
not 24 hours). Resultantly, charging facilities based
on a grouping serial charging strategy rather than the
parallel charging strategy has lower redundancy.
As far as EV users are concerned, decrease in
electricity price of charging can lead to reduction
of charging cost under a circumstance that charging
demands are invariant. However, charging station
operators mainly consider operating cost, power
Annual
Charging Purchase Installation Maintenance operating
strategy cost/$ cost/$ cost/$ cost/$
236
presented here for EVs according to conventional
load types at workplace, parking characteristics
of EVs and matching of parking space and charg-
ing infrastructure. In detail, they were parallel
charging strategy and grouping serial charging
strategy. Workplace power distribution systems
were subsequently constructed for such two strate-
gies. Besides, the average annual operating cost of
charging station was used as an objective function
to establish an EV charging optimization model.
Finally, the simulation results indicated that,
comparing with the parallel charging strategy,
the grouping serial charging strategy was able to
not only bring down operating costs of charging
stations and charging costs of EVs, but alleviate
impacts on a power grid. In this manner, an effec-
tive solution could be provided for charging facil-
ity configuration and EV charging.
ACKNOWLEDGMENT
237
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Kai Wang
China Railway Construction Heavy Industry Co. Ltd., Changsha, Hunan, China
ABSTRACT: The function of the segment erector’s horizontal movement hydraulic system is to feed
the segment for erection; however, due to the large overflow loss of the existing system, the hydraulic
system produced a lot of heat, which led to low efficiency. To solve this problem, a new type of segment
erector’s horizontal movement hydraulic system was designed based on energy saving demands. The new
system can realise energy recycling, and can ensure that the hydraulic cylinder is fast forwarded on a no-
load condition and slowed down on a load condition, which can improve work efficiency. The simulation
analysis and experimental verification of the new hydraulic control system were undertaken, and the
results show that the new system is reasonable, and that it has a significant effect on energy recycling and
the utilisation of the system.
239
the hydraulic cylinder communicates with the rod-
less cavity through the pressure sequence valve in
order to form a double-acting cylinder, so that the
overflow loss of the system is greatly reduced and
the speed of working on no-load is faster. When the
system is disturbed, the load increases, and the bal-
ance valve returning oil opens in order to form the B
type hydraulic half bridge, which makes the system
keep a stable pressure and reduce the disturbance
caused by the jitter of the system. When the multi-
way valve works on the right, the pressure sequence
valve closes under the inlet pressure and the pressure
regulating spring. Then the oil enters the rod cavity
of the hydraulic cylinder through the one-way valve
Figure 1. Principle of horizontal movement hydraulic
of the balance valve, before turning back to the tank
system. overflow through the balance valve inlet oil. Due to
the throttling of the balance valve inlet oil, the sys-
tem has back pressure, so that the hydraulic cylinder
achieves the goal of working slow on load.
Through the analysis, we know that the
improved hydraulic system can not only realise the
energy recovery and utilisation, but also achieve the
function of working fast on no-load and working
smooth return on load. In addition, it can signifi-
cantly improve the efficiency of the system (Wang,
L., 2012; Zhang, S., 2010; Zhang et al., 2007).
242
can not only achieve the goal of energy recovery
and utilisation, but also ensure that the hydraulic
cylinder is fast forward on no-load condition and
slowed down on load condition, which can signifi-
cantly improve the work efficiency of the system.
The simulation analysis and test verification of
the new type of hydraulic system are carried out,
which shows that the design of the system is rea-
sonable and it has a significant effect on energy
utilisation and the improvement of efficiency.
REFERENCES
243
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Jun He
State Grid Hubei Electric Power Research Institute, Wuhan, China
Dahu Li
State Grid Hubei Electric Power Company, Wuhan, China
Long Cheng
State Grid Shiyan Power Supply Company, Shiyan, China
Keywords: Microgrid power planning; Fuel price and technological uncertainty; Assessment metrics;
AHP method
245
on the theory of real option, and qualitatively ana- assume λt is the amount of recording technology
lysed the influence of power planning. innovation, φ ∈[ 0,1) is a constant, standing for the
In addition, in the current study, efficiency indi- degree of technology innovation. Parameter λ is
cators, and complementary benefit evaluation of the arrival rate of technological innovation. Obvi-
different intermittent power supply. Furthermore, ously, the unit cost It has an exponential relation-
there is a lack of comprehensive evaluation of ship with time t:
microgrid planning schemes.
In this paper, based on the traditional micro- E [ It ] = I 0 e − λtt(( φ)
= I 0e γt
(2)
grid planning and evaluation index, a comprehen-
sive evaluation method for optimising a microgrid In Formula (2), γ λt( − φ ). Therefore, if you
power planning scheme considering dynamic time adjust the parameters λ or φ, such as increasing the
and space characteristics is proposed, mainly from arrival rate λ, while reducing the level of technol-
the following aspects: ogy innovation φ, the variable λ(1 − φ) may not
1. Based on the real option theory, a stochas- change. In other words, technical progress uncer-
tic process model is proposed to describe the tainty can be adjusted by adjusting λ or φ.
dynamic spatial and temporal characteristics in
microgrid planning, and the energy price risk 2.2 Wiener process model for describing
index is proposed. the fuel price uncertainty
2. A complementary efficiency indicator is pro-
posed in power supply planning, in order to In a microgrid, traditional high-carbon units such
comprehensively evaluate the effectiveness of a as gas turbine engines need to rely on fossil fuels to
variety of complementary energy supply. generate electricity, so the fuel price directly affects
3. The Analytic Hierarchy Process (AHP) method the traditional operation cost of the unit. In this
is introduced to define the weight of each index, paper, the fuel cost in year t is assumed that the
and make a comprehensive evaluation of the process of change in the future to meet the geomet-
microgrid planning scheme, considering differ- ric Brownian motion (Wiener):
ent space-time characteristics.
dP
Pt
= μdt
d + σ ddz (3)
Pt
2 STOCHASTIC PROCESS MODEL OF
FUEL PRICE AND TECHNOLOGICAL
where μ and σ represent this Brownian motion
UNCERTAINTY
process drift rate and volatility parameters, dz
is the amount change of each step in a standard
2.1 Stochastic process model for describing
Brownian motion process. Assume 0 ≤ μ < r,
technological progress uncertainty
in which r is the discount rate. According to the
To predict the future construction costs and the mathematical properties of geometric Brownian
operation costs of a microgrid plan, a stochastic motion, the future fuel price’s expectation value is:
process model is proposed to assess the price and
technological uncertainty based on the real option E [ Pt ] = P0 e μt (4)
theory.
The initial investment cost of power units is the The fuel price uncertainty parameters can be
most important investment during power planning, adjusted by σ. From the above equation, adjusting
but the progress on production technology directly the parameter does not change the motion paths
affects the construction costs of the unit. Suppose of the Brownian process.
a power planning project is started in year t: t is the
first year when technology advances occur, and then
the project will benefit from the decrease in the con- 3 EVALUATION INDEX OF MICROGRID
struction costs, this part of the cost causes the whole PLANNING CONSIDERING
investment costs to reduce. Technological innovation DYNAMIC TEMPORAL AND SPATIAL
is an external factor in cost reduction, assuming that CHARACTERISTICS
technology changes over the course of time are ran-
dom, and t > 0, the construction costs of the unit are: 3.1 Reliability metrics
The evaluation index system of microgrid planning
It I 0φ Nt (1) proposed in this paper is shown in Figure 1.
In this paper, the reliability metrics mainly
where I0 stands for the unit cost of construction include loss of load probability, loss of load expec-
when t = 1, Nt is the random Poisson variable, tation, and loss of load frequency.
246
Table 1. Objective function symbol descriptions.
Symbol Description
where T stands for the number of hours or years, where K FCCi is the scale factor for each fuel cost of
and the measure of LOLE is usually h/a or d/a. high-carbon energy, Eti stands for the electric quan-
tity by the number i type of power units in year i.
3.1.3 Loss of Load Frequency, LOLF The international crude oil price Pt is equal to E[Pt]
LOLF stands for the frequency of the load demand as discussed in the stochastic process model.
not being supplied in a given time interval. For low carbon energy generations, its annual
operation costs are associated with the unit
LOLF = ∑ Fi (7) capacity.
i s
247
definition of complementary gain capacity and 3.4.2 Pollutant discharge level
complementary degree to measure the benefits. Pollutant emissions per year during the planning
The scenario combined power generation period include CO emissions, CO2 emissions, SO2
system is arranged on the complementary capacity emissions, NO2 emissions.
gain for
Ep b ∗ K var
Ecarbon (14)
Cm Cun − Cwind C PV (10)
where Kvar is discharge of pollutants per kilowatt
where Cm is complementary gain capacity. hour.
∑K
t t0
FC
Ci Eti Pt ∑K
t to
FCi Eti Pcon
= (12)
CCF j ( x )
K carbon =
∑E carbon
(13)
∑E load
248
The steps for calculating the comprehensive Table 3. Attribute decisions of each case.
evaluation data value are as follows:
Attribute Case Case Case Case
1. First, according to the power planning, we need decision 1 2 3 4
to calculate the value of each index, and then
compare the indicators of different plans to do Reliability LOLP 0.000 0.727 1.000 0.455
the normalisation, so we can get an index coef- LOLP 0.000 0.727 1.000 0.455
ficient matrix. LOLF 0.889 0.333 1.000 0.000
2. After the analysis and comparison of the index Economic Life cycle 0.890 0.000 1.000 0.584
set, the decision-maker can construct the appro- cost
priate index weight matrix and the judgement Fuel cost 0.000 1.000 0.465 0.643
matrix, then calculate the maximum eigenvalue Benefit Complemen- 0.000 1.000 0.259 0.630
tary gain
and the characteristic vector, and determine the capacity
reasonable weight matrix. Complemen- 0.000 0.058 0.038 1.000
3. Finally, the comprehensive evaluation value of tary gain
the microgrid power supply planning scheme degree
is calculated by using the linear weighted sum Energy price 0.000 1.000 0.586 0.731
method. risk cost
Environmental The propor- 0.000 1.000 0.338 0.559
protection tion of
5 SIMULATION EXAMPLE high-carbon
unit
Taking a real island grid as an example, the distrib- CO emissions 0.000 1.000 0.281 0.521
uted generations are: wind turbines, photovoltaic CO2 emissions 0.000 1.000 0.281 0.521
cells, gas turbines, and energy storage batteries. SO2 emissions 0.000 1.000 0.281 0.521
NO2 emissions 0.000 1.000 0.281 0.521
249
programmes start respectively from year 2011, of a high-carbon scenario to a balanced scenario,
2012, to year 2039. and make renewable energy power sources more
The simulation of the balanced scenario is cost-effective.
obtained for the future, and the comprehensive
index change trend of the three kinds of planning
scheme are shown in Figure 3. 6 CONCLUSION
The comprehensive evaluation change trend of
the three kinds of planning scheme during high- A comprehensive evaluation method is proposed
carbon scenarios are shown in Figure 4. for optimising a microgrid power planning scheme
As can be seen from the above simulation, con- considering dynamic time and space character-
sidering multi-temporal characteristics, compre- istics. At first, the real options theory and a sto-
hensive evaluation of Case 2 will be better than chastic process model is introduced to describe the
Case 3 in the future. During the balanced scenario, dynamic characteristics of microgrid power plan-
Case 2 will be better than Case 3 in 2021, and in the ning. Finally, the analytic hierarchy process method
high-carbon scenario, the singular point year may is used to determine the weight of each index, and
be delayed until 2032. This is because the uncer- a comprehensive evaluation of the different plan-
tainty of the unit investment and construction cost ning schemes in an independent microgrid is made.
is less in the high-carbon scenario, and new energy The simulation of an island microgrid shows that:
power generation accounted for a relatively high
1. There are dynamic space and time characteris-
level in the balanced scenario, which will benefit to
tics in microgrid power planning, and equivalent
this uncertainty. Science and technology progress
capacity of power planning which start from
and policy support can accelerate the conversion
different years can get different comprehensive
evaluations.
2. The compromise solution is not necessarily
optimal, the future comprehensive evaluations
of Case 2 or Case 3 are better than Case 4.
3. Through policy support, when scientific and
technological progress and tax incentives are
encouraged, the dynamic characteristics of
space and time can be adjusted, so that low car-
bon planning can be more cost-effective at an
earlier time.
In summary, the evaluation method proposed
can reflect the microgrid power optimisation con-
sidering the trend of the temporal dynamic charac-
teristics, and answer the power planning question
of “when to start power investment projects”.
Figure 3. Comprehensive evaluation of microgrid in
different years (balanced scenario).
ACKNOWLEDGEMENTS
REFERENCES
250
Automation of Electric Power Systems, 33(15), 18–23 Pavee, S. & Jorge, V. (2011). Cournot equilibrium con-
(in Chinese). sidering unit outages and fuel cost uncertainty. IEEE
Dixit, A.K. & Pindyck, R.S. (1994). Investment under Transactions on Power Systems, 26(2), 747–754.
uncertainty. Princeton University Press. Reuter, W.H., Szolgayova, J., Fuss, S., & Obersteiner, M.
Fuss, S. & Szolgayová, J. (2010). Fuel price and techno- (2012). Renewable energy investment: Policy and mar-
logical uncertainty in a real options model for electric- ket impacts. Applied Energy, 249–254.
ity planning. Applied Energy, 87, 2938–2944. Shou xiang Wang, Zhi xin Li Lei Wu, et al. (2013). New
Ge, S., Wang, H., & Xu, L. (2012). Reliability evalua- metrics for assessing the reliability and economics of
tion of distributed generating system including wind microgrids in distribution system. IEEE Transactions
energy solar energy and battery storage using Monte on Power Systems, 28(3), 747–754.
Carlo simulation. Power System Technology, 36(4), Tao, W., Zhang, L., & Huang, X. (2007). Dynamics
39–44 (in Chinese). model of generation investment planning in electricity
He, J., Deng C. et al. (2013). Assessment on capacity market. Proceeding of the CSEE, 27(16), 114–118 (in
credit and complementary benefit of power genera- Chinese).
tion system integrated with wind farm, energy storage U.S. Energy Information Administration. (2011). Inter-
system and photovoltaic system. Power System Tech- national Energy Outlook.
nology, 4(4), 37(11), 3030–3036 (in Chinese). Wang, H., Bai, X., & Xu, J. (2012). Reliability assessment
He, J., Deng, C. et al. (2013). Optimal configuration of considering the coordination of wind power, solar
distributed generation system containing wind PV energy and energy storage. Proceeding of the CSEE,
battery power sources based on equivalent credible 32(13), 13–20 (in Chinese).
capacity theory. Power System Technology, 37(12), Wang, X. & Lin, J. (2010). Reliability evaluation based
3317–3324. on network simplification for the distribution system
Jiang, Z. & Chen, J. (2013). Optimal distributed genera- with distributed generation. Automation of Electric
tor allocation method considering uncertainties and Power Systems, 34(4), 38–43 (in Chinese).
requirements of different investment entities. Proceed- Wang, Z. & Su, H. (2014). A decision model for carbon-
ings of the CSEE, 33(31), 34–42 (in Chinese). capture systems best investment opportunity based on
Lei, Z., Wei, G., Cai, Y., & Zhang, X. (2011). Model and real option theory. Automation of Electric Power Sys-
reliability calculation of distribution network with zone- tems, 38(17), 37(11), 137–142 (in Chinese).
nodes including distributed generation. Automation of Yuan, C., Li, F. & Kuri, B. (2011). Optimal power genera-
Electric Power Systems, 35(1), 39–43, 76 (in Chinese). tion mix towards an emission target. Proceedings of
Li, B., Shen, H., & Tang, Y. (2011). Impacts of energy the IEEE Power and Energy Society General Meeting.
storage capacity configuration of HPWS to active Detroit, USA: IEEE: 1–7.
power characteristics and its relevant indices. Power Zhang, L., Tang, W., & Wang, S. (2011). Distributed gen-
System Technology, 35(4), 123–128 (in Chinese). erators planning considering benefits for distribution
Pauli, M. (2007). Timing of investment under techno- power company and independent power suppliers.
logical and revenue-related uncertainties. Journal of Automation of Electric Power Systems, 35(4), 23–28.
Economic Dynamics & Control, 31, 1473–1497.
251
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: In this paper, the structure of a battery holder of electric vehicle is simplified, according
to the operating conditions of electric vehicles. The battery holder is given three conditions of the situa-
tion and through ANSYS, the stress distribution under one condition and the location of maximum stress
are analyzed and calculated.
1 INTRODUCTION
253
Table 1. Acting forces from the mounting bolts. Unit: N.
Force F1 F2 F3 F4 F5 F6 F7 F8
{ ′}e =
{ }
T
(2)
Every element has 6 degrees of freedom and a
Figure 4. Force situation of battery holder. total of 12 degrees of freedom. Using node i, j and
k, coordinate system can be determined. When
the pre-processor is finished, the results will be
The battery pack bears dynamic load in Z direc- calculated.
tion, gravity and the acting forces from the mount-
ing bolts. According to the gravity and working
points, the acting force Fi can be obtained. It is a 3 FINITE ELEMENT ANALYSIS OF
secondary statically indeterminate problem which THE BATTERY HOLDER
can be solved by statics balance equations and geo-
metric compatibility equations. The centre of grav- In the paper, two working conditions are analysed,
ity locates at (0,900.5, 107). The results of acting namely the emergency braking condition and
forces are shown in Table 1. abrupt-turning condition on the bump road. With
Simplified Model of Battery Holder. There are the help of these conditions, the stress distribution
eight positioning holes on the battery holder. The and the maximum stress can be figured out to test
loads from the battery pack transfer to the battery the reliability of the battery holder.
holder through the bolts. Figure 5 shows the set- Emergency Braking Condition. When taking an
ting relation between the battery pack and holder. emergency brake on a bump road, the deceleration
It is easy to find that the stress state of the bat- is about 0.8 g and the dynamic load coefficient is
tery holder belongs to the space steel structure about 2.0. So the vertical load now is doubled.
stress problem. On an issue like this, the element is Meanwhile, the vehicle bears inertial force as well.
made up of nodes i and j assisted by node k. The The results are shown in Figure 6 and Figure 7.
displacement and stress of the nodes are shown in Telling from the figures, the maximum stress which
Equation (1) and (2). locates at the border of rear beam and carling is
about 12.8 MPa. The maximum displacement
{δ } { } which locates at the border of front beam and car-
T
θ xi θ yi θ zi u j v j w j θ xj θ yj θ zj (1)
i i i ling is about 3.88 × 10−3 m.
254
Figure 6. Stress reprogram. Figure 8. Stress reprogram.
255
Table 2. The first six natural frequencies of the battery holder.
Order First Order Second Order Third Order Fourth Order Fifth Order Sixth Order
the full product development life cycle can be institutions are actively developing the new energy
shortened, that means companies can reduce time- vehicles and components. However, CAE analysis
to-market for new and improved products, solve carried out on the battery pack and holder is just
business problems more quickly, and address client on the start stage in China, hence, the work can
concerns right away. FEM has already become a be quite meaningful in the process of design and
common method among manufacturers and insti- manufacture.
tutions which brings great benefits to them.
REFERENCES
5 SUMMARY
Ma X., Y.S. Shen: The Finite Element Analysis and
This paper analyses the battery holder based on Optimization of the Frame Rigidity and Modal, Bus
ANSYS. Through the CAE analysis process, it Technology and Research, Vol. 4 (2004).
can make forecasts for the structure reliability and Tao Y.P.: Application of CAE Technology in Electric
performance, so that the cost of development and Vehicle Battery Pack Design, Henan Automotive
Engineering Technical Seminar (Henan, China,
risk can be greatly reduced. On the other hand, it September, 2012).
can improve the quality of the product and shorten Ye Q., Y.D. Deng, Y. Wang, W. Tan: Finite Element
product development cycle. Currently, new energy Analysis and Optimization of a Light Vehicle Frame,
vehicles are developing rapidly and domestic Journal of Wuhan University of Technology, Vol. 2
and international related manufacturers and (2008).
256
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: Microgrid technology is one of the most effective ways to solve the grid-connected
problem of a distributed generation system. A micro-network system based on optical storage has the
characteristics of full utilisation of clean energy and reliable operation. Smooth switching between grid-
connected and isolated island operation modes is an important guarantee of safe and stable operation.
To solve this problem, a new master-slave and peer-to-peer control strategy is adopted to control the
transition of the grid-connected/isolated operation mode, and the optical microgrid model is built on the
PSCAD platform. The simulation results verify that Control strategy feasibility.
257
through the inverter and then connected to the The inverter PQ control circuit topology is shown
10.5 kV distribution network through the trans- in Figure 2. If the d-axis and the voltage vector are
former. The power supply of the load is isolated by chosen in the same direction, the q-axis voltage com-
two micro-source. Micro-grid by the public switch ponent can be made zero. At this time, the power
K1 action to achieve the grid and island switching. output expression can be decoupled to obtain the
When K1 closed and run, when K1 open into the reference current idrf and iqref of the voltage flow
island running state, micro-grid and large power to the feeder. Corresponding to Figure 2, the rela-
disconnected. tionship between the voltage and current across the
line directly connected to the distributed power sup-
ply can be expressed as the following general form:
3 GRID-CONNECTED/ISOLATED
ISLAND OPERATION CONTROL ⎧ diid
STRATEGY ⎪uFd = ud + Rid + L ′ dt − wL ′iq
⎨ dii (3)
3.1 PQ control strategy ⎪uFq Riiq L ′ q − wL ′id
⎩ dt
Figure 2 is the design of the PQ controller structure.
The active power and reactive power are decoupled Figure 2 is based on 1 and 2 design PQ controller,
to control the current, and the PI controller can the controller current control and Figure 2 gives
make the steady-state error zero. The use of Phase- the same idea of the inner loop controller, but in
Locked Loop (PLL) technology can be used to con- the specific form of some adjustments, while omit-
trol the DG PQ can get frequency support. ting some non-critical Sexual links.
Given that, in the dqo coordinate system, the
distributed power system injects the exchange net-
work, the power is 3.2 Droop control strategy
Droop control is mainly used in the peer control of
⎧Pgrid ud id uqiq microgrid to achieve coordination of multi-DG pro-
⎨Q u q id ud iq
(1)
cessing control, but droop control is a differential
⎩ grid
control and cannot make micro-network frequency
If the Park transformation is selected the d-axis or voltage to restore the original level of the grid.
in the same direction as the voltage vector, the In Figure 3, since the frequency signal facili-
q-axis voltage component can be made zero. At tates the measurement, the frequency control is
this point, the power output expression can be sim- used instead of the phase angle control. The input
plified to active power only with the d-axis active power in the control loop is the output power of
current, and reactive power only with the q-axis the distributed power supply. Among them, the
reactive current, which can be through the power distributed power output active power P and reac-
reference and AC network side voltage value cal- tive power Q must be full of 0 ≤ P ≤ Pmax and
culated current reference Value, as shown in the −Qmax ≤ Q ≤ Qmax these two conditions, the
following equation, this control is a simplified con- power controller output will be used as inner ring
stant power control mode. dq axis reference voltage.
In Figure 4, the controller parameters to the
inverter output impedance was emotional, exter-
⎧ Preef
⎧Pgrid ud id ⎪⎪idref = u nal voltage loop using PI controller to improve the
⇒⎨ steady-state accuracy; inner current loop using the
⎨Q ud iq
d
Qreef
(2)
⎩ grid ⎪iqref = −
⎪⎩ ud
Figure 2. Block diagram of PQ control. Figure 3. Diagram of the droop power controller.
258
voltage deviation. The PI controller is used to real-
ise the frequency and voltage unequal control. The
structure block diagram of the V/f controller is
shown in Figure 6.
259
Figure 7. Diagram of integrated microgrid control
strategy.
260
tions of the impact caused by the microgrid, and REFERENCES
enhance the stability of the entire system.
Chen, X., Ji, Q., & Liu, F. (2014). Smooth switching con-
trol strategy based on microgrid master slave. Struc-
6 CONCLUSION ture Transactions of China Electro technical Society,
60(29), 163–170.
Lee, C.T., Jiang, R.P., & Cheng, P.T. (2013). A grid syn-
Smooth switching between grid-connected and chronization method for droop-controlled distributed
isolated island operation modes is an important energy resource converters. IEEE Transactions on
guarantee of safe and stable operation. In view of Industry Applications, 49(2), 954–962.
the shortcomings of the traditional master-slave Majumder, R., Ghosh, A., Ledwich, G. et al. (2010).
and peer-to-peer control, this paper uses an inte- Power management and power flow control with
grated control strategy for microgrid of the grid/ back-to-back converters in a utility connected micro-
island mode of operation to control the transition. grid. IEEE Transactions on Power Systems, 25(2),
A complementary microgrid model is built on 821–834.
the PSCAD platform to realise the control strat- Vandoorn, T.L., De Kooning, J.D.M., Meersman, B.
et al. (2013). Voltage-based control of transformer in
egy of this paper. The simulation results show a microgrid. IEEE Transactions on Industrial Electron-
that the proposed control strategy can ensure that ics, 60(4), 1291–1305.
the power balance, voltage and frequency of the Xiao, Z., Wang, C., & Wang, S. (2009). Small-signal sta-
microgrid remain within the allowable range before bility analysis of microgrid containing multiple micro
and after the operation mode switching, and can source. Automation of Electric Power Systems, 33(6),
achieve the smooth switching of the microgrid 6l–66.
operation mode.
261
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Dapeng Yin, Yi Liu, Zhong Chen, Tao Zhou & Zhiqiang Shi
School of Electrical Engineering, Southeast University, Nanjing, China
ABSTRACT: The rapid development of Electric Vehicles (EVs) has had a prominent influence on the
traffic system and distribution network. The charging load of electric vehicles is affected by quite a few
factors and it has an important significance on modelling and forecasting of large-scale load. This paper
firstly studies the impacts of each factor on charging power properties, including battery characteristics,
SOC (State of Charge) and charging regimes, so as to guarantee the rationality of the input parameters
of the power computation model and thus to establish the charging power computation model of a single
electric vehicle. Then analysis is conducted on travel time, charging start and end time and vehicle flow
properties, and the daily vehicle flow and traffic laws are studied for work days and non-work days based
on the actual data of a practical expressway to establish the expressway EV charging load model. Finally,
it is applied to a practical example using the Monte Carlo simulation method and the results verify the
correctness and feasibility of the model.
Keywords: EVs; Expressway; Charging load forecasting; Traffic law; Monte Carlo simulation
263
models, and then applied the Monte Carlo simula- respectively; Ca(id) is the effective capacity of the
tion method to calculate the charging load. Refer- battery; the unit of Ca(id) is Ah.
ence proposed a charging power demand model for
electric bus and electric taxi based on the operat-
2.2 Initial SOC of the battery
ing raw. Chen et al. (2015) investigated the inter-
relationship of multiple trips in one day based on In a charging cycle, the power demand of electric
Markov chain to give a detailed roadmap of daily vehicle charging changes with time. To determine
routes, taking the influence of external conditions the load generated by the electric vehicle charging,
on energy consumption into account, and deter- the initial SOC of the battery must be obtained
mined the charging criterion. The overall daily at the beginning of the charging. Initial SOC is a
charging load forecast at different places is then random function on the distance that the vehicle
obtained by Monte Carlo simulation. Alizadeh has travelled since the last charge. It can be indi-
et al. (2014) proposed a stochastic model, based cated by probability density function P (SOCi),
on queuing theory, for EV and Plug-in Hybrid which ranges from 0 to 100%.
Electric Vehicle (PHEV) charging demand and can Statistics show that the travel mileage of the car
provide more accurate forecasts of the load using obeys lognormal distribution. So its probability
real-time sub-metering data, along with the level of density function is given as follows [10]:
uncertainty that accompanies these forecasts and
a mathematical description of load, as well as the ⎪⎧ ( ln d − μ ) ⎪⎫
2
1
level of demand flexibility that accompanies this g (d; μ, σ ) = exp ⎨ − ⎬ (2)
load at the wholesale level. Peng et al. (2012) math- d 2πσ
σ2 ⎪⎩ 2σ 2 ⎪⎭
ematically analysed the movement of two infini-
tesimal energy elements and a diffusion charging where d is the mileage; the unit of d is km; μ and σ
load model was proposed. The above research pro- stand for the mean value and standard deviation of
vides a foundation for the daily load modelling of the probability density function respectively.
an electric vehicle charging station. However, there It is assumed that the SOC of the electric vehi-
are few studies on the modelling of the charging cle decreases linearly with the increase in mileage.
load on the expressway. Thus, the initial SOC can be estimated by the mile-
This paper analyses expressway EV travel time, age of the vehicle.
start time and end time of charging, and traffic
flow properties, and studies the daily vehicle flow
and traffic laws of work days and non-work days 2.3 Charging mode
based on actual data of a practical expressway to When electric vehicles begin to charge, the charging
establish the expressway EV charging load model. power of the battery relates to the charging mode.
Finally, considering EV battery characteristics, Currently, there are three main charging modes, as
SOC and charging regimes, the correctness and follows: (1) Constant current charging mode. (2)
feasibility of the model in this paper are verified Constant voltage charging mode. (3) Multi-stage
by Monte Carlo simulation in the example of a charging mode.
practical expressway in Arizona, USA. Currently, two-stage charging mode is gener-
ally used in the electric vehicle charging station.
Namely, the battery will be charged with constant
2 CHARGING CHARACTERISTICS current in the first stage and then constant voltage
OF A SINGLE ELECTRIC VEHICLE in the second stage. In the process of constant cur-
rent charging, the battery terminal voltage is con-
2.1 Characteristics of the battery stantly changing. In the process of constant voltage
So far, a large amount of research has been done charging, the charging current will be dynamic.
to study the characteristics of the battery (Kintner Therefore, the charging power during the charg-
et al., 2007; Wynne, 2009). According to a charge ing process is in a state of change. But, in order
current id, the battery status can be described by to be convenient, it is assumed that the power of
the state of charge of the battery and can be calcu- the electric vehicle battery is constant when being
lated as follows (DeForest et al., 2009): charged according to the charging process of the
lithium-ion battery. Accordingly, the electric vehi-
1 cle charging load can be described by a constant
S (t2 ) = S (t1 ) + ∫
t2
id dt (1) value in the period of charging.
t1 C a (i )
2.4 Charging power
where id is the charging current; the unit of id is
A; S(t1) and S(t2) expressed in the form of a The following will discuss the phosphoric acid
percentage stand for SOC at t1 and t2 moments battery 240100. The charging current is 0.30 C
264
(30 A) and the charging voltage may vary with the busy farming season and the seasonal effects of
capacity. Thus, the power generated by the electric crops. Secondly, the MVC of a tourist city is larger
vehicle charging changes. In order to forecast the than that of an ordinary city due to the increase in
power of electric vehicle charging in a better way, holiday tourists. The main factor influencing the
the charging time can be divided into several peri- MVC is holidays. In the months of Ching Ming,
ods. For the phosphoric acid battery that could be Dragon Boat Festival, Mid-Autumn and Spring
full after 3.3-hour charging, the charging time can Festival, there is a sudden increase in traffic flow.
be divided into 10 periods if 20 minutes is taken The traffic flow of an expressway is different
as a time period. At the beginning of each time between working days and non-working days in a
period, the SOC is obtained as follows [10]: week, so the traffic flow of the expressway demon-
strates the law of weekly variation. In general, for
⎧S (tk ) = SOC Ci tourist cities, the traffic flow is relatively large at
⎪ ⎛ ⎞ weekends and relatively small on weekdays. On the
⎪
(tk ) + ⎜ ∫ id dt⎟ /C
⎨S (tk + ) = S (t /Ca (id ), k ≥ 2 (3) contrary, there is the opposite situation for non-
⎪ ⎝ tk− →tk+ ⎠ tourist cities. However, no matter what kind of city,
⎪⎩S (t( j ) = ( j+ ), j ≥ 1 both the working day and non-working day load
demonstrate periodic variation characteristics. The
where tk– and tk+ indicate the beginning and end of traffic flow distribution is uneven in different time
the kth period. periods of the day. The traffic flow is larger in the
The charging voltage of S(tk–) and S(tk+) are V(tk–) rush hour and smaller at night. Different kinds of
and V(tk+) respectively. Obviously, in the charg- vehicles such as private cars, trucks, official vehicles
ing curve of the 240100 phosphoric acid battery, and buses correspond to a different time-varying
the V(tk+) is larger than V(tk–). In order to forecast curve due to different travel characteristics. For most
electric vehicle charging load more accurately, the cases, the daily time-varying curve has two peaks
charging voltage in the kth period can be indicated which appear in the morning and evening rush hour
by the following equation (Haijuan, 2015): separately, and the peak time period will not last for
too long, usually for about 30 minutes to one hour.
V (tk ) + V (t
(tk )
V (tk ) = (4) 3.2 Analysis of daily traffic flow on expressway
2
According to the above analysis of the traffic flow
Thus, the power generated in the kth period can characteristic, the traffic flow of working days and
be calculated as (Haijuan, 2015): non-working days show different probability char-
acteristics, so the data of the two types should be
N
analysed respectively.
Pk ∑ (V (t )
j =1
j k id,j / η) (5)
The work-day traffic data are analysed through
the MATLAB curve fitting toolbox (Curve Fitting
where N is the number of electric vehicles charg- Tool). The fitting result of the probability density
ing during the kth period; Vj(tk) and id,j stand for function is obtained by segmenting at the lowest
charging voltage and charging current of the jth point of the traffic flow. The time scale is converted
electric vehicle during the kth period respectively; to obtain the probability density function of traffic
η is the transmission efficiency of the electric vehi- flow on work days (Ma Rui, et al. 2015):
cle charging, which is 0.85 in this paper.
⎧ ⎡ ⎛ 4t b1 + 96 ⎞ 2 ⎤
⎪a1 exp ⎢ − ⎜ ⎟⎠ ⎥
3 MODEL OF ELECTRIC VEHICLE ⎪ ⎢⎣ ⎝ c1 ⎥⎦
CHARGING LOAD ON EXPRESSWAY ⎪ ⎡ ⎛ 4t b2 + 96 ⎞ 2 ⎤
⎪ + a2 exp ⎢ −
⎪ ⎜ ⎟⎠ ⎥ ,
3.1 Travel time and charging beginning time ⎢⎣ ⎝ c2 ⎥⎦
⎪⎪ 0 t 3
of Evs fworkday t) = ⎨ (6)
⎪a exp ⎡ − ⎛ 4t b1 ⎞ ⎤
2
Due to different economic levels, seasonal climatic
⎪ 1 ⎢ ⎜ ⎟ ⎥
changes and other factors, the traffic flow of an ⎢⎣ ⎝ c1 ⎠ ⎥⎦
⎪
expressway demonstrates the law of monthly vari- ⎪ ⎡ ⎛ 4t − b2 ⎞ 2 ⎤
ation. The Monthly Variable Coefficient (MVC) is ⎪ + a2 exp ⎢ − ⎜⎝ c ⎟⎠ ⎥ ,
proposed to express the law of monthly variation. ⎪ ⎢⎣ 2 ⎥⎦
According to relevant traffic statistics, for the ⎪⎩ 3 ≤ ≤ 24
monthly change in traffic, there are the following
rules. Firstly, the MVC of a rural road is greater where a1, b1, c1, a2, b2, c2 equal to the undetermined
than that of an urban road, as it is affected by the parameters of the probability density function of
265
traffic flow on weekdays and t equals to the time are in extensive use. Therefore, it is assumed that
scale. the capacity of all battery packs is 16 KWh.
The non-working day traffic data is analised Generally, the number of battery packs can be
through the MATLAB curve fitting toolbox (Curve increased or decreased by carmakers based on the
Fitting Tool). The fitting result of the probability owner’s functional requirements and the vehicles’
density function is obtained by segmenting at the conditions. The capacities of four types of electric
lowest point of the traffic flow. The time scale is vehicles are as follows by reference to the mileage
converted to obtain the probability density function of the ordinary fuel vehicles: the capacity of pri-
of traffic flow at Non-workdays (Ma et al., 2015): vate cars and lease cars is 32 KWh; the capacity of
taxis and official vehicles is 64 KWh with reference
⎧ ⎡ ⎛ 4t b + 96 ⎞ 2 ⎤ to BYD E6.
⎪a exp ⎢ ⎥,0 ≤ t < 3 According to the characteristics of the charg-
⎪ ⎢⎣ ⎝ c ⎠ ⎥⎦
ing modes and the driving rules, charging begin-
fnonworkday t) = ⎨
⎪a exp ⎡ − ⎛ 4t b ⎞ ⎤ , 3 ≤ t ≤ 24
2
(7) ning time, initial SOC and charging power of the
⎪ ⎢ ⎜ ⎟ ⎥
⎢⎣ ⎝ c ⎠ ⎥⎦
electric vehicles can be obtained by the probability
⎩ simulation. Then the total charging load can be
calculated on the basis of vehicle flow. The struc-
where a, b, c are equal to the undetermined param- ture of the charging load calculation is shown in
eters of the probability density function of traffic Figure 1.
flow on non-working days and t equals the time scale.
Capacity Capacity
Type (KWh) Type (KWh)
266
4 CASE STUDY 5 CONCLUSION
The case study is carried out on actual traf- This paper analyses expressway EV travel time,
fic data of the US No. 10 Expressway of Ari- start time and end time of charging, traffic flow
zona 100115 segment sampled with interval of properties considering some factors such as EV
15 min. Traffic data of working days and non- battery characteristics, SOC and charging regimes
working days are analysed so that the parame- and then establishes the expressway EV charging
ters of (7) and (9) can be obtained and given as load model based on the daily vehicle flow and
follows: a1 = 5,230.83, b1 = 61.271, c1 = 28.68, traffic laws of work days and non-work days.
a2 = 4,147.46, b2 = 29.41, c2 = 11.801, Simulation results reveal that, with the perme-
a = 4,009.235, b = 59.017, c = 36.77. ability rising, peak and valley phenomena occur
Considering the characteristics of the user’s in the expressway charging load and become more
driving behaviour, it is assumed that the start prominent. If the EV permeability is relatively
charging time of the vehicle follows uniform high, the charging load will exert great pressure
distribution in 24 periods. There are enough on the distribution network of the traffic system
charging stations on expressways that can meet and additional peak phenomena may appear. As a
the demand for fast charging of electric vehicles. result, the model proposed by this paper is proved
Considering the driving behaviour of the user to be feasible and practical and appropriate to be
and the maintenance and protection of the bat- applied to analyse the influence of EV charging
tery, the minimum value of SOC when charging load on power grids.
begins is 0.2.
According to the above parameter settings, the
simulation is conducted based on (5) and Fig- ACKNOWLEDGEMENTS
ure 1. Viewing 15 minutes as a period of time,
there will be 96 periods a day. The daily load This research was supported by the Project of State
demand of the EV charging station is analysed in Grid Corporation of China (SGTYHT/14-JS-188).
the three cases that EV penetration rate is 20%,
50% and 80% respectively. The EV charging load
demand under two time types of working days REFERENCES
and non-working days is shown in Figure 2 and
Figure 3. ADOT multimodal planning: transportation data man-
agement system. (2015, April 30). Retrieved from http://
adot.ms2 soft.com /tcds/tsearch.asp?loc = Adot&mod.
Alizadeh et al. (2014). A scalable stochastic model for the
electricity demand of electric and plug-in hybrid vehi-
cles. IEEE Transactions on Smart Grid, 5(2), 848–860.
Anonymous. (2015). Beijing-Shanghai high-speed fast
charging network on January 15 from across the
board. FRP/Composite Materials, 5(2), 97–98.
Chen, L. et al. (2015). Electrical vehicle charging load
forecasting model based on travel chain. Transactions
of China Electrotechnical Society, 30(4), 216–225.
Dai, Q. et al. (2014). Stochastic modeling and forecast-
ing of load demand for electric bus battery-swap sta-
Figure 2. EV charging load on working days under dif- tion. IEEE Transactions on Power Delivery, 29(4),
ferent penetration rates. 1909–1917.
DeForest, N. et al. (2009, August 31). Impact of widespread
electric vehicle adoption on the electrical utility busi-
ness: Threats and opportunities. Retrieved from http: //
cet.berkeley.edu/dl/ Utilities _ Final_ 8–31–09.pdf.
Haijuan, L. (2015). Study on short term load forecasting
of electric vehicle intelligent distribution network (dis-
sertation). Southeast University.
Kintner, M et al. (2007). Impacts assessment of plug-in
hybrid vehicles on electric utilities and regional US
power grids part 1: Technical analysis. Electric Utilities
Environmental Conference, Tucson, USA, 1–23.
Long, J. et al. (2015). Optimization of electric vehicle
Figure 3. EV charging load on non-working days under charging station on electric network. Automation of
different penetration rates. Electric Power Systems, (15).
267
Luo, Z. et al. (2011). Forecasting charging load of plug-in Shaoyun, G.E. et al. (2013). Design of charge station on
electric vehicles in China. IEEE Pes General Meeting, expressway considering electricity distribution and
1–8. driving range. Electric Power Automation Equipment,
Ma, R. et al. (2015). Daily load random fuzzy modeling 33(7), 111–116.
of highway electric vehicle charging stations. Journal of Wynne, J. (2009). Impact of plug-in hybrid electric vehi-
Changsha University of Science and Technology: Natu- cles on California’s electricity grid (dissertation). North
ral Science Edition, the electric vehicle charging, 12(4), Carolina: Nicholas School of the Environment of
81–88. Duke University.
Peng, L. et al. (2012). Charging load model based on dif- Zhang, H. et al. (2014). Prediction method of electric vehi-
fusion theory for electric vehicles. Electric Power Auto- cle charging load considering space-time distribution.
mation Equipment, 32(9), 30–34. Automation of Electric Power Systems, 38(1), 13–20.
Ruan, J. (2008). Beijing expressway network planning Zhang, X. (2014). Electric vehicle charging station power
under the regional coordinated development strategy. demand modeling (dissertation). North China Electric
Beijing Planning & Construction, 2, 34. Power University.
268
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: Because the existing methods for machine-team quota measurement are time-consuming
and laborious, it is very important to propose a new method. Considering the characteristics of power
transmission project and quota measurement, this paper presents a hybrid method combined with Gray
Model (GM) and Back Propagation Neural Network (BPNN) to measure the machine-team quota.
Example results show that this method can not only reduce the work of quota measurement, but also
make up for the lack of sample size.
269
explore the inherent law of things using a small other to improve the system’s parallel computing
part of information. capability and system modelling efficiency. The
neural network needs enough sample data to train.
It is obviously difficult for the actual power trans-
2.2 BPNN
mission project. However, the GM can deal with
As the GM does not have strong parallel com- the small sample problem very well. The hybrid
puting capability, the external slight changes will model calculation steps are given below:
lead to recalculation, which is not beneficial to the
1. After the original sequence x(0) is accumulated,
application of the GM. For this reason, the neural
the sequence x(1) is generated, then the gray dif-
network model needs to be introduced. The neu-
ferential equation of the model is established,
ral network model has strong nonlinear capabil-
and the whitening equation is obtained.
ity, generalisation capability and fault-tolerance
2. Solve the algebraic equation to obtain the gray-
capability, and the parallel computing capability is
scale discrete-time response function, and then
powerful. In this paper, Back Propagation Neural
transform the discrete-time response function;
Network (BPNN) is used to measure quota, which
3. The time response function is mapped to the
is one of the most widely used and successful neu-
BPNN to get the gray neural network structure
ral networks at present.
diagram;
BPNN is composed of input layer, hidden
4. Network weights and thresholds are initialised;
layer and output layer, as shown in Figure 1. In
5. For each input, sample for the forward calcula-
the network training phase, the processed samples
tion, reverse calculation, weight correction and
are processed through the input layer. If the error
threshold correction;
requirements or the training times are not reached,
6. Do step (5), and the network training is per-
the input layer, the hidden layer and the output
formed until convergence;
layer are adjusted, making the network become
7. Enter a new sample, do step (5) and (6) until the
a model of adaptive capacity. The BPNN mainly
training of all the samples in the network ends,
includes output model, action function model and
to the step (8);
error calculation model.
8. The network forward calculation, get measured
The specific steps of BPNN are presented as
value.
follows:
1. Initialise the network weights and thresholds;
2. Input training samples and target output; 3 EXAMPLE ANALYSIS
3. Calculate the input for each layer;
4. Calculate network training error; 3.1 Influencing factors analysis
5. Correct network weights and thresholds;
Take the process of ground groove excavation and
6. Calculate the error index;
backfill which is in an earthwork project below a
7. If the error meets the precision requirement, the
220 kV power transmission line, as an example to
training is finished, otherwise go to step (2).
verify the rationality of the above model. Ground
groove excavation and backfill work content are as
2.3 GM-BPNN follows: the excavation, soil replacement, soil fill-
ing, compaction, site cleaning, equipment trans-
The hybrid model is the combination of gray sys-
port etc. The mechanical factors are as follows:
tem and neural network, and learning from each
site mechanical utilisation rate, mechanical opera-
tor’s driving experience, mechanical residue ratio,
mechanical operator’s technical level, measuring
temperature and wind speed, terrain, work area,
organisation level of construction, actual distance
of soil transport.
270
Table 1. The engineering sample data. within 6%, which means that the machine-team
quota of the power transmission project can be
Driving Residue Technical Transport Work Wind measured by the limited finite samples, effectively
year ratio level distance area speed reducing the work. The hybrid method proposed
1 15 0.5 1 500 60 23 in this paper can greatly improve the efficiency of
2 16 0.4 2 200 100 26 the determination, and provide an effective refer-
3 15 0.6 2 1000 150 32 ence for the quantitative measurement of machine-
4 13 0.7 1 800 80 21 team quota for power transmission projects.
5 19 0.5 2 700 200 30
6 14 0.6 2 400 130 28
7 17 0.7 2 1500 90 27 4 CONCLUSION
8 18 0.4 1 1200 160 29
9 15 0.6 2 600 100 24 1. Using the combination model of GM and
10 14 0.4 3 800 120 25 BPNN to measure machine-team quota can
11 18 0.7 1 1000 110 22 overcome the small sample defects, and improve
12 13 0.5 2 1200 140 27 the efficiency of the determination.
13 15 0.6 3 1000 100 24 2. The combined model of GM and BPNN can be
14 17 0.5 1 900 120 22 used not only to measure machine-team quota,
15 13 0.5 1 1200 150 26 but also to measure the material consumption
quota.
3. The sample data used in this paper must be the
Table 2. The results of machine-team quota mea- same type or under the same conditions, as well
surement. as need to deal with the original data.
Actual Measured
value value Error REFERENCES
Sample 1 0.0034 0.0032 5.88%
Dai, Q.M. and Han, W.D. (2003). Inquisition into quota-
Sample 2 0.0036 0.0038 5.55%
tion of terms of works for transmission projects. Elec-
tric Power Construction, 24(3), 64–65.
Ge, S.Y., Jia, O.S. and Liu, H. (2012). A gray neural net-
samples, 13 samples are used as learning samples work model improved by genetic algorithm for short-
and the other 2 samples are used to calculate sam- term load forecasting in price-sensitive environment.
ples. Project sample data is shown in Table 1. Power System Technology, 36(1), 224–229.
Firstly, the GM is used to study the training Guo, Q. and He, X.J. (2016). Hydropower projects quota
samples, and the input value of BPNN is obtained. preparing model based on BP neural network. Yang-
tze River, 47(5), 69–73.
In this case, the node number of the input layer is 6 Liang, J., Guo, Y.P., Ren, M. and Ma, X.C. (2014).
and the output layer is 1. Set the maximum number Discussion on norm adjustment coefficient of cross-
of learning to 10,000 times, the learning precision ing construction in detailed budget estimate norm
to 0.001, and the error sum of square of the learn- of transmission line. Guangxi Electric Power, 37(5),
ing goal to 0.1. When the number of training steps 35–38.
is 2,802, the training error is 0.001, which meets the Ouyang, H.B. (2014). Generation of STEP-NC oriented
requirement of the learning precision. Therefore, working steps sequence based on BP neural networks.
the structure of neural network is 6 × 10 × l. Shanghai Dianji University, 11(7): 42–48.
The field measured data of “ground groove Wang, S.X. and Zhang, N. (2012). Short-term output
power forecasting of photovoltaic based on a grey and
excavation and backfill” collected by “real record neural network hybrid model. Automation of Electric
method” are compared with the measurement Power Systems, 36(19), 37–41.
method proposed in this paper. The results are Xu, Q.S., Chen, N., Hou, W. and Wang, M.L. (2007).
shown in Table 2. Application of transmission line dynamic heat-rating
From Table 2, it can be seen that the error technology. Electric Power Construction, 28(7), 28–31.
between the measured value and the real value is
271
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: Because the existing methods for man-hour quota measurement are time-consuming
and laborious, it is very important to propose a new method. Considering the characteristics of power
transmission project and quota measurement, this paper presents a hybrid method combined with Least
Squares Support Vector Machine (LSSVM) and Particle Swarm Optimization (PSO) to measure the man-
hour quota. Example results show that, this method can not only reduce the work of quota measurement,
but also make up for the lack of sample size. It can provide some reference for quota measurement.
273
1. Penalty coefficient c. According to the proper-
ties of the sample data, the complexity of the
model can be decided.
2. Insensitivity coefficient ε. It shows the expecta-
tion of the error of the estimation function on
the sample data.
3. Kernel function parameter σ. It defines the
structure of the high-dimensional characteristic
space ϕ ( ).
Therefore, PSO is used to optimize the param-
eters (c, ε, σ) of the LSSVM model in this paper.
2.2 PSO
PSO is a kind of evolutionary computation
method proposed by Dr. Eberhart and Dr. Ken-
nedy in 1995. Its basic idea is to find the optimal
solution by information transfer and information
sharing among the individuals in the population.
Suppose the population size is M and each par-
ticle is flying in the D-space, the initial velocity is
Vi [vi1,vi vid ] and the initial position is a ran-
dom variable U i [ ui1, ui uid ], i 1, 2, , M ,
d , , , D. Then each particle will find the opti-
mal solution through two extremes, one is the opti-
mal solution of the particle itself pbesti , expressed
by Pi [ pi1, pi pid ], the other is the entire popu-
lation of the optimal solution gbest , expressed by
Pg [ pg1, pg pgd ].
According to the particle fitness value, the fol-
lowing particle update speed and position can be
obtained until the termination condition is satisfied:
vidk+1 = ωvidk + c1r1 ( pid − uidk ) + c2 r2 ( pgd uidk ) (5) Figure 1. Flow chat of the hybrid model.
274
model of man-hour quota. Since the historical From Table 2, it can be seen that the error
sample size is 19, the population size of the par- between the proposed method and the real value
ticle swarm is set to 19, the maximum number of is about 6%, which means that it can save a large
iterations L is 1000, the search range of W is set to amount of financial and material resources by
[0, 100], and the search range for D is set to [0.1, using the hybrid model for measuring the man-
100]. The initial velocity of the particles is 2. The hour quota. This paper provides an effective
commonly used kernel function are radial basis method for the man-hour quota measurement.
function (RBF), polynomial function and linear
function. Research shows that the radial basis
function has stronger generalization ability. Thus, 4 CONCLUSION
this paper uses radial basis function as kernel func-
tion in order to get the best evaluation model. The 1. Using the LSSVM model combined with PSO
corresponding evaluation results are shown in to measure man-hour quota can avoid the dis-
Table 1. advantage of local optimum. It can improve the
Where, eRMSE ⎡⎣ N1 i =1 ( ˆi i )2 ⎤⎦ , yˆi and yi are
19
efficiency of man-hour quota measurement.
the measured value and the actual value. As can be 2. The hybrid model can be used not only for the
seen from Table 1, when C = 25, ε = 500, σ = 1.4, man-hour quota measurement, but also for
the error of the measured man-hour quota and the machinery classes measurement.
actual man-hour quota is the least. Therefore, we 3. The sample data used to measure the man-hour
select the parameters of C = 25, ε = 500, σ = 1.4 as quota must be the same type or under the same
the final parameters. conditions.
The man-hour quota of the concrete pole trans-
portation below the motor vehicle is measured as
follows. Based on the 19 practical engineering sam- REFERENCES
ples, the hybrid model is built. 17 samples are used
as learning samples and 2 samples are used as the Guo, C. & Zhou, D.C. 2009. The application of genetic
testing samples. The measured results of the man- neural network in calculating man-hour quota.
hour quota are as follows: Mechanical 36(2):15–17.
Li, S.J. & Li, Y. & Hong, W. 2000. A Neural Net-
work Based Method for Determining Time Quota.
Mechanical Science and Technology 29 (2): 266–268.
Table 1. Comparing results of different parameters. Liu, S.H. & Chen, J. 2007. Study on Man-hour Ration
Calculation with Artificial Neural Networks. Machine
C ε Σ eRMSE tool & Hydraulics 35(1): 81–86.
Wang, G.Y. & Li, H. & Ding, J.X. 2008. Based Neural
1 25 500 1.4 5.21 Network method of time quota compute research.
Microcomputer Information 7(24):123–125.
2 30 550 2.2 6.49
Yi, D. & Chen, X.A. & Liu, L.L. 2007. Modeling of Man-
3 40 600 2.8 7.03
hour Quote Information Management System Based
4 50 520 3.2 7.89 on UML. Microcomputer Information 23(1):21–23.
Zhong, H.C. & Liu, J.F. 2003. Rapid Interim Product
Man-hour Ration Estimation with Artificial Neural
Table 2. Man-hour quota measurement results of Network Method. Journal of East China Shipbuild-
concrete pole transportation. ing Institute (Natural Science Edition) 17(2):23–28.
Zhu, L.X & Zhou, J.T & Gao, J.J & Zhang, S.S. 2004.
Measured A Study on the Development of Man-hour Ration
Actual value value (work Based on Artificial Neural Networks. Mechanical Sci-
Less than 500 kg (work day) day) Error ence And Technology 23(6):702–705.
Zhu, Q.Q & Xu, Y.Q. & Zhou, Y.J. 2008. Research and
Sample 1 common 0.136 0.129 5.14% Development of Computer Man–hour Quota Sys-
laborer tem. Mechanical manufacture and Automation Major
Sample 1 Silled 0.015 0.014 6.66% 37(2):25–28.
labour
Sample 2 common 0.136 0.127 6.61%
laborer
Sample 2 Silled 0.015 0.014 6.66%
labour
275
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
277
briefly introduced firstly in Section 2. Then the
equilibrium working principle based on inductors
is described in Section 3. The parameters used in
the simulation and results are given in detail in
Section 4.
2 BATTERY PARAMETERS
R (V − V ) I (1) iL = 1− e L ⎟ (5)
Ron ⎝ ⎠
t0 L Ron (6)
C ′ + SOC2′ + SOC3
η = (SOC1 C ′) /
3 PWM CONTROLLED CONVERTER
(SOC1
C + SOC2 + SOC3) (7)
BASED ON INDUCTORS
The basic topology based on inductors is shown where VL is the voltage across the inductor, L is the
in Figure 1. Every module for equalisation is con- inductance, iL is the inductor current, VB is the cell
nected across each two adjacent cells to allow voltage, Ron is the total resistance of the loop, R is the
energy transfer from the cell with the higher SOC internal resistance of the cell, Rsw is the switch resist-
to the cell with the lower SOC. The energy is first ance, t0 is the time constant, and η is the balancing
transferred from the cell with the higher SOC to efficiency. SOC1, SOC2 and SOC3 stand for the ini-
the common inductor, then the inductor releases tial state of charge respectively, and SOC1’, SOC2’
the energy to the cell with the lower SOC. The pro- and SOC3’ stand for the final state respectively.
posed circuit is derived from the buck-boost con- The equations of relevant inductor current in
verter. The flow direction of energy is determined the first switching cycle are as follows:
by adjusting the duty cycle of the corresponding
transistors, which are triggered by PWM signal.
VB1 ⎛ − on DT ⎞
R
For example, if the SOC of cell B1 is higher iDT = 1− e L ⎟ (8)
than the SOC of cell B2, two steps will be taken to Ron ⎝ ⎠
transfer the electric charge from B1 to cell B2 in.
278
VB1 ⎛ − on DT ⎞
R
V ⎛ − on (1− D )T ⎞
R with increasing inductance is shown in Figure 3.
iT = 1 − e L ⎟ − B 2 ⎜1 − e L ⎟⎠ (9) Considering the appropriate charging/discharging
Ron ⎝ ⎠ Ron ⎝ current for the batteries and balancing speed, the
value of inductance is set to 50 uH in the follow-
iDT is the inductor current when t = DT, iT is the ing study. The corresponding average balancing
inductor current when t = T. The average balancing current between two adjacent cells has a relation-
current between two adjacent cells named Ib and ship with inductance as shown in Figure 4, which
the average inductor current named IL are evalu- shows that the balancing current decreases almost
ated as the measurement index of battery balanc- exponentially with the increase in inductance. In
ing performance. the practical balance strategy, conditions the bal-
When t/t0 ≈ 0, then iL≈VB/Lt, then ancing mechanism is usually working at charging
or discharging mode, the balance current should be
VB 2 (
1 ⎛ V D 2 −V D) ⎞
2
constant with limited fluctuations. Here, when the
Ib = ⎜ B ⎟T (10) duty cycle is set to 0.60 and the inductance is set to
2⎝ L ⎠ 50 uH, the average current between two adjacent
1 1 cells is about 0.65 A.
IL (iDT + iT ) * R
(11) Three equilibrium modes at off working, charg-
2 − on T
1− e L ing and discharging are simulated in similar con-
figuration at D = 0.60 and L = 50 uH. A typical
The balancing mechanism will work when the simulation circuit structure at off working mode is
SOC difference of two adjacent cells reaches 0.2%, shown in Figure 5(a). The balancing result is shown
otherwise the balancing mechanism stops. in Figure 5(b). It can be seen that the cell condition
279
Figure 4. Relationship between inductance and the
average current between two adjacent cells.
5 CONCLUSION
280
and the balancing operation has almost no relation switching converter and super-capacitor. IEEE Trans-
with the outer current. The equalisation efficiency actions on Industrial Informatics, 9, 1139–1147.
can achieve above 90%, the equilibrium circuit Dai, H. (2013). Cell-BMS validation with a hardware-
parameters could be well controlled to obtain high in-the-loop simulation of lithium-ion battery cells for
electric vehicles. International Journal of Electrical
balancing current and the circuit is easy to be mod- Power & Energy Systems, 52, 174–184.
ularised for electric vehicles. Gallardo-Lozano, J. (2014). Battery equalization active
methods. Journal of Power Sources, 246, 934–949.
Park, H-S. (2009). Design of a charge equalizer based on
ACKNOWLEDGEMENTS battery modularization. IEEE Transactions on Vehicu-
lar Technology, 58, 3216–3223.
This work was supported by Natural Science Foun- Lee, Y-S. (2005). Intelligent control battery equalization
dation of Hubei Provincial Education Department for series connected lithium-ion battery strings. IEEE
(Q20131603). Transactions on Industrial Electronics, 52, 1297–1307.
Lu, L. (2013). A review on the key issues for lithium-ion
battery management in electric vehicles. Journal of
Power Sources, 226, 227–288.
REFERENCES Manenti, A. (2011). A new BMS architecture based on
cell redundancy. IEEE Industrial Electronics Society,
Anthony, B. (2014). Statistical analysis for understand- 58, 4314–4322.
ing and predicting battery degradations in real-life Stuart, T.A. (2011). Modularized battery management
electric vehicle use. Journal of Power Sources, 245, for large lithium ion cells. Journal of Power Sources,
846–856. 196, 458–464.
Baronti, F. (2013). High-efficiency digitally controlled Tarascon, J.M. (2001). Issues and challenges facing
charge equaliser for series-connected cells based on rechargeable lithium batteries. Nature, 414, 359–367.
281
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: On-Line Electric Vehicle (OLEV) is a dramatic scheme with infinite cruising ability by
charging along its way using Wireless Power Transfer (WPT). There will be the possibility to lay the
electric cables of the supply rails and ultra-high voltage transmission lines closely parallel to each other
in a confined space. Just because of this sharing of the passageway, the transmission lines aerially may
induce volts on the electric cables and supply rails setting in the same gallery and they can also result in
more acute disadvantageous reactions. This paper studies reasonable impacts of the transmission line
conductors, Extremely Low Frequency (ELF) magnetic field, induced volts, and Electro Magnetic Field
(EMF) exposure on the WPT charging system for OLEV by the ultra-high voltage transmission lines. A
pedestrian with metallic implants is considered in this paper. The EMF is computed using Finite Element
Analysis (FEA) method, and by comparing with the values given by International Committee on Non-
Ionizing Radiation Protection (ICNIRP) guidelines, the degree of influence can be judged.
Keywords: Wireless Power Transfer (WPT); On-Line Electric Vehicle (OLEV); Metallic implants; Electro
magnetic Field (EMF) exposure
283
the vehicle passes away. For simplicity, we achieve 10 Ω. The pick-up coil gets 6,130 W while the
excellent performance of the WPT charging sys- sub-rail coil provides 6,590 W, and the efficiency
tem by using an even higher frequency and refuse reaches 93%.
to utilise any type of magnetic core in the rail coils.
A simplified WPT charging system model is shown
in Figure 1a; the equivalent circuit is shown in 3 TRANSMISSION LINES INFLUENCE
Figure 1b; the pick-up coils and the sub-rail coils of
the WPT charging system are shown in Figure 1c. In this study, the 500 kV ultra-high voltage trans-
The two coils have six turns with a space of 15 cm. mission lines as shown in Figure 3 are considered
The conductor diameter is 1 cm. At 1 MHz, the in extreme proximity to the WPT charging system.
pick-up coil R2 + jωL2 = 0.121 + j54.072 Ω, the sub- Equivalent radius of the phase conductors equals
rail coil R + jωL1 = 2.862 + j850.650 Ω, the mutual 0.211 m. The sub-rail coils are parallel to the ultra-
inductance ωM = 17.258 Ω, the matching capacitor high voltage transmission lines 20 m away, and
C2 = 2.943 nF, C1 = 0.187 nF, so each coil is matched they are 20 cm above the ground plane beyond the
at 1 MHz. shield of any pipelines or concrete. The scenario
While the power source frequency equals 1 MHz can be much worse while the WPT charging sys-
as well, the system is expected to have an excellent tem for OLEV is built on elevated highway. In this
WPT efficiency using Equation 1. study, we adopt this scenario to figure out possible
impacts on the WPT system.
η ω 2 M 2 RL / [ R1 (R2 RL )2 ω 2 M 2 (R2 RL )] (1) As the EMF produced by the 500 kV ultra-high
voltage transmission lines and the WPT charging
As the source voltage equals 1,200 V and resist- system is time-harmonic, the Maxwell’s equation
ance (rs) is 50 Ω, the input and output power is can be written as
shown in Figure 2 as the load resistance (RL) is
∇×H =J + j D
∇ × E = − jω B
(2)
∇⋅B = 0
∇⋅D = ρ
E ∇φ jω A (3)
Figure 1. (a) A simplified WPT charging system model for
OLEV. (b) Equivalent circuit of WPT system. (c) The pick- While
up coils and sub-rail coils of the WPT charging system.
B=∇ A (4)
Figure 2. The input power and output power of the Figure 3. 500 kV ultra-high voltage transmission lines
WPT charging system. and WPT charging system for OLEV.
284
The first line in Equation 2 can be expressed by 3.2 Extremely-low-frequency magnetic field
In the WPT charging system, electric power is
∇ × ( /μ )(
) ∇ × A) (σ + j ε )( ∇φ jω A) (5) transferred from the sub-rail coil to the pick-up
coil through high frequency magnetic coupling
where ε, μ and σ are the electrical permittivity, the while the transmission lines also a produce ELF
permeability, and conductivity of any material. magnetic field. The two magnetic fields are shown
Total current in the conductor is in Figure 5. The WPT charging system produces
a much stronger magnetic field than the transmis-
IT ∫ J d ∫ σ Ed*
E Ω sion lines, and the operating frequency of the two
Ω Ω systems varies tremendously. Hence, the ELF mag-
= ∫ ( + j ε )(
)( ∇φ j A)d Ω (6) netic field produced by the transmission lines will
Ω contribute little to the electric power collection by
the pick-up coil.
where Ω is the solution region, and IT includes the
source current, induced current, and displacement
current. 3.3 Induced voltage
In this paper, the calculation is implemented Influences arising from inductive, capacitive and
by numerical method with FEA tool—ANSYS resistive coupling occur as the electric power supply
Electromagnetics. cables lie parallel to the 500 kV ultra-high voltage
transmission lines (Kopsidas et al., 2008). Resis-
3.1 Transmission line conductors tive coupling comes up in period of ground faults.
During inductive coupling, the volts induced vary
Research has been widely performed on conduc- due to many factors such as the size and location
tive materials appearing close to the WPT active of the cable. Even though the coil and cable are
zone (Onar et al., 2013). The WPT system reso- buried underground, the value can be very high as
nant frequency shifts and its transfer efficiency the length is long (Bortels et al., 2006). In the sce-
is also involved. As a stainless steel plate is set nario shown in Figure 3, without considering the
in the active zone on the axis of the coil centre, shielding effect of the earth, the voltage induced
the plate is 200 cm by 10 cm, and its distance to by capacitive coupling of the sub-rail coil which is
the sub-rail coil changes as a: 0.1 m, b: 0.25 m, c: set above the ground can be calculated using Equa-
0.4 m, d: 1 m. The peak transfer efficiency meets tion 7. Maxwell’s potential coefficient matrix ‘[P]’
68% at 1.09 MHz for a 80% for b, 85% for c, and can be calculated according to the position of the
90% at 1 MHz for d, as Figure 4 shows. The effi- ultra-high voltage transmission lines and the WPT
ciency is almost unaffected by the stainless steel charging system coils. The induced voltage can
plate as the distance of the plate and coil is larger reach up to a few 100 volts, and it increases with
than 1 m. Thus the transmission line conduc- its approach to the transmission lines and reduces
tors are far enough away to ensure that the WPT as the coils are buried underground. The induced
charging system will not be affected. voltage on the pick-up coil is neglected as the coil
is small in size and protected by the electric vehicle
in charging.
[ ] [ ][ /(
/ 0 )] (7)
285
The input current Iin is shown in Figure 6, as
we add a 2 kV power frequency voltage source, as
total volts induced on the sub-rail coil. As a result
of the resonant circuit characteristic, the induced
volts can scarcely enhance the input current. Thus,
the WPT charging system for OLEV will not be
affected.
Nevertheless, the induced voltage by the 500 kV
ultra-high voltage transmission lines on the coil can Figure 7. (a) Induced voltage of the sub-rail coil by the
still lead to more possibility of the risk of suffering transmission lines. (b) Steady-state shock current as the
unpleasant electric shock. Relevant experiments are experimenter keeps in touch with the coil. (c) Transient-
also carried out under the 500 kV transmission lines, state shock current at the moment the experimenter
where the unperturbed electric field is 5.8 kV/m, the touches the coil.
ambient temperature is 35.6°C and the humidity is
29%. The induced voltage of the sub-rail coil Ucoil,
steady-state shock current I and transient-state
shock current i(t) as the experimenter touches the
coil, are shown in Figure 7. A need for concern
is that large shock current may lead to seriously
biological hazard. In the meantime, the induced
voltage by the transmission lines will enhance the
voltage of the capacitor banks, the WPT system
coils and the series connected facilities. Therefore
we should reconsider the withstand voltage, the
electrical insulation, and erosion resistance in the
construction of the WPT charging system. Figure 8. 3D precise finite element anatomic human
model with common tissues and implantations.
3.4 Electromagnetic field exposure
The WPT system should completely conform to lungs and so forth. The electromagnetic param-
the limits such as ICNIRP guidelines (ICNIRP eters of the tissues can be estimated under specific
Guidelines 1998, 2010) in the application to charge frequency (Gabriel et al., 1996). Titanium material
OLEV. in an artificial tooth, artificial arthrosis, and an
With the purpose of avoiding adverse biologi- artificial heart valve are also considered for implan-
cal impacts, those regulations are fixed to protect tation into human body. The EMF exposure from
humans from the excessive exposure to time-vary- the WPT charging system and the ultra-high volt-
ing EMF. The 500 kV ultra-high voltage transmis- age transmission lines (Scorretti et al., 2004; Barch-
sion lines overhead can worsen the electromagnetic anski et al., 2006,; Scorretti et al., 2005; Motrescu
environment, where a pedestrian would be ines- et al., 2006) can be computed respectively as the
capably close. As Figure 8 shows, we create a 3D pedestrian stands at 1 m from the coil and 21 m
precise finite element anatomic human model with from the transmission line corridor centre.
organs such as brain, heart, liver, spleen, kidney, According to the first two in Equation 2, we can
get:
∇ × [(1//μ )∇ × E ] − ω 2ε c E = − jω Ji
(8)
∇ × [(1/ c )∇ × ] − 2 μ = ∇ × [( /ε c ) i ]
J σE
(9)
S 0 e( E × H * )
286
Figure 10. (a) The current density in pedestrian pro-
duced by the ultra-high voltage transmission lines and (b)
by the WPT.charging system. ICNIRP limits for general
public exposure: 2 mA/m2 at 50 Hz and 2000 mA/m2 at
1 MHz.
Figure 9. The current density of usual human tissues
produced by WPT charging system.
287
ACKNOWLEDGMENTS ICNIRP Guidelines. (1998). Guidelines for limiting
exposure to time-varying electric and magnetic fields
This work was supported by Science and Technol- (Up to 300 GHz).
ogy Planning Project of Jiangsu Province (Grant no. ICNIRP Guidelines. (2010). Guidelines for limiting
exposure to time-varying electric and magnetic fields
BE2015004-4), and Major State Research Devel- (Up to 100 kHz).
opment Program of China (2016YFB0101800). Kopsidas, K. (2008). Induced voltages on long aerial
and buried pipelines due to transmission line tran-
sients. IEEE Transactions on Power Delivery, 23(3),
REFERENCES 1535–1543.
Lee, S. (2011). Active EMF cancellation method for
Barchanski, A. (2006). Local grid refinement for low- I-type pickup of on-line electric vehicles, Applied
frequency current computations in 3-D human ana- Power Electronics Conference and Exposition.
tomy models. IEEE Transactions on Magnetics, 42(4), Motrescu, V.C. (2006). Simulation of slowly varying elec-
1371–1374. tromagnetic fields in the human body considering the
Bortels, L. (2006). A general applicable model for AC anisotropy of muscle tissues. IEEE Transactions on
predictive and mitigation techniques for pipeline net- Magnetics, 42(4), 747–750.
works influenced by HV power lines. IEEE Transac- Onar, O.C. (2013). A novel wireless power transfer for in-
tions on Power Delivery, 21(1), 210–217. motion EV/PHEV charging. Applied Power Electron-
Choi, S.Y. (2015). Advances in wireless power transfer ics Conference and Exposition, 3073–3080.
systems for roadway-powered electric vehicles. Emerg- Scorretti, R. (2004). Computation of the induced current
ing and Selected Topics in Power Electronics, 3(1), density into the human body due to relative LF mag-
18–36. netic field generated by realistic devices. IEEE Trans-
Choi, S.Y. (2015). Ultra-slim S-type inductive power actions on Magnetics, 40(2), 643–646.
transfer system for roadway powered electric vehi- Scorretti, R. (2005). Modeling of induced current into
cles. IEEE Transactions on Power Electronics, 30(11), the human body by low-frequency magnetic field from
6456–6468. experimental data. IEEE Transactions on Magnetics,
Gabriel, C. (1996). The dielectric properties of biological 41(5): 1992–1995.
tissues: I. Literature survey. Physics in Medicine and
Biology, 41(11), 2231.
288
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Dongmin Li
Department of Mechanical and Electronic Engineering, Shandong University of Science and Technology,
Tai’an, Shandong Province, China
ABSTRACT: In order to improve the power performance of an engine, oxygen is produced with pres-
sure swing adsorption and mixed with the air from the original intake pipe to realise oxygen-enriched air
intake of the engine. A pressure swing adsorption device is designed based on the volume range of air
intake at different oxygen/air ratio. The air intake system of the four-cylinder gasoline engine is modeled
with GT-Power. Optimisation of air-fuel ratio and valve timing is carried out. During the process of opti-
misation, oxygen/air ratio and the maximum torque at different working points are taken as the optimisa-
tion parameter and the optimisation target respectively. Finally the optimisation results show that torque
of the engine at middle and high speed is increased.
Keywords: Oxygen-enriched air intake; Pressure swing adsorption; Power performance; Optimisation
289
influence on the production efficiency of oxygen.
Rama et al. (2015) studied the performance of a
new system for rapid pressure swing adsorption for
the continuous production of approximately 90%
oxygen concentration from compressed air. Santos
et al. (2007) greatly improved the oxygen purity for
the mixed gas of oxygen with less than 95% purity
and argon, through selecting silver-exchanged zeo-
lite with oxygen/argon adsorption selectivity as the
adsorbent material. The size of the pressure swing
adsorption device is determined by calculating the
flow of intake air of the engine under rated con-
dition, and the proportion of components fully
mixed can be controlled.
In this paper, we provide a mixture of pure oxy-
gen with the Pressure Swing Adsorption (PSA) and
natural air intake. The intake system is modelled Figure 1. Schematic diagram of the oxygen-enriched
with GT-Power. It is done to achieve the engine air intake system.
oxygen-enriched air by changing the oxygen com-
position of the intake air. Then the air-fuel ratio
and the valve timing in typical working conditions u 70% ∗ umin = 0.16 m / s
are optimised with Optimiser in GT-Power, and
the actual air-fuel ratio and valve timing are deter- The minimum diameter of the adsorption tower
mined. Finally, we compare the power performance is:
and emissions with the original model of engine,
and improve the overall performance of the engine.
4 ∗ Qa
Dmin = = 0.087 m
πμ
2 OXYGEN PRODUCTION WITH PSA
Meanwhile, the height/diameter ratio of the
Oxygen is produced by pressure swing adsorption, absorption tower plays a crucial role in ensuring
and mixed with air from the original engine intake the adsorption device provides a stable oxygen
pipe, in order to obtain the oxygen-enriched air supply efficiency and oxygen concentration. In the
intake system shown in Figure 1. This system con- same height/diameter ratio, the higher the com-
sists of an oxygen generator with pressure swing pressor power, the higher the oxygen purity. If the
adsorption and an original engine air intake pipe. height/diameter ratio is too large, the adsorption
Pure oxygen and air from the original intake are process will take too long, the number of adsorp-
mixed in the stabilisation chamber indexed as com- tion cycles per unit time will be reduced, the utili-
ponent 6 in Figure 1, and the mixing ratio of the sation ratio of adsorbent will be reduced, and the
two kinds of gases is controlled by ECU indexed as bed resistance and compressor energy consump-
component 8 in Figure 1. tion will be increased. The height and diameter of
The key structure of the adsorption tower is the absorption tower should meet the following
designed as follows: relationship:
The minimum fluidisation speed of the molecu-
2
lar sieve particles is calculated (Yuan Yi, 2001) ⎛ D⎞
according to Formula 1: 2 H aπρn ⎜ ⎟ = G
⎝ 2⎠
d p2 ( )g
umin =
s
(1) where:
1650 μ G – lithium molecular sieve filling quality;
ρn – molecular sieve bulk density, 680 kg/m3;
where: D – adsorption tower diameter, cm
ρ – air density, kg/m3; The height of the adsorption tower is 54 cm via
G – acceleration of gravity; calculation.
μ – dynamic viscosity of the gas and the mini- According to the overall structure of the pres-
mum fluidisation speed is 0.23 m/s via the cor- sure swing adsorption device and the empirical
responding calculation; value, the height/diameter ratio is calculated as
and the air flow rate in the empty tower is: Ha/D = 6.5.
290
3 PERFORMANCE OPTIMISATION OF values m = 8, N = 16, and s = 0 are obtained.
ENGINE WITH OXYGEN-ENRICHED Then the above equation can be simplified as
INTAKE Formula 3:
⎛ n s⎞ n
Cm H nOs m + − ⎟ O2 → mCO
O2 + H 2O (2)
⎝ 4 2 ⎠ 2
nO 2 VO2 V
= O2 = O2
nN 2 VN 2 1 − VO 2
nair M air
L0 =
ngasoline M gasoline
⎛ 1 − VO 2 ⎞ ⎛ n s⎞
⎜⎝1 + V ⎟⎠ ⎝ m + 4 − 2 ⎠ ⎡⎣32VO 2 + 28 ( − )⎤⎦
= O2
1⋅ ( + + )
Gasoline is a mixture containing a variety of
substances. In order to simplify the calculation,
it is done to take 5–12 carbon atoms in gasoline,
and the mass ratio of carbon, hydrogen, and oxy-
gen is set as 0.855: 0.145: 0; thus the approximate (Continued)
291
load, high-speed conditions, oxygen-enriched
air intake can improve the speed of combustion
and promote the formation of high-temperature
environment, and the fuel combustion, cylinder
pressure, and power performance are improved
significantly. Oxygen-enriched air promotes the
full burning of the fuel. Although oxygen-enriched
combustion contributes to the power performance
of the engine, a large amount of heat is simulta-
neously released to raise the temperature in the
cylinder.
ACKNOWLEDGEMENTS
REFERENCES
292
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Renzhuo Wan, Binbiao Pan, Fan Yang, Jun Wang & Quan Chen
School of Electronic and Electrical Engineering, Battery and Battery Management System Research Centre,
Wuhan Textile University, Wuhan, Hubei, China
ABSTRACT: Combining non-linear factors such as current, temperature, coulombic efficiency etc.,
a battery capacity correction equation for State of Charge (SOC) is established. The battery state space
model is built by using the ampere-hour counting method and composite electrochemical principles.
Based on the adaptability of a non-Gaussian and non-linear system, a Particle Filter (PF) algorithm is
used to estimate the SOC of the battery. The simulation is performed under random dynamic charge/
discharge condition. The result shows a good agreement between the experimental data processed by the
PF algorithm and the raw value. Experiments also show that the estimation accuracy adopted with the PF
method is 0.5% compared with that of the ampere-hour method, which may apply in a battery manage-
ment system for runtime SOC estimation.
293
Table 1. Particle filter algorithm for SOC estimation. rate, and coulombic efficiency, as well as its electro-
chemistry performance. In more practical terms, it
a. Initialisation: k=0. Randomly generate N initial par- is described by the AH method as Equation 2:
ticles x0i (i=1….Ns) by the priori probability P(x0),
and all the weights are set to 1/N. t
1
Qtrue t∫0
b. For k=1,2,3… SOC (t ) = SOC (t0 ) − ηi ,T ,c I (t )ddt (2)
1) Update the weights at the time k by the followingg for-
mulation: ω ki ω ki −1P yk xki ( ) (
ω ki −1P yk h ( xki ) , )
i=1, 2, 3.., Ns. Normal the importance weight:
where SOC(t) is current SOC, SOC(t0) is initial
SOC, Qtrue is the actual maximum capacity of the
∑
Ns
ω i
k ω i
k i =1
ω .
i
k battery, and ηi,T,c are the correction factors related
Then the minimal square error estimation can be to current, temperature and coulombic efficiency,
obtained by: respectively.
∑
Ns
xk i =1
ω ki xki .
3.1 Battery test bench
2) Resampling according to importance: evaluate the
effective sample s: In order to obtain the battery performance data
2 such as current, temperature, and voltage, the test
∑ (w )
n
i
Nefff 1 i 1 k bench is established and composed of a battery
3) Estimate xk+1 through the state equation.
test system (Neware CT-4001, Shenzhen, China),
4) k=k+1, return to Step 1.
programmable incubator (HDS-3120, Wuhan,
China) and a host computer for online data acqui-
sition. LiMnO2 (M7568132, from Xinxin Energy
Company of Xiangyang, Hubei, China) with cut-
random samples with weight, the posterior dis- off voltage of 4.2 V for charging and 3.0 V for
tribution of the initial particles, or P(xk|yki), can discharging. Nominal capacity of 10 Ah per cell
be approximately evaluated. Especially, at the is used for the testing and SOC estimation. The
time of k. wki can be modified by means of the battery Electromotive Force (EMF), which is also
weighted posterior probability density function. called OCV, is a monotonous function of SOC.
The sequential importance sampling principle is
used here, and the phenomenon of weight con-
centration on individual particles can be avoided 3.2 Current rates and temperature
by resampling method, and this method can also
improve the problem of non-convergence of itera- In order to investigate the non-linear effect of tem-
tive data. The simplified programme flow of the perature, current rate, and coulombic efficiency,
particle filter for SOC estimation used in this study the correction factor for the SOC estimation is
is shown in Table 1. introduced and defined as Equation 3:
294
c keeps at 1 at intermediate temperature ranging
from 5 to 30°C, and about 1.4% maximum fluctua-
tions at very low temperature and above 35°C. It
is described by five-order polynomial function as
Equation 6:
Ci (i ) = b0 b1 * i (5)
295
as the Shepherd model, Thevenin model, Unnewehr 4 RESULTS AND DISCUSSION
universal model, Rint model, hysteresis model and
Nernst model, have their advantages and shortcom- In order to verify the proposed method, the experi-
ings under different circumstances. In this paper, the ments are designed and performed at a constant
combined model embraced by the Shepherd model value of 25°C. A profile of the dynamic current
(Equation 7), Unnewehr model (Equation 8) and condition is shown in Figure 4(a), and the voltage
Nernst model (Equation 9) are used. tracing data are shown in Figure 4(b). The battery
yk E − Rik − K i xk (7)
yk E − Rik − K i xk (8)
yk E0 − Rik + K3 l xk + K l (1 xk ) (9)
yk E0 − Rik − K1 xk − K 2 xk + K3 l xk
(10)
+ K 4 l (1 xk )
xk = xk −1 + ηi,i T ,c I (t ) Δt Qtrue (11)
Parameters LiMnO2
E0 4.1697 V
R 0.0062 Ω
K1 −0.0089 V
K2 0.2381 V
K3 0.3028 V
K4 0.0517 V
296
was set aside for 6 h after finishing the test, and REFERENCES
the SOC reference data are calculated using the
relationship between OCV-SOC, which was 48.3% Chan, C.C. The available capacity computation model
at the end of the experiment. Figure 4(c) shows based on artificial neural network for lead-acid bat-
the comparison of the SOC estimation results for teries in electric vehicles. Journal of Power Sources, 87,
the AH method and PF method. The AH result is 201–204.
Gu, W.B., & Wang, C.Y. (2000). Thermal-electrochemical
50.73%, and the PF result is 50.23%. Figure 4(d) modeling of battery system. Journal of the Electro-
shows the difference between the AH method and chemical Society, 147(8), 2910–2922.
the PF method. As shown in the figure, the dif- Lu, L.G. (2013). A review on the key issues for lithium-
ference in the two methods shows a tendency to ion battery management in electric vehicles. Journal of
become larger, which may be caused by the accu- Power Sources, 226, 272–288.
mulating error of the AH method. Megahed, S., & Ebner, W. (1995). Lithium-ion battery for
electronic. Journal of Power Sources, 54, 155–162.
Ng, K.S. (2009). Enhanced coulomb counting method
5 CONCLUSION for estimating state-of charge and state-of health of
lithium-ion batteries. Applied Energy, 86, 1506–1511.
SOC estimation is one of the core issues for BMS. PattiPati, B. (2014). Open circuit voltage characterization
Considering the significant temperature change, of lithium ion batteries. Journal of Power Sources, 269,
317–333.
current rates and coulombic efficiency, the com- Plett, G.L. (2004). Extended Kalman filtering for battery
bined battery model is established based on the management systems of LiPB-based HEV battery
experimental data, and the PF method is proposed packs part 1– background. Journal of Power Sources,
for SOC estimation. 134, 252–261.
The study shows that the PF algorithm could Plett, G.L. (2004). Extended Kalman filtering for battery
achieve a relative error of 0.6% compared with management systems of LiPB-based HEV battery
that of the AH method. Furthermore, runtime packs part 2– modeling and identification. Journal of
data acquisition and algorithm validation should Power Sources, 134, 262–276.w3
be studied. Snihir, I. (2006). Battery open-circuit voltage estimation
by a method of statistical analysis. Journal of Power
Sources, 159, 1484–1487.
ACKNOWLEDGEMENTS Wang, Y.J. (2015). A method for state-of charge estima-
tion of LiFePO4 batteries at dynamic currents and
temperatures using particle filter. Journal of Power
This work was supported by Natural Science Foun- Sources, 279, 306–311.
dation of Hubei Provincial Education Department Zheng, F.D. (2016). Influence of different open circuit
(Q20131603). voltage tests on state of charge online estimation for
Corresponding author: Quan Chen. lithium-ion batteries. Applied Energy, 183, 513–525.
297
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: The transformer electric field calculation is very important in transformer design. The
paper establishes a winding equivalent circuit model, and deduces the winding equivalent circuit differ-
ential equations in matrix form by using the cut-set analysis and derives the calculation formula of the
initial potential distribution of the equivalent circuit model. On the basis of equivalent circuit equations,
the paper calculates the inductance and capacitance parameters, develops the design calculation software
for the wave process engineer, calculates the initial potential distribution of transformer winding, shock
response potential distribution, maximum potential distribution and oil potential gradient distribution,
and outputs the results to the VB interface.
299
the windings in equivalent network, and forms a In which:
multi-winding equivalent network.
⎡1 + 1 −
1
0
⎤
2.2 The derivation of longitudinal insulation ⎢C C C ⎥
calculation formula ⎢ 1 g1 g1
⎥
⎢ 1 1 1 1 ⎥
The equivalent circuit of the single winding wave ⎢ −C C
+
C
+
C
⎥
process calculation is shown in Figure 1. ⎢ g1 1 g1 g2
⎥
L1, L2, ……, LN–1 is the self-inductance and ⎢ 1 ⎥
Q=⎢ − ⎥
mutual inductance of each calculation cell, C1
and C2, ……, CN–1 is the series capacitor of each ⎢ C g2
⎥
⎢ 1 ⎥
calculation cell, Cg1, Cg2, ……, CgN–1 is the ground ⎢ − ⎥
capacitance of each calculation cell. ⎢ C gN − 1 ⎥
Assume: ⎢ 1 1 1
⎥
⎢ 0 + + ⎥
⎣ C C C ⎦
Φ1J ∫ i dt Φ ∫ i ′ dt (1) g −1
gN gN N
J J J
(5)
d 2 Φ1J
M + C (Φ1J ΦJ ) = 0 (2) Take the (4) into (2), gives the second order dif-
dt 2
ferential equations:
In which:
d 2 Φ1J
M + (C CQ Q1δ JV (t )
Q1C )Φ1J = CQ
⎡ Φ1J (1) ⎤ ⎡ Φ1J (1) Φ J (1) ⎤ dt 2 (6)
⎢ Φ (2) ⎥ ⎢ Φ ( ) ⎥
J( ) ⎥
Φ1J = ⎢ ⎥, Φ ΦJ = ⎢
1J 1J
d 2 Φ1J
⎢ ⎥ 1J ⎢ ⎥ + M1W1Φ1J = M1W (7)
⎢ ⎥ ⎢ ⎥ dt 2
⎣Φ1J ( N ) ⎦ Φ
⎣ 1J ( ) − Φ J ( ) ⎦
⎡1 ⎤ In which:
⎢C 0 ⎥
⎡ L1 M12 M1N ⎤ ⎢ 1 ⎥ d 2 Φ1J
⎢M ⎥ ⎢ 1 ⎥ W1 C − CQ
Q1C , + M1W1Φ1J = M1W (8)
⎢ 21 L2 M2 N ⎥ ⎢ ⎥ dt 2
⎢ C2 ⎥
⎢ ⎥
M =⎢ ⎥, C = ⎢ ⋅ ⎥ Assume:
⎢ ⎥ ⎢ ⎥
⎢ ⎥ ⎢ ⋅ ⎥
⎢ ⎥ ⎢ ⋅ ⎥ ⎡ Φ ( ) ⎤ ⎡ y( ) ⎤ ⎡ Φ ( ) ⎤ ⎡ y( N ) ⎤
⎢ ⎥ ⎢ Φ ( ) ⎥ ⎢ y( ) ⎥ ⎢ ⎥ ⎢
⎢⎣M N MN 2 LN ⎥⎦
⎢ 1 ⎥ ⎥ , ⎢ Φ ( ) ⎥ = ⎢ y( N
d ) ⎥⎥
ΦJ = ⎢ ⎥=⎢
⎢0 CN ⎥⎦ ⎢ ⎥ ⎢ ⎥ dt ⎢ ⎥ ⎢ ⎥
⎣ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥ ⎢ ⎥
(3) ⎣ Φ ( N ) ⎦ ⎣ y( N ) ⎦ ⎣ Φ ( ) ⎦ ⎣ y( N ) ⎦
For the lower part of the mesh has the following (9)
equation: Substitute into (7), obtains:
Q J C Φ1J = δ JV (t ) (4)
⎡ y( ) ⎤ ⎡ y( ) ⎤
⎢ ⎥ ⎢ ⎥
d ⎢ ⎥ ⎡ 0( N N ) E ( N N ) ⎤ ⎢ ⎥
⎢ y( N ) ⎥ = ⎢ ⎢ y( N ) ⎥
dt ⎢ ⎥ ⎣ −M M1W1 ( N N ) ⎥⎦ ⎢
0(N ⎥
⎢ ⎥ ⎢ ⎥
⎢⎣ y( N ) ⎥⎦ ⎢⎣ y( N ) ⎥⎦ (10)
⎡ 0( N × N ) ⎤
+⎢ ⎥
⎣ M1W2 ⎦
300
Potential difference is shown as: gram which is used to calculate electric field finite
element is written in the FORTRAN language,
V C
C( J − J ) (11) through which the program can automatically
divide the circuit elements, establish the equivalent
Equation (2) into Equation (7), obtains: circuit model, calculate the ground capacitance
parameters and calculate the voltage distribution.
V Q1δ JV (t ) (C − CQ
CQ Q1C )Φ1 (12) Then using the post-processing which is pre-
pared by VB, the results are displayed, giving the
Node potential is shown as: dielectric strength criterion. The software supports
the operating system which is much better than the
U C( − ) (13) Windows XP version. The softwarecan be used for
J J +1
all kinds of single-phase and three-phase power
transformer insulation longitudinal electric field
calculation and analysis. The software flow chart
2.3 Calculate the initial distribution is shown in Figure 2.
The software is much more convenient than the
Initial distribution is mainly determined by the K
currently popular commercial finite element soft-
value:
d 2u C d 2u
2
− u = 0, α 2u 0 (14)
dx K dx 2
C
where α = is the spatial factor.
K
Equation (14) is an ordinary differential equa-
tion. Its general solution is:
u( x ) = Aeα x + Be αx
(15)
eα ( l x ) e − α ( l x)
sha(l x )
U (x ) = U0 = U0 (16)
eα l e α l shal
Figure 2. The software flow chart.
Neutral insulation should satisfy the following
dx = 0.
boundary conditions: x = 0, u = u0, x = 1, K dU
According to the boundary conditions can obtain:
eα ( l x ) + e − α ( l x)
cha(l x )
U (x ) = U0 = U0 (17)
eα l e α l chal
301
Figure 4. The data input interface.
Figure 5. HV winding initial potential distribution.
4 CALCULATION EXAMPLE
To verify the accuracy of the calculation soft- Figure 6. HV full-wave maximum distribution.
ware, a power transformer model wave process of
OSFSZ—420 MVA/360 kV is calculated and ana- error being between 2.5% to 5%. From the 62th
lysed. The transformer is end line, the HV is shield- to the 132th section, the error value is from 0% to
ing continuous winding, with a total of 132 sections. 4.8%, which is less than the enterprise software cal-
The HV winding initial potential distribution culated value. Figure 7 shows that under the effect
and the final steady state potential distribution are of chopped wave lightning impulse withstand volt-
shown in Figure 5. The Figure shows that the HV age, the calculated error value is from 0% to 6.5%
winding initial potential distribution is not uni- less or more than the enterprise software calculate
form. The head end part of the shield continuous value. We can see the software computing results
winding potential drops fast, near the 16th section, in comparison to the enterprise computing results.
and potential has dropped to 60%. The continu- The oil duct gradient distributions of HV wind-
ous part is from the 17th section, and potential ing, under the full wave and chopped voltage, are
drops from fast to slow. The maximum difference shown in Figure 8 and Figure 9 respectively.
between the initial potential distribution and the Comparing the curves in Figure 8, at the full-
final steady state potential can be seen near the 38th wave, the software calculation and the enterprise
section. The drop speed is slower. Near the 68th calculation are mostly the same. The software cal-
section, potential has dropped to 4%. This shows culates the maximum potential gradient in the 9th
that the capacitor shield winding can effectively oil duct is 8.17, and comparing the value with the
improve the initial potential distribution and make enterprise value, the relative error is 14.3%. Mini-
it close to the final state potential. Continuous mum potential gradient in the 87th oil duct is 3.17.
winding cannot achieve this effect. The enterprise computing value maximum poten-
As shown in Figure 6, under the effect of full- tial gradient appears in the 11th oil duct, where
wave lightning impulse withstand voltage, the gradient value is 8.16. The minimum potential gra-
software computing results are compiled with dient in the 84th is 3.34. In Figure 9, at the chopped
enterprise computing results. The head end 16 sec- wave, the software calculates the maximum poten-
tions are less than the maximum potential which tial gradient in the 8th oil duct as 8.06. Minimum
is calculated by enterprise and the error is around potential gradient in the 103th oil duct is 1.54. The
3.3%. From the 18th to the 60th section, the software enterprise computing value maximum potential
value is much bigger than the calculated value, the gradient appears in the 10th oil duct, gradient
302
the wave process of calculation software can be
applied to engineering calculations.
5 CONCLUSION
REFERENCES
303
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: The Micro-CHP (Combined Heat and Power) cogeneration by Solid Oxide Fuel Cell
(SOFC) integrated with Indirect Internal Reforming operation (IIR-SOFC) fuelled by methane is the
focal point in this study. First, the paper introduces the framework of SOFC and the methane reformer
respectively, and proposes the design of integrating SOFC with Indirect Internal Reforming operation
(IIR-SOFC). Then, the numerical analysis of the system input-output relationship is performed by MAT-
LAB software. The result shows that the output power and the stack temperature increase with the rising
load current. Both the increase of the air input and methane input could raise the output voltage and
power, but decrease the stack temperature. What’s more, the output of the IIR-SOFC system is more
sensitive to a change in the methane input than to a change in the air input, so it regulates the inlet flow
rates to keep the temperature and the output at desired levels.
Keywords: SOFC; Indirect internal reforming; Modelling and simulation; Relationship analysis
305
simplifies the structure for the reforming reac- 3 MATHEMATICAL MODELS OF
tion, but the anode material for DIR-SOFC must IIR-SOFC
be optimised for all reactions as it could be easily
poisoned by carbon deposition from the reform- To better achieve the operation control of the
ing of hydrocarbons (Dokmaingam, 2010). SOFC stack, it is essential to establish a complete
Furthermore, direct internal steam reforming dynamic model, which has a better reflection of
in SOFC leads to inhomogeneous temperature the input-output relationships of the IIR-SOFC
distributions which can result in mechanical fail- system. The output voltage of a single SOFC is
ure of the cermet anode (J. M. Klein, 2010). The only about 1 V, so a certain number of single cells
IIR-SOFC makes full use of the advantages and are usually piled up to form the IIR-SOFC stack to
offsets the limitation of the ER-SOFC and DIR- meet the demand of higher voltage and power.
SOFC. Its specific structure not only makes an The stack model will be based on the follow-
effective application of heat and reactant, but ing assumptions (Dokmaingam, 2010; Xiongwen
ensures every reaction goes smoothly, therefore, Zhang, 2008; Wenshu Zhang, 2012):
IIR-SOFC was chosen for the purposes of this
a. All the gases are ideal;
paper.
b. Gas leakage and heat transfer are ignored;
c. The temperature of the gas output is the same
as inside the stack;
2 PRINCIPLE OF IIR-SOFC
d. The temperature, mole fraction and partial pres-
sure of every gas are uniformly distributed;
The schematic diagram of IIR-SOFC is pre-
e. The difference of the cells is negligible, so all the
sented in Figure 2. The parts that comprise a
cells of the stack make no difference.
SOFC single cell are the modules of anode, cath-
ode, electrolyte and reformer. The specific cata-
lyst for reforming is centralised at the entrance 3.1 Reforming model
to the reformer (Wenshu Zhang, 2012). Accord-
ing to this configuration, the steam-methane gas The reforming reactions mainly include methane
mixture is injected into the internal reformer, steam reforming and water-gas shift reaction. They
reacting to reform hydrogen and carbon monox- are both reversible and reach equilibrium soon
ide. Then, the reformate gas is continuously fed under suitable conditions (Shulin Wang, 2016; Van
back to the fuel channel of the SOFC. Mean- Nhu Nguyen, 2016):
while, the air is fed to the opposite flow direction
through the air channel (Dokmaingam, 2010). H 4 + H 2O ↔ CO + 3H 2 ΔH1 = 206.1KJ ⋅ mol −1 (1)
CH
An electrochemical reaction occurs in this pro- CO + H 2O ↔ CO2 + H 2 ΔH 2 = −41.1KJ ⋅ mol −1 (2)
cess, releasing electrons as well as waste heat.
In the process of the electrochemical reaction,
the reduction reaction occurring at the cathode Flow conservation equation:
transforms the oxygen into oxygen ions which
then reach the anode though the electrolyte. In w out ,re = w in,re + 2rre,1 (3)
the anode, hydrogen reacts with oxygen ions to
form water, and releases electrons which move to Molar flow state equation of reforming:
the cathode though the external circuit and gen-
erate an electric current. dn i,re
= w i,re,in w i,re,out + R i,re
dt
i {CH , CO, CO , H , H O}
(4)
Rre ⎡⎣ rre,1 rre,1 − rre,2 rre,2 3rre,1 + rre,2 rre,1 − rre,2 ⎤⎦ (5)
K an,s (AsTs Bs Ts Cs Ts Ds Ts E s )
=
(w H ,ree
,re + 3r )(
rree , + rre ,2 ⋅ + ) (6)
306
where i is the reformate gas; Rre ( mol ⋅ s ) is the Faraday’s law could be applied to calculate the
flow generated in the reforming reaction; rre,1 and rate ran,2:
rre,2 ( mol s 1 ) are the rate of methane steam
reforming and water-gas shift reaction in the I N
ran,2 = (11)
reformer respectively. wi ,ree ,iinn ( mol ⋅ s ) is the input 2F
flow while wi ,re ,out ( mol ⋅ s ) is the output flow;
ni ,re ( mol ) is the mole of the gas i in the reformer. where I (A) represents the stack current;
The coefficient is shown by the data in Table 1: F (96486C /mmol ) is Faraday’s constant and N is the
Based on the above formulae, the reforming number of cells in the stack; ran,1 and ran,2 ( mol ⋅ s 1 )
model can be established using MATLAB soft- are the rate of water-gas shift reaction and hydro-
ware, as shown in Figure 3. gen oxidation reaction in the anode respectively.
The simulation model of anode flow channel is
3.2 The model of anode flow channel shown in Figure 4.
Figure 3. The reforming model. Figure 4. The model of anode flow channel.
307
The output power of the SOFC stack is:
Vcell E N − ηohmic − ηact − ηcon (16) Where Qm represents the heat generated in the
reaction m:
Where EN is the reversible cell voltage that can
be calculated from the Nernst equation: Qm r ⋅ ΔH m{r {r
re rre ran ran } (25)
Δ m [ ΔH Δ Δ ΔH ] (26)
RT ⎛ PH2 an PO1/22,ca ⎞
EN = E0 +
an
ln ⎜ ⎟ (17)
2F ⎝ PH2O,an ⎠ Hin and Hout stand respectively for the enthalpy
4
of the inflow gas and the outflow gas:
E 0 1.2723 2.7645 10 Ts (18)
H in w air ,in h air
air ,in w CH4 ,inin h CH4 ,in w H2O,inin h H2O,in (27)
Where E0 is the standard electromotive force;
Eact, Eohmic and Econc are the main parts of the cell Hout w O2 out h O2 ,out w N2 out h N2 ,out w j,out h j,out
polarisation loss, and these losses represent activa- j {CO,CO CO2 H2 ,,H2 O} (28)
tion loss, ohmic loss and concentration depletion,
which are calculated from the following expres- The temperature model mentioned above can be
sions, respectively: established as shown in Figure 7:
⎪⎧ ⎡ ⎛ 1 1 ⎞ ⎤ ⎪⎫
ηohmic (T) I ⎨ 0 p ⎢α ⎜ − ⎟ ⎥ ⎬ I (19) 3.6 The model of the IIR-SOFC system
⎩⎪ ⎣ ⎝ T0 T ⎠ ⎦ ⎭⎪ We have so far accomplished all parts models of
RT ⎛ I⎞ the IIR-SOFC stack. Then when the models are
ηcon =− ln ⎜1 − ⎟ (20) connected according to the principle shown in Fig-
nF ⎝ I L ⎠ ure 2, a complete dynamic model of the IIR-SOFC
ηact = a blogI (21) system as shown in Figure 8 is realised.
308
Table 2. Main parameters of IIR-SOFC stack model.
Parameter Value
309
Figure 9. Response curve of load current input changes.
Observe the simulation curves shown in temperature. When the increasing range of the
Figure 11. When the methane input flow rate methane input is 2 mol ⋅ s−1, the IIR-SOFC output
increased from 1.8 mol ⋅ s−1 to 3.8 mol ⋅ s−1, the out- voltage rises by about 69 V and the output power
put voltage of IIR-SOFC increased from 610 V to rises by about 0.319 × 105W. When the growth
679 V, the output power went from 1.219 × 105W margin of the air input is 5 mol ⋅ s−1, the IIR-SOFC
to 1.358 × 105W, and the stack temperature gradu- output voltage rises by about 21 V and the output
ally lowered. As described in previous sections, the power rises by about 0.042 × 105W. It can then be
methane entered into the stack would be heated, projected that the output of the IIR-SOFC system
which would lead to a reduction in stack tempera- is more sensitive to a change in the methane input
ture. The gas entered into the anode was a mixture rather than a change of the air input.
of hydrogen, carbon monoxide, carbon dioxide
and water vapour. The hydrogen content was more
than the water content, so the growth of the partial 5 CONCLUSION
pressure of hydrogen was faster than water vapour,
which finally made the output voltage increase. The The IIR-SOFC fuelled by methane has been inten-
output power had the same growth trend as the out- sively applied in practice. Therefore it is especially
put voltage, and the growth rate declined gradually. meaningful to research the input-output relation-
Comparing the output characteristic curves ships of IIR-SOFC. This paper first introduced
shown in Figures 10 and 11, both the increase of how the indirect internal reforming operation and
the air input and methane input could raise the each component of SOFC works, proposing the
output voltage and power, and decrease the stack SOFC based on indirect internal reforming unit.
310
Then the mathematical model of IIR-SOFC was Dokmaingam, P. et al. (2010) Modelling of IT-SOFC
developed on the platform of MATLAB/Simulink, with indirect internal reforming operation fuelled by
and the simulation results were presented. Finally, methane: Effect of oxygen adding as autothermal
the IIR-SOFC input-output relationships were reforming. International Journal of Hydrogen Energy.
35, 13271–13279.
analysed though the simulation results. Gelen, A. T. and Yalcinoz, A. (2013). dynamic model for
A set of output response curves obtained respec- solid oxide fuel cell system and analyzing of its per-
tively by changing methane input, air input and formance for direct current and alternating current
load current are presented. It can be indicated from operation conditions. International Journal of Energy
the analysis results that, in the allowable range, the Research. 37, 1232–1241.
output voltage and power increase gradually with Hongliang, Cao. (2012). Dynamic modeling and control
the rising methane input flow rate and air input of solid oxide fuel cell systems. Wuhan: Huazhong
flow rate, but the temperature experiences a signifi- University of Science and Technology.
cant reduction. The output and the working perfor- Klein, J. M., Georges, S. and Bultel, Y. (2010). SOFC
fuelled by methane without coking: optimization of
mance of the IIR-SOFC system are more sensitive electrochemical performance. Journal of Applied Elec-
to the change in methane input than the air input. trochemistry. 40, 943–954.
For a rising load current, the output power and Qing Zhao, lv Xiaojing, Wang Weiguo, and Weng Yiwu.
temperature of the IIR-SOFC system increased (2015). Effect of Reforming Conditions Performance
but the output voltage decreased gradually. So it of the SOFC Stack. Journal of Chinese Society Power
can regulate the inlet methane flow rate to keep the Engineering. 35, 929–933.
temperature and the output at desired levels. The Shulin Wang. (2016). Research on the Modelling and
above-mentioned results provide an insight and Performance Simulation for DCCHP System based
some basic data for further understanding of the on S0FC/MGT Technology. Shandong: Shandong
University.
IIR-SOFC system. Furthermore, according to the Jafarian, S.M. and Haseli, P. (2010). Performance anal-
research results, the input and operating param- ysis of a solid oxide fuel cell with reformed natural
eters of the IIR-SOFC system can be adjusted to gas fuel, J. G Karimi: International Journal of Energy
meet the users’ requirements better and faster. Research. 34, 946–961.
Van Nhu Nguyen, Robert Deja and Roland Peters.
(2016). Methane/steam global reforming kinetics
ACKNOWLEDGEMENTS over the Ni/YSZ of planar pre-reformers for SOFC
systems. Ludger Blum: Chemical Engineering Journal.
This work is supported by the National Natu- 292, 113–122.
Wenshu Zhang. (2012). The Simulation of the Novel
ral Science Foundation of China (No. 61473174, Hybrid System of Solid Oxide Fuel Cell and Gas Tur-
61105100, 51376110), the Specialized Research bine. Shanghai: Shanghai Jiao Tong University.
Fund for the Doctoral of Higher Education (No: Xiongwen Zhang. (2008). Multi-level Modelling and
2013013 1130006) and China Postdoctoral Science Simulation for the Power Generation of Solid Oxide
Foundation (No.2014M551907.) Fuel Cell and Hybrid System Xi’an: Xi’an Jiao Tong
University.
Yu Li, Shuang Ye and Weiguo Wang, (2016). Perfor-
REFERENCES mance analysis of SOFC system based on natural
gas autothermal reforming. CIESC Journal. 67,
Chunyan, Li. (2011). Research on the Modelling and 1557–1564.
Control Strategies of Solid Oxide Fuel Cell Genera-
tion System in Microgrid. Chongqing: Chongqing
University.
311
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Hongjie Song, Wei Zhang, Yaqi Li, Zhengwei Yang & Anbo Ming
Xi’an Hi-Tech Research Institute, Xi’an, Shaanxi, China
ABSTRACT: The charging process of Phase Change Material (PCM) packaged in a cylindrical con-
tainer that melts by absorbing the heat with the Heat Pipe (HP) is simulated in the paper. A two-dimen-
sional physical model is built to couple with the problem that the heat transmission of HP with PCM.
An enthalpy model and VOF method is separately introduced to couple with the melting of PCM, the
evaporation and the condensation in HP. The numerical simulation reveals that the temperature of the
evaporation section rises faster than the condensation section at the beginning and the gap decreases as
the continuum flow is established in the entire HP. The PCM temperature distribution is closely related to
the flow in the HP. The melting time of the PCM meets the demands of the Solar Dynamic Space Power
System (SDPSS). The work in this paper lays a good foundation for further research on the character of
the heat transfer of the HP receiver integrated with High-Temperature Latent Thermal Energy Storage
(HTLHTES).
Keywords: PCM; HP; High-temperature latent heat thermal energy storage; VOF (Volume of Fluid)
Nomenclature
u velocity (m/s) Φ Viscous dissipation (J/kg m2)
ρ Density (kg.m−3) μ Dynamic viscosity (pa.s)
p pressure (pa) v kinematic viscosity (m2 / s)
x axial coordinate Subscripts
r radial coordinate r radial direction
t time (s) x axial direction
c heat capacity (j.kg−1.k−1) p PCM
k Thermal Conductivity (w.m−1.k−1) m melt temperature
H latent heat (J.kg−1) l liquid
f liquid fraction s solid
T temperature (K) v vapour
a discrete equation coefficients eff effective
Greek w wall
ε porosity of wick structure W, E, N, S west, east, north, and south faces of control volumes
313
temperature with high energy density, which can diameter. It found that natural convection was pre-
solve the problem of energy supply during eclipse vented by the brushes during the charging process.
periods and provides the possibility of developing However, compared with no fibre, the rate of the
SDPSS (Makki et al., 2016). charging process is 10% −20% higher.
The phase change problem is covered in the Another way is using HP to enhance heat
HTLHTES and HP, which contains evaporation transfer (Jegadheeswaran & Poheka, 2003; Zhang
and condensation. The character of the phase et al., 2010; Lopez et al., 2010; Bayon et al., 2010).
change is that the solid-liquid interface in the solu- The effective thermal conductivity of HP is up
tion area changes over time, which is a strongly from 5,000 W/m.K to 200,000 W/m.K. Also HP
non-linear problem and can only be treated by is a highly reliable and efficient energy transport
numerical analysis. It is necessary to study the device, which is widely applied in many nuclear
effect of the PCM property and the HP bound- and space applications because of its light weight,
ary condition on the charging process of the HP low cost and variety of shape and size options
receiver with HTLHTES, which can determine (Kim et al., 2013; Rao & More, 2015; Pooyoo
the PCM mass and the melting time of the phase et al., 2014). To simulate the behaviour of HP,
change. The phase transition problem is crucial in many different complexity models have been pro-
the optimisation and effective utilisation of PCM. posed (Faghri, 1995).
Adine & Qarnia (2009) built a mathematical The algorithm of either the VOF or level-set
model and deduced the conservation energy equa- method is thought to be a useful method for solv-
tions by introducing the control volume approach ing two-phase flow in the HP by Computational
based on the finite difference method to discrete Fluid Dynamic (CFD) (Al-abidi et al. 2013; Rif-
energy equations during phase change. Wang fat & Gan 1998 a, b). The VOF algorithm was
et al. (2015) studied the phase change and energy adopted by Yang et al. (2008) to simulate R-141B
efficiency problem that happened in the shell- flow boiling along a coiled tube. Compared with
and-tube unit. The governing equations were dis- the experiment data, the results of the simulation
cretised by the finite volume method. Similarly, the showed good agreement. Alizadehdakhel et al.
two-dimensional mathematical model of the shell- (2010) studied the two-phase flow of evapora-
and-tube latent heat thermal energy storage unit tion and condensation in thermosyphon using
with three phase change materials were simulated CFD. The VOF model was adopted by Kuang
and optimised by Li et al. (2013). et al. (2015) to simulate the boiling flow of a sepa-
At present, the key step is to find a suitable rate type of HP in low heat flux. The improved
high-temperature PCM. The more suitable PCM is VOSET Method was proposed by Guo et al.
pure molten salt and mixed molten salt, and most (2011) to solve the boiling bubbles arising from a
of the current research is mainly concentrated in vapor film.
low temperature PCM paraffin wax. The HP-heat There are few numerical simulations of the com-
exchanger problem was analysed by adopting an plex physical phenomena present in HP-PCM sys-
experimental method and stearic acid was chosen tems. Previous studies of HP-PCM systems were
as the PCM (Tm = 52.1°C) in Liu et al. (2006 a, b). mainly based on lumped capacitance analyses and
Respectively, the charging problem and discharg- network modelling (Shabgard et al., 2010; Nithy-
ing problem were considered. It should be noticed anandam & Pitchumani, 2011). In the last decades,
that the SDPSS will obtain high efficiency if the computer hardware and numerical algorithms have
melting temperature of PCM is high enough. Also been developed rapidly. Following that, the com-
it found that the efficiency of the system increases plex two-phase flow phenomenon were solved
as the operating temperature increases (Tiari et al. mainly with the help of numerical simulations.
2015). The heat conductivity of some salts and the In Sharifi et al. (2015), the different structures of
mixture were investigated by Tufen et al. (1985). the HP and PCM were studied, and the influence
Kenisarin (2010) studied high-temperature PCM of the gap between the HP during temperature
that is perspective for heat thermal storage and change was discussed in three modes of operation.
solar power, and the temperature of which ranges Shabgard et al. (2014) adopted the FVM method
from 393 K to 1,273 K. to simulate the transient response of the HP-
But now the low thermal conductivity limits assisted latent heat thermal energy storage unit in
the application, one of the way is to add the high Dish-Stirling solar power generation systems. Tak-
thermal conductivity material. Fukai et al. (2002, ing the natural convection into account, Sharifi
2003) studied that carbon brushes were packaged et al. (2015) solved the two-dimensional transient
in the PCM to improve the thermal conductivity response problem of a conjugate HP-PCM system.
of the PCM. Measured by instruments, the tran- From the above it can be seen that most of the
sient responses of the carbon brushes packaged investigations are concerned about the low tem-
in the PCM increased as the growth of the brush perature PCM. Also, few HP-PCM studies take
314
the effects of microgravity into account. In order 2.1 For PCM
to simulate PCM heat exchange with HP and
The following continuity, momentum and energy
two-phase flow in HP, the VOF model is intro-
equations of PCM are described in the following,
duced in the paper. The enthalpy method is intro-
(Faghri et al., 2010, Cao & Faghri, 1991).
duced to solve the phase change problem. By
The continuity equation is:
coupling with the HP-PCM energy equation, the
heat transfer between HP and PCM are studied to
∂ur ur ∂ux
provide a reference for the analysis and optimisa- + + =0 (1)
tion of the SDPSS. ∂r r ∂x
315
2.2 For HP The temperature distribution governing the equa-
tion in the HP wall is shown as (Sharifi et al., 2015):
The continuity equation of HP vapour flow is
described as:
∂T ⎡ 1 ∂ ⎛ ∂T ⎞ ∂ 2T ⎤
( ρ )w = kw ⎢ ⎜r ⎟+ 2⎥ (14)
∂ρ 1 ∂ ∂ ∂t ⎣ r ∂r ⎝ ∂r ⎠ ∂x ⎦
+ (ρ r)+ ( ρux ) = 0 (8)
∂t r ∂r ∂x
For the porous wick, it is difficult to calculate
the thermal conductivity. So the effective thermal
The r and x momentum equations are:
conductivity of the wick can be deduced by (Wang
et al., 2013):
∂ 1 ∂ ∂
( ρur ) + ( rrur2 ) + ( ρur ux )
∂t r ∂r ∂x kl [ kl + ks kl − ks ]
∂p 1 ∂ ∂u ∂ ∂u kefff = (15)
=− +
∂r r ∂r
( μr r ) +
∂r ∂x
(μ r )
∂x
[ kl ks + − kl ks ]
μur 1 ∂ ⎛ 1 ∂ ∂ux ⎞
− 2 + μ ⎜ (rur ) + ⎟
r 3 ∂r ⎝ r ∂r ∂x ⎠
∂μ ⎛ ∂ur 2 ⎛ 1 ∂ ∂u ⎞ ⎞ ∂μ ∂∂u
ux 3 EQUATIONS DISCRETISATION
+ − ⎜ (rur ) + x ⎟ ⎟ + (9)
∂r ⎜⎝ ∂r 3 ⎝ r ∂r ∂x ⎠ ⎠ ∂x ∂x
In the paper, governing equations are discretised
∂ ∂ 1 ∂
( ρux ) + ( ux2 ) + ( ρrrur ux ) by adopting the finite volume method. In order to
∂t ∂x r ∂r better understand the process, Figure 2 shows the
∂p 1 ∂ ∂ux ∂ ∂u
=− + ( μr )+ (μ x ) discrete schematic diagram.
∂x r ∂r ∂r ∂x ∂x For PCM (Adine & Qarnia. 2009):
1 ∂ ⎛1 ∂ ∂u ⎞
+ μ ⎜ (rur ) + x ⎟
3 ∂x ⎝ r ∂r ∂x ⎠ a ip+1θ p a ipθ p + aEii+1θ E + aWi +1
+1
θW + aNi +1θ N + aSi +1θ S (16)
∂μ ⎛ ∂ux 2 ⎛ 1 ∂ ∂u ⎞ ⎞ ∂μ ∂ur
+ − ⎜ (rur ) + x ⎟ ⎟ + (10) ΔxΔr i −1
∂x ⎜⎝ ∂x 3 ⎝ r ∂r ∂x ⎠ ⎠ ∂r ∂x a ipθ p ( ρcP )P r
θP +
Δt
ΔxΔr
Introducing the ideal gas equation and the ρP ΔHr ( fP 1 fP ) (17)
enthalpy-internal energy equation, so the modified Δt
energy equation is shown as: r +r
r= N S (18)
2
∂ 1 ∂ ∂
( ρcvT ) + ( rrurcvT ) + ( ux cvT ) kP ,E xΔr k xΔr
∂t r ∂r ∂x aE = , aw = P ,W
1 ∂ ⎛ ∂T ⎞ ∂ ⎛ ∂T ⎞ xE xP xP xW
= (19)
⎜ kr ⎟+ ⎜k ⎟ kP ,N rN Δx k r Δx
r ∂r ⎝ ∂r ⎠ ∂x ⎝ ∂x ⎠ aN = , aS = P ,W s
⎛ 1 ∂ ∂ u ⎞ rN rP rP rS
− p⎜ (ru ) + z ⎟ + μΦ (11)
⎝ r ∂r r ∂x ⎠ ΔxΔr
aP = aE + aW + aN + aS + ( cP )P r (20)
Δt
The term of viscous dissipation is:
It is found that the independent solutions can
⎡⎛ ∂ur ⎞ 2 ⎛ ur ⎞ 2 ⎛ ∂ux ⎞ 2 ⎤ ⎛ ∂ur ∂ux ⎞ 2 achieve sufficient accuracy when the time step is
Φ = 2⎢ + + ⎥+ +
⎣ ⎝ ∂r ⎠ ⎝ r ⎠ ⎝ ∂x ⎠ ⎦ ⎝ ∂x ∂r ⎠ (12)
2
2 ⎡1 ∂ ∂u
−
⎢ ( ) + x ⎤⎥
3 ⎣ r ∂r ∂x ⎦
∂T ⎡ 1 ∂ ⎛ ∂T ⎞ ∂ 2T ⎤
( ρc)efff = kefff ⎢ ⎜r ⎟+ 2⎥ (13) Figure 2. The grid schematic diagram in the HP-PCM
∂t ⎣ r ∂r ⎝ ∂r ⎠ ∂x ⎦ latent thermal energy storage unit.
316
t = 0.0001s. Coupling the HP-PCM energy equa-
tion with the boundary conditions, an iteration
procedure is introduced in every time step to
achieve the convergence. The convergence residual
value is set to less than 10−4 for continuity, momen-
tum and energy equations.
4 SIMULATION RESULTS
AND DISCUSSION
317
Figure 7. Liquid fraction of PCM varies as time.
5 CONCLUSION
318
heat thermal energy storage: A review. Renewable and Li, Y.Q., He, Y.L., Song, H.J., Xu, C., & Wang, W.W.
Sustainable Energy Reviews, 20, 353–363. (2013). Numerical analysis and parameters optimiza-
Alizadehdakhel, A., Rahimi, M., & Alsairafi, A.A. tion of shell-and-tube heat storage unit using three
(2010). CFD modeling of flow and heat transfer in a phase change materials. Renewable Energy, 59, 92–99.
thermosyphon. International Communications in Heat Liu, Z., Wang, Z., & Ma, C. (2006a). An experimental
and Mass Transfer, 37(3), 312–318. study on heat transfer characteristics of heat pipe heat
Bayon, R., Rojas, E., Valenzuela, L., & et al. (2010). exchanger with latent heat storage. Part I: Charging
Analysis of the experimental behaviour of a 100 kWh only and discharging only modes. Energy Conversion
latent heat storage system for direct steam generation and Management, 47(7–8), 944–966.
in solar thermal power plants. Applied Thermal Engi- Liu, Z., Wang, Z., & Ma, C. (2006b). An experimental
neering, 30(2), 2643–2651. study on the heat transfer characteristics of a heat
Cao, Y., & Faghri, A. (1990). A numerical analysis of pipe heat exchanger with latent heat storage. Part II:
phase change problem including natural convection. Simultaneous charging/discharging modes. Energy
Journal of Heat Transfer, 112(3), 812–816. Conversion and Management, 47(7–8), 967–991.
Cao, Y., & Faghri, A. (1991). Transient two-dimensional Lopez, J., Caceres, G., Palomo Del Barrio, E., & et al.
compressible analysis for high-temperature heat pipes (2010). Confined melting in deformable porous media:
with pulsed heat input. Numerical Heat Transfer. Part A first attempt to explain the graphite/salt composites
A: Applications, 18(4), 483–502. behaviors. International Journal of Heat and Mass
Faghri, A., Zhang, Y., & Howell, J. (2010). Advanced Transfer, 53(2), 1195–1207.
Heat and Mass Transfer. Global Digital Press. Makki, A., Omer, S., Su, Y.H., & Sabir, H. (2016).
Faghri, A. (1995). Heat Pipe Science and Technology. Numerical investigation of heat pipe-based pho-
Washington, DC: Taylor and Francis. tovoltaic–thermoelectric generator (HP-PV/TEG)
Fukai, J., Hamada, Y.C., Morozumi, Y.S., & Miyatake, hybrid system. Energy Conversion and Management,
O. (2002). Effect of carbon-fiber brushes on conduc- 112, 274–287.
tive heat transfer in phase change materials. Inter- Nithyanandam, K., & Pitchumani, R. (2011). Analysis
national Journal of Heat and Mass Transfer, 45(24), and optimization of a latent thermal energy storage
4781–4792. system with embedded heat pipes. International Journal
Fukai, J., Hamada, Y.C., Morozumi, Y.S., & Miyatake, of Heat and Mass Transfer, 54(21–22), 4596–4610.
O. (2003). Improvement of thermal characteristics Pooyoo, N., Kumar, S., Charoensuk, J., & Suksang-
of latent heat thermal energy storage units using car- panomrung, A. (2014). Numerical simulation of
bon-fiber brushes: Experiments and modeling. Inter- cylindrical heat pipe considering non-Darcian trans-
national Journal of Heat and Mass Transfer, 46(23), port for liquid flow inside wick and mass flow rate at
4513–4525. liquid–vapor interface. International Journal of Heat
Gan, G., & Riffat, S.B. (1998a). A numerical study of and Mass Transfer, 70, 965–978.
solar chimney for natural ventilation of buildings with Rao, R.V., & More, K.C. (2015). Optimal design of the
heat recovery. Applied Thermal Engineering, 18(12), heat pipe using TLBO (teaching learning-based opti-
1171–1187. mization) algorithm. Energy, 80, 535–544.
Guo, D.Z., Sun, D.L., Li, Z.Y., & Tao, W.Q. (2011). Riffat, S.B., & Gan, G. (1998b). Determination of effec-
Phase change heat transfer simulation for boiling bub- tiveness of heat-pipe heat recovery for naturally-ven-
bles arising from a vapor film by the VOSET method. tilated buildings. Applied Thermal Engineering, 18(3),
59(11), 857–881. 121–130.
Hall, C.A. (1998). Thermal state-of-charge of solar heat Shabgard, H., Bergman, T.L., Sharifi, N. & et al. (2010).
receivers for space solar dynamic power, Ph.D. Thesis, High temperature latent heat thermal energy storage
Howard University, USA. using heat pipes. International Journal of Heat and
High Energy Advanced Thermal Storage (HEATS) Fund- Mass Transfer, 53(15–16), 2979–2988.
ing Opportunity Announcement. (2011). Advanced Shabgard, H., Faghri, A., Bergman, T.L., & Andraka,
Research Projects Agency (ARPA-E), Department of C.E. (2014). Numerical simulation of heat pipe-
Energy, DE-FOA-0000471 CFDA Number 81135. assisted latent heat thermal energy storage unit for
Jegadheeswaran, S., & Poheka, S.D. (2003). Performance Dish-Stirling systems. Journal of Solar Energy Engi-
enhancement in latent heat thermal storage system: neering, 136(2).
A review. Renewable and Sustainable Energy Reviews, Sharifi, N., Faghri, A., Bergman, T.L., & Andraka, C.E.
13(9), 2225–2244. (2015). Simulation of heat pipe-assisted latent heat
Kenisarin, M.M. (2010). High-temperature phase change thermal energy storage with simultaneous charging
materials for thermal energy storage. Renewable and and discharging. International Journal of Heat and
Sustainable Energy Reviews, 14(3), 955–970. Mass Transfer, 80, 170–179.
Kim, T.Y., Hyun, B.S., Lee, J.J., & Rhee, J.H. (2013). Stririh, U. (2003). Heat transfer enhancement in latent
Numerical study of the spacecraft thermal control heat thermal storage system for buildings. Energy
hardware combining solid–liquid phase change mate- Build, 35(11), 1097–1104.
rial and a heat pipe. Aerospace Science and Technol- Tao, Y.B., & He, Y.L. (2011). Numerical study on thermal
ogy, 27(1), 10–16. energy storage performance of phase change mate-
Kuang, Y.W., Wang, W., Zhuan, R., & Yi, C.C. (2015). rial under non-steady-state inlet boundary. Applied
Simulation of boiling flow in evaporator of separate Energy, 88(11), 4172–4179.
type heat pipe with low heat flux. Annals of Nuclear Tiari, S., Qiu, S.G., & Mahdavi, M. (2015). Numerical
Energy, 75, 158–167. study of finned heat pipe-assisted thermal energy
319
storage system with high temperature phase change Wang, W.W., Wang, L.B., & He, Y.L. (2015). The energy
material. Energy Conversion and Management, 89, efficiency ratio of heat storage in one shell-and-
833–842. one tube phase change thermal energy storage unit.
Tufen, R., Petitet, J.P., Denielou, I., & Le Neindre, B. Applied Energy, 138, 169–182.
(1985). Experimental determination of the thermal Yang, Z., Peng, X.F., & Ye, P. (2008). Numerical and
conductivity of molten pure salts and salt mixtures. experimental investigation of two-phase flow during
International Journal of Thermophysics, 6(4), 315–330. boiling in a coiled tube. International Journal of Heat
Wang, C.L., Zhang, D.L., Qiu, S.Z., Tian, W.X., Wu, and Mass Transfer, 51(5–6), 1003–1016.
Y.W., & Su, G. H. (2013). Study on the characteris- Zhang, P., Song, L., Lu, H. et al. (2010). The influence
tics of the sodium heat pipe in passive residual heat of expanded graphite on thermal properties for par-
removal system of molten salt reactor. Nuclear Engi- affin/high density polyethylene/chlorinated paraffin/
neering and Design, 265, 691–700. antimony trioxide as a flame retardant phase change
Wang, L., & Hou, X.B. (2014). Key technologies and material. Energy Conversion and Management, 51(12),
some suggestions for the development of space solar 2733–2737.
power station. Spacecraft Environment Engineering,
30(4), 343–350.
320
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Hao Zhang, Bin Wang, Miao Wang, Yubing Duan, Xiaoli Hu & Hui Liu
State Grid Shandong Electric Power Research Institute, Jinan, China
ABSTRACT: Wire hydraulic tube is a vital part of the transmission lines, at the same time; it is an ele-
ment that causes defects and faults easily. Once broken, it will lead directly to the falling of the conductor;
hence a series of serious secondary disasters may occur. The operating condition of electric transmission
line is very complex. Meteorological conditions and running conditions of the lines could cause the rise
and fall of the hydraulic tubes’ temperature. In this paper, we use the heat balance equation to study the
factors that affect the heat dissipation of the crimp tube. We put the focus on the heating of the different
locations rather than the overall of the strain clamp. The study also analyzes the influence of load on
temperature distribution of crimp joint.
Keywords: Transmission Line; Hydraulic tube; Temperature Distribution; Infrared temperature meas-
urement; Internal defect
P K f I 2R (1)
321
Figure 3. The testing field of current carrying and tem-
perature rise test.
Figure 2. The schematic diagram of current carrying
and temperature rise test.
⎧
⎪C mc
⎪
⎪ l
⎨R = (2)
⎪ S λ Figure 4. The infrared temperature measurement image
⎪RE = 1 of clamp and wire.
⎪⎩ Ah hc
In the formula, C is the thermal capacity of the 3 ANALYSIS OF THE DATA AND
wire’s micro-element; R is the axial thermal resist- CONCLUSION
ance of the micro-element; RE is the convective
thermal resistance of the micro element; m is the The temperature test points were selected as shown
mass of the wire’s micro-element; c is the specific in the following table.
heat capacity; l is the length of the micro-element; The temperature rise of the four groups at 600A
S is the radial sectional area; λ is thermal conduc- and 1200A is shown in the following figure.
tivity; A is the area of convective heat transfer; hc is From the data of Figure 6 and Figure 7, we can
the coefficient of convective heat transfer. draw the conclusions as following:
322
Figure 5. The temperature measurement points of
strain clamp.
Symbol Position
323
4 THE ANALYSIS OF WIRE BREAKING
5 CONCLUSION
REFERENCES
324
Chen Lan, Bian Xingming, Wan Shuwei, et al. Influence Liu Minghui, LI Chenming, WANG Changchun et al.
of Temperature Character of AC Aged Conductor on The Compression Analysis of LGJ-300/40 Wire Splic-
Current Carrying Capacity [J]. High Voltage Engi- ing Sleeve. Northeast Electric Power Technology,
neering, 2014, 40(5) 1499–1506. 2014, 13 (1) 26–29.
Ding Xiliang, Han Xueshan, and Zhang Hui, et al. Anal- Peng Xiangyang, Zheng Xiaoguang, Zhou Huamin, et
ysis on electro thermal coordination power flow and al. Experimental Study of Current Carrying and Tem-
transmission line temperature variation process [J]. perature rise of Overhead Conductors [J]. Proceedings
Proceedings of the CSEE, 2008, 28(19): 138–143. of the CSEE, 2007, 27 (S1):23–27.
Experimental Investigation on Impact of Ambient Wind Tao Wenquan. Heat transfer [M]. Xi’an: Northwestern
Velocity on Ampacity of Overhead Transmission Polytechnical University Press, 2006: 4–15.
Lines and Temperature Rise [J]. Guang Dong Electric Xu Qingsong, Ji Hongxian, Hou Wei, et al. The Novel
Power, 2012, 25(3): 20–25. Technique of Transmission Line’s Capacity Increase
Fujii O, Mizuno Y, Naito K. Temperature of insulators by Means of Monitoring Conductor’s Temperature
as heated by conductor [J]. IEEE Transactions on [J]. Power System Technology, 2006(S1):171–176.
Power Delivery, 2007, 22(1): 523–526. Ying Zhanfeng, Feng Kai, Du Zhijia et al. Thermal Circuit
Guo Xiaofei, Li Yongchun, Zhao Yuanlin. The Analysis Modeling of the Relationship between Current and Axial
and Process about High Temperature of Elementary Temperature for High Voltage Overhead Conductor [J],
Streams [J]. Electrical technology, 2010, 8(1):136–139. Proceedings of the CSEE, 2015, 11 (35) 2887–2895.
325
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Jide Zhang
College of Physics and Electronic Information, Baicheng Normal University, Baicheng, China
ABSTRACT: By preparing Mg0.15Zn0.85O film on quartz substrates using sol-gel technology, this paper
focuses on the effect of annealing treatment on the optical property of film. The result shows that the film
is an amorphous structure without annealing treatment, and it is a polycrystalline structure under four
kinds of annealing temperature: 600°C, 700°C, 800°C and 900°C. The crystal quality of film under 800°C
and 900°C is worse than under 600°C and 700°C. All films at UV range exist strong edge absorptions, and
the absorption edges exhibit red shift with annealing temperature rising; all films have strong UV emis-
sion peaks, and the emission peaks exhibit red shift with annealing temperature rising. Moreover, there are
green emission peaks around 500 nm.
327
scanning step. Analyse the photoluminescence of correspond to the following annealing temperatures:
the film using a Traix 320 fluorescence spectropho- a: 0°C, b: 600°C, c: 700°C, d: 800°C, e: 900°C). As
tometer, and use a He-Cd laser with 325 nm excita- Figure 2 shows, the absorption of all the films is very
tion wavelength as excitation source. small in the visible region, while at UV range there
exists strong edge absorption. The absorptivity rate
of film increases with annealing temperature, but
3 RESULT ANALYSIS not by much. The absorption edge of the film shifts
towards the longer wavelength side with increasing
3.1 Effect of annealing temperature annealing temperature, namely red shift. This shows
on Mg0.15Zn0.85O film structure that the particle size of film increases as the anneal-
ing temperature rises.
Figure 1 illustrates the XRD diffraction spectrum of
Mg0.15Zn0.85O film after annealing treatment under
temperatures of 0°C, 600°C, 700°C, 800°C and 3.3 Effect of annealing temperature on
900°C. As the figure shows, no peak position exists Mg0.15Zn0.85O film photoluminescence
on the films without annealing treatment, which
In order to study further the effect of annealing
means the films are amorphous, while the films
temperature on Mg0.15Zn0.85O film optical qual-
express as polycrystalline structure under four kinds
ity, we have measured the photoluminescence of
of annealing temperature: 600°C, 700°C, 800°C and
film under five different annealing temperatures,
900°C, and three diffraction peaks appear: (100),
as displayed in Figure 3. As the figure shows,
(002), and (101). Cubic phase and other impurity
all films exhibit a UV emission peak at UV
peaks associated with MgO do not exist in the dif-
range; the corresponding peak positions are: a:
fraction spectrum and, compared with un-doped
368.1 nm, b: 369.5 nm, c: 370.9 nm, d: 371.7 nm,
ZnO (Tang et al., 1997), all diffraction angles of the
e: 373.5 nm, and these emission peaks are mainly
films shift to the large angle direction, which means
derived from the excitonic transition. Therefore,
Mg2+ has replaced Zn2+ and entered the ZnO lat-
with the increasing annealing temperature, the
tice. The shift angles of diffraction peak (002) under
UV emission of the sample shows a red shift;
annealing temperatures 800°C and 900°C are larger
this is due to an increase in the sample’s particle
than under 600°C and 700°C, and strength decreas-
size during annealing, which is consistent with
ing, which illustrates that the crystal quality of the
film under 800°C and 900°C is worse than under
600°C and 700°C. The annealing treatment (under
temperatures of 800°C and 900°C) changes the ratio
of Zn and Mg in film lead to (002) diffraction shift;
therefore, the optimised growth temperature of this
film should not exceed 700°C.
Figure 1. XRD spectra of Mg0.15Zn0.85O films at differ- Figure 3. Photoluminescence spectrum of Mg0.15Zn0.85O
ent temperatures. films at different temperatures.
328
the analysis result of the absorption spectrum. REFERENCES
In addition, we found all films have green emis-
sion peaks around 500 nm. There are different Deng, H., Gong, B., Petrella, A.J. et al. (2003). Char-
explanations as to the source of the green emis- acterization of the ZnO thin film prepared by single
sion peaks (Deng et al., 2003) and, in our view, source chemical vapor deposition under low vacuum
the green emission is caused by the composite condition. Science in China Series (E), 463, 255–360.
Lee, J-H., Yeo, B-W., & Park, B-O. (2004). Effects of
between shallow donor level formed by oxygen the annealing treatment on electrical and optical
vacancy (V0) and shallow acceptor level formed properties of ZnO transparent conduction films by
by zinc vacancy (VZn). ultrasonic spraying pyrolysis. Thin Solid Films, 457,
333–337.
Lin, W., Ma, R., Shao, W. et al. (2007). Structural, electri-
4 CONCLUSION cal and optical properties of Gd doped and undoped
ZnO: Al (ZAO) thin films prepared by RF magnetron
By preparing Mg0.15Zn0.85O film on quartz sub- sputtering. Applied Surface Science, 253, 5179–5183.
Muthukumar, S., Chen, Y., Zhong, J. et al. (2004). Meta-
strates using sol-gel technology, this paper focuses
lorganic chemical vapor deposition and characteriza-
on the effect of annealing treatment on the struc- tions of epitaxial MgxZn1-xO (0≤x≤0.33) films on
ture and optical property of film. The result shows: r-sapphire substrates. Journal of Crystal Growth, 261,
(1) No peak position exists on the films without 316–323.
annealing treatment, which means the films are Ohtomo, A., Kawasaki, M., Ohkubo, I. et al. (1999).
amorphous, while the films express as a polycrys- Structure and optical properties of ZnO/Mg0.2Zn0.8O
talline structure under four kinds of annealing Superlattiees. Applied Physics Letters, 75(7), 980–982.
temperature: 600°C, 700°C, 800°C and 900°C, Tang, Z.K., Yu, P., Wong, G.L. et al. (1997). Ultravio-
and three diffraction peaks appear: (100), (002), and let spontaneous and stimulated emissions from ZnO
(101). The crystal quality of film under 800°C and microcrystallite thin films at room-temperature. Solid
State Communications, 103, 459–462.
900°C is worse than under 600°C and 700°C; (2) Zhang, X.T., Liu, Y.C., Zhang, L.G. et al. (2002). Struc-
All films at UV range exhibit strong edge absorp- ture and optically pumped lasing from nanocrystal-
tions, and the absorption edges exhibit red shift as line ZnO films prepared by thermal oxidation of ZnS
the annealing temperature rises; (3) All films have Films. Journal of Applied Physics, 92(6), 3293–3298.
strong UV emission peaks, and the emission peaks Zhao, D.X., Liu, Y.C., Fan, X.W. et al. (2001). Photolu-
exhibit red shift as the annealing temperature rises. minescence properties of MgxZn1- xO alloy thin films
Moreover, there are green emission peaks around fabricated by the sol-gel deposition method. Journal
500 nm. of Applied Physics, 90(11), 5561–5563.
329
System test and diagnosis, monitoring and identification,
video and image processing
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Yirong Zhou
School of Management, University of Science and Technology of China, Hefei, China
Yansen Han
Department of Mathematics, Hefei University of Technology, Hefei, China
Ji Luo
Department of Mathematics Sciences, Zhejiang University, Hangzhou, China
ABSTRACT: Image segmentation is to divide the image into a number of specific, unique character-
istics of the region and to put forward the technology and process of the target of interest. It is the key
step of preprocessing in the regime of image recognition and computer vision. Without correct image
segmentation, there wouldn’t be correct identification. However, the only basis for segmentation is the
brightness and color of pixels in the image. Therefore, when the image is automatically processed by the
computer segmentation, a variety of difficulties will be encountered. Because remote sensing image has
many characteristics such as high resolution and unequal noise distribution, the traditional segmentation
algorithm cannot achieve satisfactory accuracy when analyzing these images. This paper proposes a new
image segmentation framework based on the graph theory. During the recent years, the use of graph
theory in many mature theories and mathematical tools for image segmentation has become a hot topic in
the field of image segmentation research. The graph theory is a branch of applied mathematics, and have
a good relationship with the mapping between the images. This paper also includes experimental result on
the high resolution that is spatial resolution 0.1∼0.3 m for remote sensing image.
Keywords: Region Connection Calculus; Image function; Convex association; Concave association
333
Figure 1. Instance for proper part.
proper part inverse that is represented by TPPi, Wu, Z. 2012). The Attributed Relational Graph
non-tangential proper part that is represented by can be made more entire by adding area ascribes
NTPP, non-tangential proper part inverse that is to the hubs, with respect to occasion shape and
represented by NTPPi, From these basic relations, radiometric highlights. At last, question dis-
combinations can be built. For instance, proper covery and acknowledgment can be viewed as a
part that is represented by PP is the union of Tan- graph coordinating issue for which effective cal-
gential Proper Part and non-Tangential Proper culations can be executed. In these unique situ-
Part. Figure 1 shows the Instance for proper part. ations, a voracious pursuit joined with a graph
Figure 2 shows the Consistency-based composi- metric which can utilize all the data contained in
tion table. the ARG has been executed (Syed, A. H., Saber,
The numerical approach is chosen as light E., & Messinger, D. 2012).
of the fact that, as opposed to direct multiscale
approaches, it permits to choose protests as far
as their size. The meter and sub-meter determina-
tion images are more and more popularly used 2 MULTISCALE IMAGE SEGMENTATION
for identifying vehicles, structures, and others
(Zhong, P., & Wang, R. 2007). Novel calcula- Region Connection Calculus (RCC) with 8 fun-
tion can deliver locales superimposing over the damental connection set manages locales of space
scales. This permits misusing the full degree of and how they associate and cover each other.
the Region Connection Calculus (RCC) with Along these lines, the initial move toward the utili-
8 fundamental connection set. The locales and zation of this framework is to acquire a reasonable
their connections are spoken to by hubs speaking arrangement of areas (Tison, C., Pourthié, N., &
to the districts and the circular segments speak Souyris, J. C. 2007). The prerequisite for covering
to the Region Connection Calculus (RCC) with avoids a solitary layer segmentation technique,
8 essential connection set (Yi, L., Zhang, G., & where every one of the areas would be separated.
334
The defining point is focused on the segmentation function of an image and the structuring element
that is to take place at various levels. that is present in the opening of reconstructed
The multiscale segmentation process is progres- operator. The image is segmented using the con-
sive. The details are incorporated at a level present cave association utility Concaveau(i).
in the low level, inappropriate for Region Connec- The scope of scales can be picked by keeping
tion Calculus (RCC) with 8 essential connections in mind the goal to choose objects of a given
set (Tuia, D., Muñoz-Marí, J., & Camps-Valls, G. size. Despite the fact that a choice control is
2012; Yuan, J., Wang, D., & Li, R. 2014). proposed for the segmentation, in the means
the authors utilize a fundamental thresholding
system.
3 RECOMMENDED TECHNIQUE
FOR SEGMENTATION
4 GRAPH MATCHING
The loss along with the solitary layer technique is
focused upon. Favorable circumstances of itera- Graph coordination has been broadly utilized
tive, pyramidal edifice that is present are assumed. for question acknowledgment and image inves-
Extra powerful curve along with arched partici- tigation. For example, one can refer to the works
pation elements of second consideration is used of an analyst where graph coordination on a
for a better segmentation. The arched enrollment multi-determination order of nearby Gabor
capacity for any given pixel is viewed as probabil- segments is utilized. A comparable approach
ity of pixel that is a piece of a curve that is better is proposed. Similarly, the authors amplify this
than encompassing foundation structure. Compa- work where the various levelled graph coordi-
rable description is connected with the curved that nating takes into consideration extent along
is darker when compared to encompassing foun- with invariant protest acknowledgment. Every
dation participation work. The leveling capacity L hub in the graph speaks to an element and cir-
(i) is a disentanglement of image ‘i’. The convex cular segments depict the separations between
association utility Convexau(i) have the function of the elements. A Hopfield twofold system is
an image and the structuring element that is pre- utilized to perform sub-graph coordinating
sent in the opening of reconstructed operator is (Renz, J., & Ligozat, G. 2005). Concerning case,
defined in equation 1. it constitutes of a decent prologue to protest
acknowledgment by plot coordination. The
Convexau(i) = i−ORn(i) (1) plots are arranged in a novel manner by the
authors. A diagram showing the representation
The concave association utility Concaveau(i) have of the graph-based methods is presented. This
the basic information of an image. The structur- is done for preparing the image along with the
ing element that is present in the closing of recon- examination that is given.
structed operator is defined in equation 2. Be that as it may, the approach is constrained
to the acknowledgment of the exceptionally
Concaveaf(i) = CRn(i)−(i) (2) same question and for extremely basic shapes
(Sorlin, S., & Solnon, C. 2005). An examina-
The leveling function of an image as represented tion of graph coordination and common data
by L(i) is defined by having convex association amplification for protest location limited was
utility Convexau(i) and concave association utility anticipated to the instance of multidimensional
Concaveau(i) in equation 3. wavelet developed by Dennis Gabor (Wang, Jin-
gbin, et al., 2015).
⎧⎪ORn(i) : Convexmf(i) Convexmf(i) ⎫⎪ Inventiveness of approach exhibited takes a
L(i) = ⎨ORn(i) : Convexmf(i) Convexmf(i
e )⎬ (3) shot at graphs which depict subjective spatial con-
⎩⎪ (i) : Convexmf(i) Concavemf(i) ⎪⎭ nections, which will permit us to speak to classes
of items, as opposed to numerous perspectives
The segmentation scheme has been projected of a specific question. Three diverse methodolo-
for which the already mentioned image function is gies, for example, the graph, arranged graph and
used. non-situated graph to graph examination can be
The segmentation scale is ranged from 1 to x. recognized.
where the ‘x’ is total analysis number that is used Auxiliary method misuses finest graph topol-
in segmentation. The structuring element size is ogy deprived of issue subordinate, yet is somewhat
also considered. The image is segmented using the hard towards actualizing. Figure 3 shows the effect
convex association utility Convexau(i) having the of applying the levels of segmentation.
335
Figure 3. Effect of applying the levels of segmentation.
336
interface it to what have as of now been figured.
In the event that such an area exists, two cases may
show up.
The learning of the as of now processed connec-
tions permits bounces the different level that are
present in the choice tree. The investigation is done
on the data of the middle of the road areas found
goes on. The learning as of now figured connec-
tions permits explicitly deciding novel association
with the calculation done.
In the event that towards the completion, the
examination of transitional locales was found to
be difficult in deciding what is required for the rela-
tionship. A calculation utilizing the techniques for
the past segment is finished by utilizing all the data
put away amid this pre-calculation step.
Figure 4. Associated and bi-associated components.
337
mentation on multiple layers.” ISPRS Journal of remotely sensed data: applications to segmentation
Photogrammetry and Remote Sensing 88 (2014): and object-based image analysis. In Proceedings of
119–127. International Conference on Geographic Object-
Forestier, Germain, Anne Puissant, Cédric Wemmert, Based Image Analysis (GEOBIA), Rio de Janeiro,
and Pierre Gançarski. “Knowledge-based region labe- Brazil (Vol. 79, p. 102107).
ling for remote sensing image interpretation.” Com- Tison, C., Pourthié, N., & Souyris, J. C. (2007, July). Tar-
puters, Environment and Urban Systems 36, no. 5 get recognition in SAR images with Support Vector
(2012): 470–480. Machines (SVM). In 2007 IEEE International Geo-
Inglada, J. (2007). Automatic recognition of man-made science and Remote Sensing Symposium (pp. 456–
objects in high resolution optical remote sensing 459). IEEE.
images by SVM classification of geometric image fea- Tuia, D., Muñoz-Marí, J., & Camps-Valls, G. (2012).
tures. ISPRS journal of photogrammetry and remote Remote sensing image segmentation by active queries.
sensing, 62(3), 236–248. Pattern Recognition, 45(6), 2180–2192.
Katartzis, A., & Sahli, H. (2008). A stochastic framework Wang, Haoxiang, and Jingbin Wang. “An effective image
for the identification of building rooftops using a sin- representation method using kernel classification.”
gle remote sensing image. IEEE Transactions on Geo- 2014 IEEE 26th International Conference on Tools
science and Remote Sensing, 46(1), 259–271. with Artificial Intelligence. IEEE, 2014.
Region connection calculus. (2016, January 24). In Wang, Jingbin, et al. “Multiple kernel multivariate per-
Wikipedia, the Free Encyclopedia. Retrieved formance learning using cutting plane algorithm.”
00:27, January 24, 2016, from https://en.wikipedia. Systems, Man, and Cybernetics (SMC), 2015 IEEE
org/w/index.php?title=Region_connection_calculus International Conference on. IEEE, 2015.
&oldid=701345827. Yi, L., Zhang, G., & Wu, Z. (2012). A scale-synthesis
Renz, J., & Ligozat, G. (2005, October). Weak composi- method for high spatial resolution remote sensing
tion for qualitative spatial and temporal reasoning. In image segmentation. IEEE Transactions on Geo-
International Conference on Principles and Practice science and Remote Sensing, 50(10), 4062–4070.
of Constraint Programming (pp. 534–548). Springer Yuan, J., Wang, D., & Li, R. (2014). Remote sensing
Berlin Heidelberg. image segmentation by combining spectral and tex-
Sorlin, S., & Solnon, C. (2005, April). Reactive tabu ture features. IEEE transactions on geoscience and
search for measuring graph similarity. In Interna- remote sensing, 52(1), 16–24.
tional Workshop on Graph-Based Representations Zhong, P., & Wang, R. (2007). A multiple conditional
in Pattern Recognition (pp. 172–182). Springer Berlin random field’s ensemble model for urban area detec-
Heidelberg. tion in remote sensing optical images. IEEE Trans-
Syed, A. H., Saber, E., & Messinger, D. (2012, May). actions on Geoscience and Remote Sensing, 45(12),
Encoding of topological information in multi-scale 3978–3988.
338
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: LED chip localisation is an important process during the testing and sorting of LED
chips. Many template matching have been widely used for LED chip localisation. However, these meth-
ods require that the template image is artificially made, which may lead to misjudgement due to human
fatigue. In order to overcome these shortcomings, we proposed an edge detection-based algorithm to
detect the pose (position and orientation) of an LED chip automatically. The algorithm consists of three
steps. Firstly, smooth the image histogram by Gaussian filter to segment the LED chip from background.
Meanwhile, apply the image pyramid method to reduce computation. Secondly, according to morphology
operator on the LED chip region to obtain the Region of Interest (ROI) of edge detect and detect the
subpixel edge precisely. Finally, take the RANdom SAmple Consensus (RANSAC) algorithm as weight-
ing factors to fit the subpixel edge and obtain the pose of LED chip. The results shows that the proposed
approach successfully locates the pose of the LED chip. Personnel costs and misjudgement due to human
fatigue can be reduced using the proposed approach.
339
emitting area and the electrode area. In our
attempt to get the pose of the LED chip, we seg-
ment the LED chip from the background at first.
In this paper, we propose an automatic segmenta-
tion method based on image histogram smooth-
ing, first, calculating the image histogram and then
convoling it with a Gaussian filter, the function is
defined in Eq. (1).
H smoothed H *G (1)
− s2
1
G e 2σ 2
σ 2π
Figure 1. LED image and grey histogram: (a) the Figure 2. LED image segmentation result and corre-
acquired LED image, (b) the original and smoothed grey sponding histogram: (a) Background; (b) light-emitting
histograms. area; (c) electrode area.
340
et al., 2005). The area feature is simply the number applied on the blobs after the image segmentation,
of points in the region after image segmentation, a circle of diameter 3 is used as the basic struc-
if the value is set between 2000 and 99999 accord- turing element to dilate and erode the boundary,
ing to the specification of the LED chip. The rec- we then calculate the difference between the two
tangularity feature calculates the similarity of the regions to obtain the ROI for the edge extraction
rectangle of the input regions, in order to exclude as shown in Figure 3(a). The region between the
the noise. The threshold in this paper is set from 0.5 two green contours is the ROI we need.
to 1. Figure 2 shows the image segmentation. Extracting the edges with pixel accuracy is suf-
In the end, for the sake of reducing the compu- ficiently accurate for LED chip position detection
tation time of the image segmentation, the image in the industrial manufacturing. Subpixel precision
pyramid method was used. The smaller the segment is required. To extract edges with subpixel accu-
region is, the less time the algorithm consumes. racy, the paper presents the subpixel edge detec-
tion based on a polynomial three times fitting
(Feipeng et al., 2010). The algorithm first fetches
2.2 Subpixel edge extraction
some points near the edge, then gets the grey level
Edge detection is a fundamental task in many of these points, and fits the grey curve through the
image processing applications such as motion anal- polynomial curve three times by Eq. (2), the edge
ysis and pattern recognition, The widely used algo- detection results are shown in Figure 3 (b) and (c).
rithms of edge extraction are Sobel, Robel, Prewitt
and Canny operators. Especially the Canny opera- f x ) = ax 3 + bx 2 + cx + d (2)
tors, almost the most occasion for edge extraction n
precisely are applied to it. In this paper, the Canny
operators are used for the edge detection of the
S ∑(y
i =1
i yˆ )2 =
n
LED chip (Canny 1986). Because the edge extrac-
tion is relatively costly, it is necessary to reduce the ∑[y
i =1
i ( 3 2
)]2 ( 1,2 , )
search space. The morphology method is therefore
Figure 3. Subpixel edge detection process: (a) obtain the ROI of edge detection. (b) edge detection result. (c) subpixel
edge detection result.
Figure 4. The fitting image result: (a) the LED chip image with small protrusion. (b) the fitting result of the least
squares fitting and RANSAC weighting fitting.
341
2.3 Fitting the subpixel edge After fitting the boundary in the subpixel accu-
racy, then calculating the pose of the LED chip
The subpixel edge extraction will create an enormous
according to Eq. (4), the result of the LED chip
data owing to the noise around the edge. Therefore,
localisation result is shown in Figure 5.
the paper takes the line fitting method to detect the
boundary of the LED chip accuracy. The formula
representing the boundary is given as follows:
x=
∫
A
xdA
d
y=
∫
A
ydA
(4)
A A
α βc + γ = 0 (3)
342
Table 1. Position accuracy test result.
No. x x Δx y y Δy
1 2 3 4 5 6 7 8 Average
Speed (ms) 45.2022 44.4244 43.8599 42.441 52.2087 41.5881 39.9601 39.5495 43
343
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Hua Zhu
College of Engineering, University of Michigan, Ann Arbor, MI, USA
ABSTRACT: There are a lot of unknown labels Android examples in real-world applications, and they
will cost much to mark manually. In this paper, we propose an active learning framework to solve this prob-
lem, so that Android malware are detected. In the active learning framework, Naive Bayes (NB), Decision
Tree (DT), Logistic Regression (LR) and Support Vector Machines (SVM) are used to mark the labels for
Android examples. The results indicate that this approach is effective to detect Android malware.
Keywords: Android; Malware static detection; Feature selection; Particle Swarm Optimization; Infor-
mation Gain
345
Figure 1. Structure of android malware online detection model.
trained detection models. If the prediction results of ments, 106 Android permissions are extracted.
the new samples from all the trained detection mod- After statistics, we find malicious applications
els are consistent, the new samples are viewed as high clearly tend to request more SMS-related per-
quality samples and added to the original training missions, such as READ_SMS, WRITE_SMS,
dataset to create a new training dataset. Otherwise, RECEIVE_SMS, and SEND_SMS. Moreover, we
the controversial samples are taken as the test data- scan all. smali files to collect 9342 Android SDK
set. The third part is training new model with the functions. Totally, the features are 9448.
new training dataset and testing the test dataset. In
this part, the procedure of processing new training
dataset contains extracting features. In addition, the 3.2 Statistics for the coincident predicted result
used machine learning methods are NB, LR, SVM with training dataset
and DT. They all have good performance for malware
In this part, Dataset S1 is taken as the training
detection (Tong S, 2001; Freeman S, et al., 2014).
dataset and Dataset S2 is taken as the testing data-
set. The class labels of samples in Dataset S2 are
unknown. Firstly, we use the Dataset S1 to train
3 EXPERIMENT AND DISCUSSION
classification model. Then the trained model is
applied to predict the class labels of Dataset S2.
3.1 Sample dataset for experiments
In addition, SVM, LR, DT, and NB are used to
The datasets we use are described in Table 1. The be classification models. The predicting procedures
dataset contains benign applications and malicious are running 10 times, and we record the results
applications. Benign applications are downloaded every time, containing the number of predicted
from Google Play Store in March 2015. Malicious benign and malware applications.
applications are collected from Tencent safety lab Firstly, we record the predicted result every time.
and http://sanddroid.xjtu.edu.cn:8080/#overview in Then, we count the coincident results of each classi-
August 2015, covering many kinds of malware fam- fier running 10 times, containing the number of the
ilies. At last, the size after clearing shown in Table 1. samples predicted as benign samples, and the number
Make sure a thorough comparison, we create two of the samples predicted as malicious samples. Finally,
datasets. Dataset S1 is the training dataset, contain- we get the coincident results of all classifiers, contain-
ing 700 benign and 680 malicious applications. Data- ing the 85 samples are predicted as benign samples, 80
set S2 is the testing dataset, containing 144 benign the samples are predicted as malicious samples, and
and 120 malicious applications. At first, Dataset S1 is 99 samples are not predicted to coincident results, as
used to train models and Dataset S2 is used as testing shown in Table 2. As a result, we add the samples with
dataset. According to the testing result, Dataset S2 is coincident predicted result to Dataset S1 to generate
separated into two parts according to the consistency Dataset S3, and let the samples without coincident
of the predicted results. One is added to Dataset S1 predicted results to generate Dataset S4.
and becomes Dataset S3 for training, and the other Comparing the true class labels of Dataset S2,
one turns into Dataset S4 for testing. we find the predicted coincident results keep the
Features are extracted not only from Android consistency with the truth. It means that there is no
permissions but also from SDK API. In the experi- samples predicted wrong in the coincident results.
346
3.3 Performance of the new training dataset decreases. In the predicted coincident results, there
are 39 malicious samples incorrectly predicted as
In this part, we will further detect the samples
benign ones. And no malicious samples correctly
based on the samples without coincident pre-
predicted as malicious ones. On other hand, SVM,
dicted results in last part. Dataset S3 is taken as
LR and DT are better than NB.
the training dataset and Dataset S4 is taken as
the testing dataset. Dataset S3 is processed like
3.4 Performance of the new training dataset
Dataset S1, including extracting feature, train-
ing classification models, and predicting the class According to the correct predicted results of in
labels of the samples in Dataset S4. The predict- Table 2 and Table 4, we can get the whole cor-
ing procedures are running 10 times, and we rect predicted results of Dataset S2, as shown
record the observed results every time, contain- in Table 5. Meanwhile, we can get the predicted
ing the number of predicted benign and malware accuracy based on the size of the correct predicted
applications. results divided by the size of Dataset S2.
In Table 3, we record the predicted coincident In Table 5, we count the number of samples in
results of each classifier and all four classifiers. At Dataset S2, which are predicted correctly by any
last, there are 69 samples predicted as benign ones, SVM, LR, DT and NB classifiers, and the number
no one predicted as malicious ones, and 30 samples of the coincident results, which are predicted cor-
are predicted without coincident results. rectly by SVM, LR, DT and NB classifiers. The
Comparing with the true class labels of Data- correct predicted applications contain 124 benign
set S3, we can get the correct predicted results and 80 malicious applications. And the incor-
of Dataset S3, as shown in Table 4. We find that rect predicted applications contain 20 benign and
the number of correct predicted benign samples 40 malicious applications.
Table 2. The observed coincident number of the predicted benign and malware applications after predicting proce-
dure running 10 times.
Table 3. The observed coincident number of the predicted benign and malware applications.
Benign 97 95 99 69 69 –
Malware 0 0 0 22 0 –
total 97 95 99 91 69 30
347
Table 4. The correct predicted results of Dataset S3.
Benign 58 57 59 40 39 20
Malware 0 0 0 8 0 40
total 58 57 59 48 39 60
In Table 6, we list the correct predicted accu- Burguera I, Zurutuza U, Nadjm-Tehrani S. Crowdroid:
racy of Dataset S2. The coincident accuracy from behavior-based malware detection system for Android
SVM, LR, DT and NB classifiers is taken as the [C]//Proceedings of the 1st ACM workshop on Secu-
rity and privacy in smartphones and mobile devices.
final accuracy of malware detection model, which ACM, 2011: 15–26.
is a conservative estimate. As shown in Table 6, we Enck W, Gilbert P, Han S, et al. TaintDroid: an informa-
get that the accuracy of the Dataset S2 is 77.27%, tion-flow tracking system for realtime privacy moni-
the accuracy of the benign applications in Dataset toring on smartphones [J]. ACM Transactions on
S2 is 86.11%, and the accuracy of the malicious Computer Systems (TOCS), 2014, 32(2): 5.
applications in Dataset S2 is 66.67%. In addition, Enck W, Ongtang M, McDaniel P. On lightweight mobile
among SVM, LR, DT and NB classifiers, we find phone application certification [C]//Proceedings of
DT can correctly predict benign applications with the 16th ACM conference on Computer and commu-
the highest accuracy, and DT gets the best perfor- nications security. ACM, 2009: 235–245.
Felt A P, Chin E, Hanna S, et al. Android permissions
mance of the whole Dataset S2. However, NB pre- demystified [C]//Proceedings of the 18th ACM con-
fers to predict benign applications correctly. ference on Computer and communications security.
ACM, 2011: 627–638.
Freeman S, Eddy S L, McDonough M, et al. Active learn-
4 CONCLUSION ing increases student performance in science, engineer-
ing, and mathematics [J]. Proceedings of the National
With the development of mobile devices, Android Academy of Sciences, 2014, 111(23): 8410–8415.
security attracts much attention, and Android mal- Freeman S, Eddy S L, McDonough M, et al. Active learn-
ware detection is regarded as an important research ing increases student performance in science, engineer-
task. In this paper, we propose a model for Android ing, and mathematics [J]. Proceedings of the National
malware static detection with feature selection algo- Academy of Sciences, 2014, 111(23): 8410–8415.
rithms, which uses active learning containing several Millis B J. Why Faculty Should Adopt Cooperative
Learning Approaches [J]. Cooperative Learning in
machine learning methods. Then we carry out series Higher Education: Across the Disciplines, Across the
of experiments to indicate that the active learning Academy, 2012: 1.
framework can effectively detect Android malware. Settles B. Active learning literature survey [J]. University
of Wisconsin, Madison, 2010, 52(55–66): 11.
Tong S, Koller D. Support vector machine active learning
REFERENCES with applications to text classification [J]. Journal of
machine learning research, 2001, 2(Nov): 45–66.
Aafer Y, Du W, and Yin H. DroidAPIMiner: Mining API- Wang Y, Zheng J, Sun C, et al. Quantitative security risk
level features for robust malware detection in Android assessment of Android permissions and applications[M]//
[M]//Security and Privacy in Communication Net- Data and Applications Security and Privacy XXVII.
works. Springer International Publishing, 2013: 86–103. Springer Berlin Heidelberg, 2013: 226–241.
348
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Shumin Li
Key Laboratory of High Performance and Complex Manufacturing, Central South University, Changsha, China
College of Mechanical and Electrical Engineering, Central South University, Changsha, China
Yingying Zhang
Key Laboratory of High Performance and Complex Manufacturing, Central South University, Changsha, China
Jinan Kunrui Optical Science and Technology Co. Ltd., Jinan, China
Ailun Wang
Key Laboratory of High Performance and Complex Manufacturing, Central South University, Changsha, China
College of Mechanical and Electrical Engineering, Central South University, Changsha, China
ABSTRACT: Aiming at the problem that accelerated testing can often not be executed in the prototype
and is always at high cost, a new accelerated testing method based on similar theory is proposed. By ensur-
ing the similarity of geometry, mechanics, kinematics and service environment between prototype and
model, a small-scale model can be established, and an accelerated testing of this small-scale model can be
conducted in the laboratory. A similarity model with single parameter distortion or multiple parameter
distortion can be built to shorten life by means of increasing certain stress to deteriorate the model service
environment. Finally, through the rod bolt accelerated life example under alternating load, the correctness
of the proposed method is verified.
Keywords: Accelerated life testing; Model testing; Similarity theory; Distortion model
349
stress condition to normal stress condition. However,
⎧
there still exists a problem in accelerated testing in ⎪π 2m π 2 p
that much of it cannot be carried out on work site. ⎪⎪
On the one hand, the service environment is too ⎨π n-km π n-kp (2)
complex and severe to collect life testing data. On the ⎪π f (π 2 ,π 3 π n-km )
other hand, if life testing data is collected on equip- ⎪ 1m
ment directly, the equipment will scrap too early and (
⎪⎩π 1 p f π 2 p ,π 3 p ,...,
. π n-kp)
costs will be incalculable. Aiming at the above dis-
advantages, a new accelerated testing method will Annotation: in this π equation, life variables
be proposed in this paper to overcome the problems are in π1 and other physical quantities are in
which exist in current accelerated testing methods. π 2 π 3 ,...,π n k . π1 is called the dependent π term,
π 2 π 3 ,...,π n k are called the independent π term.
For example, η is the degradation quantity of a
2 ACCELERATED TESTING BASED product, its π term can be written as π 1= Mη1 , and
ON SIMILARITY THEORY M1 is an expression which has the same dimension
with composed with η. The independent π term
α
2.1 Physical quantities which affect life with time variable t is π i = Mt i , and Mi has the
Product failure is always determined by some phys- same dimension with tα. In order to ensure that the
ical quantities, such as temperature, pressure, fre- model and prototype are completely similar, these
quency, speed, current and voltage etc. which are π terms should be:
called stress variables in this paper. Stress variables
can reflect the service degree of environment where ⎧π 2 p π 2 m
the equipment operates. Furthermore, life can also ⎪π 3 p π 3 m
⎪
be influenced by geometric parameters and some ⎪
materials properties, such as elastic modulus, ⎪π ip π im
strength limit and yield limit etc. ⎨ (3)
⎪π π ( n )m
⎪ ( )p
2.2 Proposing π equation of accelerated testing π
⎪ 1p f π(2 p ,π 3 p , π ip , ,π n kp )
⎪π
⎩ 1m f (π 2 ,π 3 π n − km )
based on similarity theory π
In classical similarity theory, similarity should
be the same in content and equation description π1p = π1m can beη ensured. α α
η t
Above it, π 1 p = M π 1m = M , π ip M , π im = M .
t
(Yurkowsky W. S. et al., 1967). For instance, a 1
p m p m
350
4.1 Research on accelerated life testing etc. When research π1 term changes with πi term,
with single parameter distortion model degradation path can be derived in a short
A similarity model with single parameter distor- time by improving the stress level of σj to distort πj
tion can be built to shorten life by improving some term, and πj distortion degree can be expressed as
stress levels to deteriorate service environment. ϕj. For example, π 1= p [ π ] can be used to
For example, σj is a stress variable which can be fit one product degradation curve, and the func-
temperature, pressure, force etc. that affect the tion between ϕj and b or a can be built by ana-
speed of degradation. Its π terms are π j = Mj ,
σ β lysing the data of a and b with different stress
and Mj has the same dimension with σ j β . When
j ( )
levels ϕ j1 ϕ j2 ,ϕ j3 . After establishing the func-
π 2 π 3 ,⋅⋅⋅π i −1 π i 1 ⋅⋅⋅,π j , ,π n − k remains constant, tion between a and ϕj, and the function between
π 1= Mη1 is changed with π i = Mt i , and the relation
α b and ϕj, degradation data with normal stress can
between π1 and πi can be expressed as this equation: be calculated from the function built, such as in
Figure 1.
(
π 1 = f π 2 ...π i 1 π i π i 1 ,π j ...π n-k ) (4)
4.2 Research on accelerated life testing
with multiple parameter distortion
Generally, degradation path can be fitted by
linear function, single-logarithmic linear func- One stress variable cannot be increased infinitely
tion, double-logarithmic linear function, expo- in many cases, so single parameter distortion can-
nential function, composite exponential function not meet the demand of engineering practice. For
Figure 1. Degradation curve of one parameter distortion in different distortion data level.
Figure 2. Degradation curve of double parameter distortion in different distortion data level.
351
example, rotating speed can affect rotor degrada- ACKNOWLEDGMENTS
tion (the higher the rotating speed, the faster the
degradation), but it is very difficult to increase This research is supported by the 973 program
rotating speed infinitely. In order to quicken the rate (2013CB 035706), National Natural Science Fund
of life testing, we can improve another stress vari- (51175517) and Central South University graduate
able, such as the service temperature, to carry out Students Innovation Fund (2014zzts186).
the double or multiple parameter distortion and to
meet the demand of accelerated degradation.
For example, σk is another stress variable REFERENCES
which affects the rate of degradation. Its π term
σ γ
is π k = Mkk , and Mk has the same dimension with Bugaighis, M.M. (1995). Exchange of censorship types
σ k γ . The stress level of σk and σj can be improved and its impact on the estimation of parameter of a
together to distort πj and πk, and their distortion Weibull regression model. IEEE Transactions on Reli-
degree can be expressed as ϕj and ϕk respectively. ability, 44(3), 496–499.
Also, π 1= p [ π ] can be used to fit one prod-
Chen, X. and Zhang, C.H. (2013). Accelerated Life Test-
ing Technology and Application. Beijing: National
uct degradation curve, the function between ϕj, ϕk Defense Industry Press: 1–12.
and a, b by analysingg the data of a and b with dif- Deng, A.M. and Chen, X. (2007). A comprehensive
( )
ferent distortion ϕ k1 ϕ k2 ,ϕ k3 ϕ j1,ϕ j2 ϕ j3 After review of accelerated degradation testing. Acta Arma-
establishing the function between a, b and ϕj, ϕk, mentarii, 28(8), 1002–1007.
degradation data with normal stress can be calcu- Hirose, H. (1993). Estimation of threshold stress in accel-
lated from the function built, such as in Figure 2. erated life testing. IEEE Transactions on Reliability,
42(4), 650–657.
Mazzuchi, T.A. and Soyer, R. (1990). Dynamic mod-
els for statistical inference from accelerated life tests.
5 CONCLUSION IEEE Proceedings of Annual Reliability and Maintain-
ability Symposium (pp. 67–70).
Aiming at the problem that often accelerated test- McLinn, J.A. (1999). New analysis methods of multilevel
ing cannot be executed in the prototype and are accelerated life tests. IEEE Proceedings of Annual Reli-
high cost, a new accelerated testing method based ability and Maintainability Symposium (pp. 38–42).
on similar theory is proposed from the aspect of Wang, W. and Kececioglu, D.B. 2000. Fitting the Weibull
similarity theory. The corresponding relation log-linear model to accelerated life test data. IEEE
between the model life and the prototype life Transactions on Reliability, 49(2), 217–223.
is found by establishing a geometry small-scale Yurkowsky, W.S. et al. (1967). Accelerated testing tech-
nology. (Report No. RADC-TR-67–420). New York:
model. A model with single parameter distortion Rome Air Development Center.
or multiple parameter distortion can shorten the Zhang C.H. & Wen X.S. (2004). A comprehensive review
life significantly, and the method will simplify the of accelerated life testing. Acta Armamentarii, 25(4),
accelerated test and reduce test costs. As a result, 485–490.
the method has important implications for the esti-
mating lifetime of the product with high reliability.
352
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Y.G. Ji, C.Y. Tian, X.G. Ge, C.D. Ning & Z.H. Lan
Air Force Aviation University, Changchun, China
ABSTRACT: According to the research on the principle of pulse laser ranging, some factors and rea-
sons arousing the measured errors can be found. At the same time, aiming at the primary factors, several
effective methods to solve the precision of pulse laser ranging were brought forward.
353
In addition, the mix of various noises may
cause a time error Δt3. All of these will cause inac-
curacies in the counter, the relevant error being
ΔRt = Δt1+Δt2+Δt3.
However, according to the principle and struc-
ture of the pulse laser range finder, and the analy-
sis of Formula (2), the pulse laser ranging error is:
In Formula (l), c/2f expresses the distance incre- 4 INCREASE OF SYSTEM PRECISION
ment of every clock pulse, count n clock pulses can
get distance R. According to the analysis of the ranging error,
ranging precision is relative to the factors of
atmosphere refraction, oscillation frequency, non-
3 ANALYSIS OF RANGING ERROR vacuum velocity of light, stability of oscillation
frequency and return wave rising edge vibration.
According to the analysis of the basic ranging
equation (1), laser ranging is essentially the meas-
ure of time t, so the precision of the measure of 4.1 Increasing counter frequency
time is also the precision of the ranging. The most ordinary laser ranging information dis-
posing device is called the counter, it uses main
ΔR1 = RΔt/t0 (3) waves as the open gate signal and return waves
as the close gate signal. The counter counts the
Because there are great differences between the number of clock pulses when the gate is open.
intensities of reference waves when sending laser According to Formula (2), the measured distance
and return signals, time delays when they act on can be written as follows:
the range finder and response times when they
trigger the gate circuit, the time error caused can c(n ± 1)
be 10-8 s maximally, the limited bandwidth always R=
causes a pulse rising edge delay error Δt2. 2ff
354
Commonly, c/2f is designed as intuitionistic ΔT = T0/K
long measure, as 1 m, 10 m, etc. However ±1 in
the formula is the counter error caused by the syn- Apparently, the ranging precision of this method
chronism between the frequencies of the main and is K times more than the direct counter method
return waves and the clock. with the same clock pulse frequency.
So if we want a resolution of ±1 m, there should
be a clock of 150 MHz. If we want it to be ±1 cm,
the clock should be 15 GHz. In practice, it is 4.3 Reducing the error of differences of trigger
hard to get an oscillation frequency of more than point by constant-fraction timing
150 MH, so to get a ranging precision of 1 m is too Because of the width of the laser pulse, there will
hard at present. be a ranging error caused by the position changes
of the counter open and close trigger point in the
4.2 Increasing resolution of counter timing rising edge. Measure error changes when the trig-
ger mode is varied.
Signal pulse trigger counter gate circuit, timing When adopting a constant-fraction timing trig-
precision is influenced by mantissa time of switch ger mode, constant-fraction timer input signals
and clock non-synchronisation time which is less will be divided into two routes; one route enters
than one clock quantity. the comparator after dividing by K, another route
Time inner-insert method’s principle is shown in enters the comparator after a td delay, and the point
Figure 4. And pending time interval Tx is of intersection is the trigger point time.
The constant-fraction timing trigger does not
Tx = T3+T1−T2 change with the signal range; it is only relative to
the pulse width. After deduction and validation,
T3 is the integer multiple of the clock pulse, the trigger point variable caused by the changes of
and has the same phase with it. T1, T2<T0.T1, T2 pulse width is:
is just which direct counter can’t count accurately.
The main function of inter-insert is to get the time τ ln K
interval and T3 from the clock pulse, sample pulse Δts = Δτ
and return pulse. Apparently T3 can be measured 2.7225 td
by the counter accurately without any error. The
end of T1 and T2 has a fixed phase relationship If the signal pulse width is 10 ns, K = 2, td = 4 ns,
with the clock pulse, so T1−T2 is a random time Δτ = 0.5 ns, then Δts = 0.31 ns, and the correspond-
interval. If we multiply T1 and T2 by K, then: ing ranging error is 4.7 cm.
So we can see that the precision is very high
T1´ = KT1; T2´ = KT2 when adopting constant-fraction timing, which
can effectively reduce the error caused by posi-
Then use T1´ and T2´to control two electron tion changes of the counter open and close trigger
gates to make clock pulse with same frequency go point in the rising edge.
through them. If the clock pulse that goes through In addition, velocity of light error can be cor-
during T1´ and T2´ is N1 and N2, the total measure rected by level and tilted distance measure. In level
error of T1–T2 is ±1 clock pulse. Because T1´ and measure, the corrected formula can be got from
T2´have already multiplied by K, so the total meas- ground temperature, pressure and humidity. In
ure ΔT is: tilted distance measure, the formula should be cor-
rected by weather data with the atmosphere dela-
minating method. This error will be 5 cm∼10 cm
when E≥10°; 10 cm∼20 cm when E≥ 0°∼10°after
correcting.
5 CONCLUSION
355
and adopting constant-fraction are used, however, Marius A. Albota Richard M. Heinrichs, David G.
ΔRc can be corrected by formula according to dif- Kocher, et al. (2002). Three-dimensional imaging laser
ferent instances, and all these methods can obvi- radar with a photon-counting avalanche photodiode
ously improve ranging precision. array and microchip laser. Applied Optics, 41(36).
Ou-Yang, M., Huang, C. Y., & Chen, J (2006). High
Additionally, many other system errors can be dynamic range laser range finders based on a novel
corrected when used in a high precision ranging multimodulated frequency method [J]. Optical Engi-
system. neering, 45(12).
Wang, Y. Z. (2003). Modern military optic technology
[M]. BeiJing: science publisher, 2003.01
REFERENCES Wu Hanzhong, Cao Shiying, Zhang Fumin, et al (2015).
Spectral interferometry based absolute distance meas-
An Weining, Zhang Fumin, Wu Hanzhong, et al (2014). urement using frequency comb [J]. Acta Physica
Absolute distance measurement method based on Sinica, 64(2).
frequency-domain interference using a femtosecond Wu, H., Zhang, F., Li, J., et al. (2015). Intensity evalua-
optical frequency comb [J]. Chinese Journal of Scien- tion using a femtosecond pulse laser for absolute dis-
tific Instrument, 35(11). tance measurement [J]. Applied Optics, 54(17).
356
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
357
To the best of knowledge, graph databases agement system in power grid. Before implement
have not been widely applied in power system those graph databases, we conduct a brief study of
yet. However, communication and information in all the mentioned graph databases (Singh, et al.,
power system can be modelled as property graph. 2015) (Pabon, 2014) (Jouili, et al., 2013) (Jain,
Devices, e.g., server, storage device, and network et al., 2013) (McColl, et al., 2014) (Kolomičenko,
switch can be modelled as node. The transmission et al., 2013) (Vicknair, et al., 2010) (Beis, et al.,
line and the logistical connection between devices 2015).
can be modelled as edge. The configuration of
the device, the power grid management system it
2.1 Neo4j
belongs to, the actual address can be modelled as
properties. To the best of our knowledge, we firstly Neo4j, a graph database management system
utilized graph databases to study the communica- developed by Neo Technology Inc, is one of the
tion and information asset management in power most popular graph databases according to db-
system. Firstly, we investigate the actual require- engines.com. The first version is released in 2010,
ments of communication and information asset and the latest version, i.e., the third version is
management in power system and conduct model- released in 2016. Neo4j supports graph model
ling. Secondly, we make a brief survey of the latest called “Property graph”, which includes nodes,
popular graph databases, i.e., Neo4j, GraphFrame, edged and attribute (i.e., properties). Neo4j is writ-
GraphSQL. Thirdly, we realize the modelling of ten in Java, and provides APIs which are exposed
the topological graph of the communication and through a whole range of various languages, e.g.
information asset of power system. Fourthly, we Java, Python, Ruby, JavaScript, PHP, .NET, etc.
achieve the visualization of communication and It is noteworthy that C and C++ are not in the
information asset managements above list. Cypher is a declarative graph query lan-
guage for the graph database Neo4j, and is roughly
equivalent to SQL querying language in relational
2 SECTION I: A BRIEF SURVEY OF databases. The database system also implements
GRAPH PROCESSING PLATFORMS IN the Blue-prints interface and a native REST inter-
POWER SYSTEM face to further expand the ways to communicate
with the database. Neo4j provides three editions:
Graph processing platforms have played more and Community, Enterprise, and Government. Com-
more important roles in large online system with munity version is provided for individuals to learn
deep links between records. Pregel is the system graph databases and conduct smaller projects that
built by Google to power PageRank, which is a do not require high levels of scaling. However, it
fundamental algorithm for web searching engine. excludes professional services and support. The
It is also the inspiration for Apache Giraph, which Neo4j Enterprise edition offers incredible power
Facebook uses to analyze their social graph. How- and flexibility, with enterprise-grade availability,
ever, Pregel is owned by Google and unavailable to management and scale-up & scale-out capabilities.
other developers. Apache Giraph only releases the Neo4j provides sustainable competitive advan-
first version in 2015 and releases no update. tage in internal applications for enterprises, e.g.,
With the rapid development of graph processing master data management, network and IT opera-
platforms, a lot of Graph systems have emerged to tions and fraud detection. Neo4j has provided
meet the market requirements of storing and man- sophisticated supports for customer, e.g., Walmart,
aging a big graph, and most of the systems claim ebay, and LinkedIn.
that they are superior to other graph processing
platforms with somewhat unfair compassion tests.
2.2 GraphFrame
For example, some comparisons are not conducted
with the latest version. Some comparisons are con- GraphFrame is a database that could manage data
ducted with the community version rather than with a graph structure. It is a module on Spark
business versions. SQL in Spark. The data structure is based on Spark
Although a lot of work compares the most sub- Resilient Distributed Dataset (RDD). The data
stantial graph database functionality and obtains in GraphFrame could be transformed to Spark
the benchmark, e.g., load graph data, page-rank GraphX. GraphX is a distributed graph processing
algorithm, the shortest path algorithm, a forward framework based on Apache Spark. GraphX uni-
step to utilize of graph databases in power systems fies ETL, exploratory analysis, and iterative graph
has not been realized yet. computation within a single system. The data can
Among a number of graph database system, we be presented as both graphs and collections. RDDs
choose Neo4j, GraphFrame and GraphSQL to are efficiently utilized to transform and join graphs.
design communication and information asset man- Developers can use Pregel API to write custom itera-
358
tive graph algorithms. GraphX emerges with a num- 3.1 Physical elements
ber of graph algorithms, e.g., page rank, connected
The devices in the Application System of the power
components, SVD++, strongly connected compo-
system and the connection among devices should
nents, and triangle count. Since GraphX is built as
be shown precisely in the graph model. The verti-
a library on top of Spark, no modification to Spark
ces and edges corresponding to the physical devices
is required. To achieve superior performance parity
and their connections are discussed in the section.
with specialized graph processing systems, GraphX
introduces a range of optimizations techniques: dis- a. Vertices Modelling
tributed graph representation, implementing the tri- Three types of physical vertices are considered in
plets view, optimization to mrTriplets. GraphX has the graph model of application systems. The ver-
been successfully utilized to analyze QQ social data tices include Server vertices, Storage Device ver-
by Tencent. It is noticed that graph theory has been tices, and Network Device vertices. Various kinds
utilized to design power flow computer algorithm. of servers are considered in the model. Therefore,
GraphX is a potential solution to large scale power server vertices contain application servers (App),
flow computing problems since GraphX achieves data servers (Data), port servers (Port), map serv-
great performance in graph computing. ers (Map), data agent servers (Agent), and F5 load
balancing devices (F5). Besides, a network device
refers to interchanger in the graph model.
2.3 GraphSQL
Different types of vertices have different proper-
GraphSQL databases and associated analytical ties. The table lists the properties of the vertices:
engine are claimed as a complete, distributed, par-
allel graph computing platform for web-scale data
analytics in real-time. Map reduced and parallel Vertex Device Model IP
graph processing are unified to in GraphSQL to Type ID Subcategory No. Location address
accelerate scalable parallel graph algorithms. User
defined functions are available with the vertex-cen- Server √ √ √ √ √
tric map-reduce style API. In addition, a SQL-like Storage √ √ √ √ √
graph query language, i.e., GSQL is provided for Device
ad-hoc exploration and interactive analysis of Big Network √ √ √ √
Data. Powerful parallelization mechanism is pro- Device
vided for scaling massive graph processing. Based
on the above techniques, GraphSQL achieves
fast data loading speed to build graph, and fast Vertex Operation Type of
execution of parallel graph algorithm. Large scale Type Port System Configuration Cluster
offline data processing and real-time analytics
are unified in GraphSQL. The unique feature of Server √ √ √
GraphSQL is that it has the real-time capability Storage
for streaming updates and inserts. In general, there Device
exist three key functional components in Graph- Network √
SQL: graph-powered real-time analytics platform, Device
enterprise data engine, and customer intelligence
solutions. The graph-powered real-time analytics
platforms collects, stores, and processes massive Device ID, subcategory, model No., and location
data to form a property graph. The enterprise data are universal properties. In other words, whatever
engine supports robust analytics by graph theory the vertex type is, a vertex has the four properties
based analytical algorithms. The customer intelli- to identify the device.
gence solutions focus on decision support system As for IP address and port, an IP address of a
and data visualization with tools, e.g., Tableau. server or storage device corresponds to a port of
network device (interchange). The detailed physi-
cal connections are not shown by the properties of
3 SECTION II: DATA MODELLING vertices. Denote that a vertex could have more than
OF APPLICATION SYSTEMS one IP addresses or more than one ports.
The operation system, configuration and type
In this chapter, the composition of the application of cluster are unique properties of server vertices.
systems is described. Then, the modelling of the The operation system could be either Windows
facilities and their relationship are discussed. The or Linux. The configuration refers to the hard-
fault analysis function and the visualization of the ware configuration of the server, for example,
facilities are based on the graph model. the number of CPU cores. The type of cluster
359
Table 1. Shows the Comparison of Neo4j, GraphX, GraphSQL in detail.
The most well-known graph A graph computing framework A complete parallel graph database built
database implemented in built in Spark. Utilizing all from scratch optimized for performance,
Java. Storing graph data the resource and operations providing both real time and large-scale
in its own native graph in Spark. graph analytics.
format and provides
graph traversal APIs.
Pros • Comprehensive graph • Powerful capability of parallel • Fast graph loading speed and graph
database functionality computing in memory traversal speed
• SQL-like query language • Including implementation of • Rapid real-time incremental graph
• Detailed technical basic graph algorithms update capability
documentation • With mature development • Node-centric MapReduce style API
• Large developer modules and APIs, easy to with built-in parallelism support
community build up new function • Graph data computing functions,
with Arithmetic, logical, union
operations, and logical control
• Support User-Defined Functions
• SQL-like graph query language
Cons • Lack of built-in • Support Java or Python, • C/C++ application development
parallelism for large complicated in programming only, lack of Java support
scale graph analytics • Poor in real-time data update • Insufficient technical documentation
• Slow incremental graph • Lack of graph data storage • Poor maturity and stability
update and output
indicates the topological structure of a server clus- logic edges, the impact area of a fault node can be
ter, e.g., F5 or RAC. All servers in a cluster share determined in a query. Denote that business logic
the same type of cluster properties. edge is unidirectional.
b. Edges Modelling
Bidirectional edges are used to model the connec-
tions among vertices. The physical correspondence 4 SECTION III: COMMUNICATION
of the edges is cable. The vertex types connected DEVICES VISUAL REPRESENTATION
by the different edges are listed in the table below:
4.1 Introduction to visualization
Type of Edge Vertex 1 Vertex 2 The goal is to present the relations and connections
between communication devices, which is beneficial
1 Server Network device for device management, communication system
2 Network device Network device analysis and network planning. This allows people
3 Storage device Network device to have a good view of all the operating devices and
4 Storage device Storage device their working conditions. In this section we load
data and achieve data visualization with the model
already built before. We use the dataset which is syn-
c. Virtual Elements
thesized based on real device connection.
In order to describe the function of the devices, two
groups of virtual elements are defined in the graph
model. The one are system vertices and belonging 4.2 Neo4j vs. GraphSQL
edges. Another one are business logic edges.
Neo4j Community Edition and GraphSQL both
1. System Vertices and belonging edges have visualization tools. In Neo4j, since Cypher is
A system vertex is a super node that represents an essentially a declarative query language, it allows
application system. The super node consists of the the developers to write queries and update graph
devices that belongs to the application system. In the store efficiently without paying much attention on
graph model, a vertex and a set of belonging edges data structure. Users can write queries in Cypher
are used to represent the system-level super node. language and run query command in Neo4j’s edi-
2. Business logic edges tor. Neo4j generates visualization automatically
Another type of virtual edges is business logic in the result frame to display the query result. In
edges. The edges indicate the business logical rela- GraphSQL platform, user can submit query in web
tionship between two devices. With the business browser after creating the query job, and the query
360
visualization comes out. Considering the flexibility property is PMS can visualize all the devices in
of Cypher language and highly customized visuali- PMS system. Users can simply write these kind of
zation, we choose Neo4j as our tool. queries to make their own visualization.
It is convenient to change graph style using
4.3 Loading data and visualization Graph Style Sheet provided by Neo4j. In Graph
Style Sheet we can set color, caption, text color,
We use Neo4j database to create graph and visual- font size for nodes and edges. Users can import
ize graph data. Before loading data, we have got already modified Graph Style Sheet to customize
our data in CSV format based on the real connec- their graph visualization. The nodes layout is not
tions between different devices. As discussed above, clear when they first come out, so users must drag
nodes represent communication devices and edges nodes to suitable places to get desired visualization.
represent physical connections between them. The
main steps are as follow:
4.5 Visualization
Run query → Customize Graph style
We can write different queries for different visu-
alization application scenarios. It is very conveni-
ent for to get a thorough display of all devices by
the visualization of the whole graph. Querying all
the node whose property is server can visualize all
server devices. Querying all the node whose system
361
4.6 Remark Jain R, Iyengar S, Arora A. Overview of popular graph
databases[C]//Computing, Communications and Net-
By using Neo4j database, we can make visualiza- working Technologies (ICCCNT), 2013 Fourth Inter-
tion of graph data which contains information national Conference on. IEEE, 2013: 1–6.
about devices status and connections between Jouili S, Vansteenberghe V. An empirical comparison
devices via the web browser. Visualization will sup- of graph databases[C]//Social Computing (Social-
ports the fault affected area analysis. Node can Com), 2013 International Conference on. IEEE, 2013:
be made in striking color to remind people of the 708–715.
fault affected area. Kolomičenko V, Svoboda M, Mlýnková I H. Experimen-
tal comparison of graph databases [C]//Proceedings of
International Conference on Information Integration
and Web-based Applications & Services. ACM, 2013:
5 CONCLUSION 115.
McColl R C, Ediger D, Poovey J, et al. A performance
evaluation of open source graph databases[C]//Pro-
We have surveyed GraphSQL, GraphFrame, and ceedings of the first workshop on Parallel program-
Neo4j. A graph model is put forward in order to ming for analytics applications. ACM, 2014: 11–18.
model communication and information devices in Miller J J. Graph database applications and concepts
the power system. We have made an exploration to with Neo4j[C]//Proceedings of the Southern Asso-
use Neo4j to store and manage the graph model. A ciation for Information Systems Conference, Atlanta,
visualization of the physical graph topology is also GA, USA. 2013, 2324.
put forward. Pabon O S. A comparison of NoSQL graph
databases[C]//2014 9th Computing Colombian Con-
ference (9CCC). 2014.
Robinson I, Webber J, Eifrem E. Graph Databases: New
REFERENCES Opportunities for Connected Data [M]. “O’Reilly
Media, Inc.,” 2015.
Beis S, Papadopoulos S, Kompatsiaris Y. Benchmarking Singh M, Kaur K. SQL2 Neo: Moving health-care data
graph databases on the problem of community detec- from relational to graph databases[C]//Advance Com-
tion [M]//New Trends in Database and Information puting Conference (IACC), 2015 IEEE International.
Systems II. Springer International Publishing, 2015: IEEE, 2015: 721–725.
3–14. Vicknair C, Macias M, Zhao Z, et al. A comparison of a
EPRI Smart Grid Demonstration Initiative. Two year graph database and a relational database: a data prov-
update [J]. Electric Power Research Institute (EPRI).– enance perspective[C]//Proceedings of the 48th annual
USA, California, 2014. Southeast regional conference. ACM, 2010: 42.
362
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Yu He
State Grid Yancheng Power Supply Company, Yancheng, Jiangsu, China
ABSTRACT: A surge arrester fault diagnosis method based on Support Vector Regression (SVR) is
put forward. In the method, the influence of environmental factor and power network factor on leakage
current value is taken into account and as the input feature vector of support vector machine, and the
fundamental and third harmonic waves of resistive current are taken as the diagnosis characteristic of
surge arrester dampness and aging respectively. The regression model of unaged surge arrester is deter-
mined via multivariable experiment, and the predictive value of the diagnosis characteristic is obtained
in combination with online monitoring data at the time of diagnosis. With the predictive value and the
measured value, the deviation between the current state and the unaged state can be calculated, and then
the occurrence and severity of fault can be judged on this basis. At last, the method is verified with an
example for accuracy and effectiveness.
1 INTRODUCTION made some achievements. Zhang Pei et al. put for-
ward a surge arrester fault diagnosis method based
Surge arrester is widely used in power system, on BP neural network. In this method, the influence
which can effectively protect lightning overvoltage of multiple physical environment parameters on leak-
and switching overvoltage. It is one of the most age current surge arrester is taken into account, and
important electric equipment. The performance the output result is a fault probability ranging from
and reliability of surge arrester are of great signifi- 0 to 1, but the fault type is not determined. Lira,
cance to safe and stable operation of power net- G. R. S. et al. simulated multiple types of fault, cre-
work, and the running state of surge arrester must ated a fault database, and judged surge arrester fault
be grasped accurately from time to time. occurrence and fault type with self-organizing map
Traditional surge arrester fault diagnosis methods network with the measured total current as input.
mainly include off-line test, infrared temperature The accuracy of this method, however, will lower if
measurement, and total current and resistive current the power grid has harmonic wave. Khodsuz, M. &
measurement, etc. Off-line test is complicated and Mirzaie, M. took the each current component and the
time-consuming, with which fault cannot be identi- ratios of multiple current components as input, and
fied timely, but fault degree may progress and fault applied multi-class support vector machine to realize
coverage may expand. The precision of infrared tem- judgment of fault type, but didn’t take the influence
perature measurement is susceptible to the influence of physical environment on input into account.
of various factors, and there exists measuring blind On this basis, an SVR-based surge arrester fault
zone. The limitation of total current and resistive diagnosis method is put forward in this paper. In
current measurement is that since surge arrester is this method, the influence of power harmonic and
installed in rugged physical environment and electro- physical environment on leakage current of surge
magnetic environment, many on-the-spot factors will arrester is taken into account, different eigenvec-
interfere current measurement, which leads to devia- tors are selected as input based on fault type, and
tion, and then affects the accuracy of fault diagnosis. the deviation between the current state and unaged
In recent years, both domestic and foreign schol- state of surge arrester is calculated in combination
ars started trying surge arrester fault diagnosis in with monitoring data, to determine the occurrence
combination with intelligence algorithm, and have and severity of fault.
363
2 SVR-BASED SURGE ARRESTER FAULT Step 2: Perform data preprocessing over the
DIAGNOSIS training samples obtained in Step 1. The dimen-
sions of different influencing factors are dif-
2.1 Selection of input and output eigenvectors ferent, and the values widely differ from each
other. If the values are directly adopted without
For modeling surge arrester with SVR algorithm,
processing, it is highly impossible to figure out
the input and output eigenvectors should be deter-
the real weight of influence of each factor on
mined. Output eigenvector refers to a set of charac-
resistive current of surge arrester. Therefore, the
teristic quantities that are able to reflect fault state
training samples must be subject to normaliza-
of equipment, while input eigenvector to a set of
tion processing, so as to enable comparison and
variables influencing the value of the fault charac-
analysis at the same order of magnitude. For
teristic quantities. The selected fault characteristic
purpose of this paper, linear independence of
quantities must be able to reflect the type of a cer-
information normalization is adopted to nor-
tain fault, and have a large change relative to the
malize to the interval of [−1, 1], of which the
normal value in the case of fault. Since many surge
computational formula is:
arrester faults occur due to dampness or aging, this
paper focuses on the diagnosis method of this two
types of fault. Experimental study shows that fun- xi min ( x )
xiN = × 2 −1 (1)
damental wave of resistive current is sensitive to max ( x ) min ( x )
dampness change, but doesn’t change significantly
in the case of valve block aging, while the case of
third harmonic resistive current is the opposite. where xi and xiN are values of a data before and
Hence, the fundamental wave and third harmonic after normalization respectively, and max(x) and
of resistive current are selected as the fault charac- min(x) are the maximum and the minimum of the
teristic quantities of dampness and aging of surge same type of data.
arrester respectively in this paper. Step 3: Solve the regression model with SVR algo-
The research of Ding Guocheng et al. has verified rithm based on the normalized training samples.
the influence of surface filth, ambient temperature Step 4: Obtain test samples via online monitoring
and humidity on leakage current of surge arrester. of surge arrester. Specifically, sample the target
Concerning power network factor, among the volt- surge arrester regularly in a continuous period,
age components of working voltage, the fundamen- covering the values of the variable factors as set
tal component and the third harmonic component forth in Step 1, IR1 and IR3. The monitoring data
have significant influence on the value of resistive of variable factors are taken as input characteris-
current. Besides, interphase interference will also tic quantities of the test samples, and IR1 and IR3
cause certain error in measurement of leakage cur- as output characteristic quantities. Perform data
rent. Since this factor is linked with the installation preprocessing over all test samples according to
of surge arrester, however, it can be regarded as a the normalization method as set forth in Step 2.
known quantity after the surge arrester goes into Step 5: Diagnose the state of the target surge
operation. To sum up, surface filth, ambient tem- arrester based on the regression model. Specifi-
perature, relative humidity, fundamental and third cally, put the input characteristic quantities of
harmonic wave of working voltage are selected as the test samples into the regression model to
input characteristic quantities in this paper. calculate out the predictive values of the fun-
damental component and the third harmonic
component of resistive current at each sampling
2.2 Steps of fault diagnosis point of the surge arrester, and then calculate
the MSE and squared correlation coefficient R2
The SVR-based surge arrester fault diagnosis to realize state diagnosis. The larger the MSE is
method mainly includes the following steps: or the closer R2 is to 0, the larger the degree of
Step 1: Take training samples required for SVR the target surge arrester deviating from the ini-
algorithm via multivariable experiment. Specifi- tial healthy state is. Specifically, the MSE or R2
cally, measure and record the fundamental resistive of IR1 is taken to judge the degree of dampness
current IR1 and third harmonic resistive current IR3 of the surge arrester; the MSE or R2 of IR3 to
of a surge arrester in initial healthy state under the judge the aging degree of the surge arrester. The
condition that the ambient temperature, relative computational formula of the MSE and squared
humidity, surface filth, fundamental voltage and correlation coefficient R2 is:
third harmonic voltage have small-step change
one by one. The variable factors are taken as input 1 n
(
∑ yp − ym )
2
characteristic quantities of training samples, and MSE = (2)
IR1 and IR3 as output characteristic quantities. n i =1
364
Table 2. The test sample data.
(n ∑ i =1 y p ym ∑ y p ∑ i 1 ym )2
n n n
R = 2 i =1 (3)
⎡ n ∑ n y p2 − ( ∑ n y p 2 ⎤ ⎡ n ∑ n ym2 − ( ∑ n ym )2 ⎤ No. Pollution level RH% State IR3(μA)
⎣ i =1 i 1 ⎦⎣ i =1 i =1 ⎦
1 1 4 65 Normal 1.215
where n refers to the number of sampling points, 2 4 75 Normal 1.748
and ym and yp to the measured value and predictive 3 4 85 Normal 2.861
value of the ith sampling point respectively. 4 4 92 Normal 3.508
2 1 4 65 Aged 1.632
2 4 75 Aged 1.912
3 EXAMPLE 3 4 85 Aged 3.054
4 4 92 Aged 5.267
To check the accuracy and effectiveness of the
method put forward herein, the experimental data
of surge arrester in the research of Khodsuz, M. &
Mirzaie, M. were adopted, which has clear conclu-
sions. The experimental data were divided into train-
ing samples and test samples for fault diagnosis. In
the experiment process, constant working voltage
and temperature were kept, and the influencing fac-
tors were surface filth and relative humidity. For the
training samples, the experiment data of unaged
surge arrester were taken, as shown in Table 1. The
test samples were divided into two groups, namely
experimental data of unaged and aged surge arrest-
ers respectively, as shown in Table 2. Figure 1. 3D view of parameter optimization for SVR.
The training samples were normalized first, and
the optimal values of parameters C and γ of SVR
were searched by means of grid search and cross vali-
dation. Grid range: C, γ ∈ [2–8, 28]; search range: 0.1;
optimal parameter values: C = 42.2243, γ = 0.0059.
The parameter optimization process is shown in Fig-
ure 1. After the values of C and γ were determined, a
regression model was built with the training samples.
The third harmonic resistive current IR3 of the
first group of test samples was predicted with the
regression model, and the results are as shown in
Figure 2. Since the first group of test samples are
experimental data of an unaged surge arrester, the
difference between the measured value and the pre- Figure 2. The measured value and the predictive value
of IR3 (Un-aged).
dictive value based on the regression model is not
significant. According to calculations, the MSE
The prediction results of the second group of test
equals to 0.01134, and the squared correlation
samples are as shown in Figure 3. According to Fig-
coefficient R2 equals to 0.978, consistent with the
ure 3, the difference between the measured value and
conclusion in the figure.
the predictive value of IR3 is large. This is because the
IR3 of the test sample was taken from the experimen-
Table 1. The training sample data. tal data of an aged surge arrester. Thus, the differ-
ence between the IR3 value and the regression model
No. Pollution level RH% State IR3(μA) predictive value representing the initial healthy state
is large. According to calculations, the MSE equals
1 1 65 Normal 1.226
to 0.27012, and the squared correlation coefficient
2 1 75 Normal 1.495
equals to 0.78039. Comparing with the unage state,
3 1 85 Normal 2.869
the MSE largely rises, while the squared correlation
4 1 92 Normal 3.17
coefficient significantly declines, which verifies the
5 2 65 Normal 1.113
6 2 75 Normal 2.641
effectiveness of the method put forward.
7 2 85 Normal 3.132
To compare the performance of the SVR-based
8 2 92 Normal 3.168 regression model put forward herein, BP neural
network was adopted for modeling the same train-
365
physical environment and power harmonic on
leakage current of surge arrester is taken into
account, and the fundamental wave component
and third harmonic component of resistive cur-
rent are taken as characteristic quantities of fault
diagnosis. A regression model was built on the
basis of the experimental data of a surge arrester in
healthy state. Online monitoring data was put into
the regression model for diagnosis. The predictive
values of corresponding diagnosis quantities were
obtained and compared with the measured val-
ues. The severity of aging and dampness of surge
Figure 3. The measured value and the predictive value arrester were judged by calculating the MSE and
of IR3 (Aged). squared correlation coefficient. Comparing with
BP neural network, the regression model built with
Table 3. Comparison of the predictive values for differ- this method are closer to the actual electrical char-
ent models. acteristics of surge arrester.
IR3(μA)
REFERENCES
No. Measured SVR Error% BPNN Error%
Ding, G.C., Tian, Y. & Chen, Q.T. et al. 2015. Study on
1 2.869 2.848 −0.73 2.872 0.10
effectiveness test of MOA charged detection tech-
2 3.17 3.149 −0.66 3.151 −0.60 nique. Insulators and Surge Arresters.04:105∼108.
3 1.113 1.133 1.80 1.165 4.67 Kang, Y.L., Wang, X. & Ding, X.Y. 2015. Effects of
4 2.641 2.620 −0.80 2.616 −0.95 interphase interference on MOA charged test. Ningxia
5 3.132 3.112 −0.64 3.159 0.86 Engineering Technology. 03:249∼251.
6 3.168 3.148 −0.63 3.184 0.51 Khodsuz, M. & Mirzaie, M. 2015. Condition Assessment
7 1.215 1.236 1.73 1.21 −0.41 of Metal Oxide Surge Arrester Based on Multi-Layer
SVM Classifier. Iranian Journal of Electrical & Elec-
8 1.748 1.769 1.20 1.671 −4.41
tronic Engineering. 11(4):354∼362.
Khodsuz, M. & Mirzaie, M. 2015. Monitoring and iden-
Table 4. Comparison of modeling performance for tification of metal oxide surge arrester conditions
different models. using multi-layer support vector machine. Iet Genera-
tion Transmission & Distribution. 9(16):2501∼2508.
SVR BPNN Khodsuz, M. & Mirzaie, M.2015. Evaluation of ultravio-
let ageing, pollution and varistor degradation effects on
MSE 0.000426 0.00133 harmonic contents of surge arrester leakage current.
R2 0.999944 0.99808 Iet Science Measurement Technology. 9(8):979∼986.
Lira, G.R.S., Costa, E.G. & Almeida, C.W.D. 2010. Self-
organizing maps applied to monitoring and diagnosis
ing set for comparison. The BP network is a single- of ZnO surge arresters. Transmission and Distribution
hidden layer network, of which the node number Conference and Exposition: Latin America. 659–664.
of the input layer, hidden layer and output layer are Lira, G.R.S., Costa, E.G. & Ferreira, T.V. 2014. Metal-
2, 3, 1 respectively, and for which tansig function oxide surge arrester monitoring and diagnosis by self-
organizing maps. Electric Power Systems Research,
is adopted as the transfer function of the hidden 108(3), 315∼321.
layer, and Levenberg-Marquardt algorithm as the Mokhtari, K., Mirzaie, M. & Shahabi, M. 2014. Evaluation
training function, the learning rate is 0.1, and of polymer housed metal oxide surge arrester's condition
the target error is 10−4. The comparison between the in humid ambient conditions. Synthetic Communica-
measured value and the predictive value of IR3 of the tions an International Journal for Rapid Communica-
two models are as shown in Table 3, and the compari- tion of Synthetic Organic Chemistry. 21(1):31∼42.
son of MSE and squared correlation coefficient is as Shao, T. Zhou, W.J., Yan, H.G. et al. 2004. Influence of
shown in Table 4. According to the comparisons, SVR voltage harmonics on leakage and its resistive compo-
algorithm is more accurate when used for modeling nent of MOA. Power System Technology, 28(8): 55∼59.
Wang, X.B. 2015. Fault diagnosis and example analysis
the leakage current characteristics of surge arrester, of MOA based on charged test technique. Insulators
and has a stronger extensive ability comparatively. and Surge Arresters. 03:69∼73.
Wooi, C.L., Abdul-Malek, Z. & Mashak, S.V. 2013.
Effect of Ambient Temperature on Leakage Current
4 CONCLUSION of Gapless MOA. Jurnal Teknologi. 64(4):157∼161.
Zhang, P., Wang, L.M. & Zhao, X.Y. 2013. Metal oxide
In the SVR-based surge arrester fault diagno- arrester fault diagnosis based on back-propagation
sis method put forward herein, the influence of neural network. Shanxi Electric Power.04:22∼25.
366
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: This paper proposed a new type of wave piercing buoy with a heave plate on the base of
a traditional columnar buoy. The mathematical model of the buoy is established by using the frequency
domain analysis method and the numerical simulation is carried out in order to analyse the effect of the
heave plate on the added mass and the RAO response on the heave direction of the buoy, thus providing
more choices for improving the buoy’s performance.
Keywords: Wave piercing buoy; Heave plate; Heave; Added mass; RAO
367
ent period of the buoy according to the equation hydrodynamic performance of the buoy is studied
above, increasing the draft or the additional mass through changes to the diameter of the heave plate.
of it. However, increasing the draft will increase Four groups of heave plates with the same thick-
the quality and size of buoy, leading to an increase ness and a larger diameter were selected for com-
in construction costs and difficulties in transport parison and analysis. The parameters of the heave
and installation. Reference design of Spar plat- plates are shown in Table 1.
form, the heave plate which installed at the bottom
of the buoy is proposed (Sang et al., 2015). The
heave plate is a circular plate coaxial with the buoy, 3 HYDRODYNAMIC ANALYSIS
whose diameter is greater than the buoy’s diameter.
The installation of the heave plate is more eco- The added mass and RAO response curves of the
nomical and practical than that of adding the buoy buoy in the heave direction are obtained by math-
draft. The structure of the wave piercing buoy with ematical modelling and numerical simulation using
heave plate is shown in Figure 1. the frequency domain analysis method. The influ-
According to the RANS Equation, the influ- ence of the heave plate on the buoy’s added mass
ence of the heave plate on the hydrodynamic and heave direction motion performance was stud-
performance of the buoy mainly depends on the ied by comparative analysis.
dimensionless parameter Kc (Keulegan-Carpenter
Number) and β:
3.1 Analysis of the added mass
2π a The results of the hydrodynamic analysis of the
Kc = (3) buoy with heave plates of different diameters are
D
shown in Figure 3 and Figure 6, and the results
D2 f
β= (4) are compared with the buoy without the heave
ν plate, shown in Figure 2. It is found that the heave
plate can effectively improve the added mass of the
where D = diameter of circular heave plate, buoy in the heave direction, and the value of the
a = amplitude, f = frequency, v = Viscosity coef-
ficient of fluid motion (Zhou et al., 2015). In
this paper, the influence of the heave plate on the
3.0 20 128.3
4.0 20 232.2
5.0 20 367.8
6.0 20 529.1
Figure 3. Added mass of buoy with 3 m heave plate.
368
Figure 4. Added mass of buoy with 4 m heave plate. Figure 7. Heave RAO of buoy with different diameters
of heave plate.
369
be generated. In the main energy frequency of the REFERENCES
wave the fluctuation of added mass is relatively
obvious and the minimum value appears. This Sang Song, Yi Shuyu, Shi Xiao, Tian Yi & Liu Wei,
minimum value of the buoy with the heave plate is (2015). Study on motion performance effect of semi-
obviously larger than that without the heave plate. submersible platform derives from heave plates struc-
Therefore, the scheme with different diameters of tures. China Offshore Platform, 30(5).
Wang, B., Li, M., Liu, S.X., Chen, S.Z., Zhu, Q., & Wang,
heave plates can improve the heave response of H.G. (2014). Current status and trend of ocean data
the buoy, reduce the amplitude of heave RAO, buoy observation technology applications. Chinese
improve the performance and survival ability of Journal of Scientific Instrument.
the buoy, and meet the needs of navigation and Wang, J., Wang, Z., Wang, Y., Liu, S., & Li, Y. (2016).
marine monitoring. Current situation and trend of marine data buoy and
monitoring network technology of China. Acta Ocea-
nologica Sinica.
ACKNOWLEDGEMENTS Wei, Y., Yang, J., & Chen, X. (2010). A review of the
hydrodynamic performance of heave damping plates
on Spar platform. China Offshore Platform, 25(6).
This work was supported by the Fundamen- Zhou Guolong, Ye Zhou, Cheng & XinLi Chun, (2015).
tal Research Funds for the Central Universities Influence of heave plate on hydrodynamic character-
and Natural Science Foundation of Liaoning istics of traditional spar platform. Journal of Water
Province. Resources & Water Engineering, 26(4).
370
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: At present, the height of a baby is detected manually by a nurse. In order to realise rapid
non-destructive testing for the detection of a baby’s height and weight, a module was established to detect
the height of baby based on machine vision in a smart baby weighing system. This paper proposed a fast
detection method for finding a baby’s height using the GrabCut segmentation algorithm, based on the
image captured by a monocular camera in a smart baby weighing system. First, a baby was marked by
preprocessing and a body detector. Second, by accurately extracting the feature points of the top of the
head and the feet, the real height of the baby is calculated accurately using the theory of the GrabCut
segmentation algorithm. The test results proved that the method has obtained the precision of the manual
method at present and been adaptive to the angle of camera and baby moving posture. The simple and
efficient structure of the detecting system ensures its application.
Keywords: Height Detection; Smart Baby Weighing System; Monocular Machine Vision; Image Processing
371
the common image segmentation methods are The basic structure of the monocular
an edge-based approach and a region-based machine vision system, as shown in Figure 1,
approach (Hui & Xiujie, 2005), and the best per- is composed of a camera and a computer. The
forming one is the region-based approach. camera faces to one of the planar surfaces of
This paper established a module using a region- a detected object and takes a picture, then the
based algorithm named GrabCut (Rother et al., image is transferred to the computer where it
2004) to detect the height of a baby in a smart is analysed and calculated to get the desired
baby weighing system, which is based on monocu- information. Because a point in a plane of
lar machine vision technology. The system takes a the detected object and its projection point in
picture of a baby and obtains the precise size of image plane is one to one mapping illustrated
the brick by using an image processing technique. in Figure 1, the principles it is based on are the
It can improve the efficiency and stability of the body detecting and segmentation algorithm
detection greatly, which can bring the manufactur- in the picture. Therefore, we apply the body
ers profit and improve the competitiveness of their detecting and image segmentation technologies,
products. take the smart baby weighing system, and inte-
The principles and structure of the height grate with the Internet network technology, for
detecting system are introduced in the second sec- the purpose of getting a higher measurement
tion, and the two key algorithms of body detect- efficiency.
ing and GrabCut segmentation are presented in
Sections III and IV separately. The experimental
results of the detecting system are given in Sec- 3 HOG BODY DETECTION ALGORITHM
tion V. At the end, the conclusion is given in Sec-
tion VI. As mentioned above, Histograms of Oriented
Gradients (HOG) is one of the key methods
for detecting the body of a baby in the sys-
2 STRUCTURE AND PRINCIPLE OF tem. During video processing, HOG has been
HEIGHT DETECTING SYSTEM widely applied in detecting pedestrian. HOG
features proposed by Dalal and Triggs (Dalal &
In this paper, the height detecting system proposed Triggs, 2005) are adopted for our application.
is a monocular machine vision system, whose To detect the area of the baby’s body, we firstly
structure belongs to the simplest of the machine calculate the gradient orientations of the pixels
vision systems. Since the length and weight of in the cells of the image. Then in each cell, we
babies to be detected are scalar parameters, the calculate a 9-dimensional histogram of gradi-
monocular machine vision system is the most ent orientation of the features. Each block is
appropriate to be adopted. Not only is its structure represented by a 36-dimensional feature vector,
simple but also its mathematical model, calculation which is normalised by dividing each feature
method and calibration process are simple and eas- bin with the vector module, named HOG fea-
ily implemented. Therefore, it is easy to ensure the ture vector.
reliability of the system. After HOG feature representation, baby detec-
tion is formulated as a linear classification problem
in a high-dimensional feature space. We detect the
body of the baby using a linear SVM with Gauss-
ian kernel SVM to increase performance. This
approach ensures a lower empirical risk than other
classifiers. The samples of detecting results are
shown in Figure 2.
Figure 1. The flowchart of baby height detection by Figure 2. The samples of body detecting results (red
machine vision. rectangles).
372
4 GRABCUT SEGMENTATION converge at least to a local minimum of E and to
ALGORITHM terminate iteration automatically. Then, an alpha-
map for the strip without generating artefacts is
The GrabCut algorithm is an image segmenta- estimated and recovered from the foreground col-
tion algorithm that gives an effective extraction of our. After the border and foreground estimation,
foreground objects from a complex background in illustrated in Figure 3, the heights of the babies
interactive for dividing a high accuracy and effi- are the maximum value of white pixels in the black
ciency. The GrabCut has made two enhancements and white image.
to the graph cuts mechanism: iterative estimation
and incomplete labelling, which together allow a
considerably reduced degree of user interaction for 5 EXPERIMENTAL RESULTS
a given quality of result. This allows GrabCut to
simply detect a rectangle around the desired object. In order to verify the accuracy of this automatic
Then a new mechanism for alpha computation has measurement algorithm, the comparison experi-
been developed for border matting, whereby alpha ments are made in pictures from maternity hos-
values are regularised to reduce visible artefacts. pitals. They are carried out on the client of the
As it is impractical to construct adequate col- developed system prototype. We ran the experi-
our space histograms, we follow a practice that ments on a Pentium(R) E700@3.2GHz CPU unit,
is already used for soft segmentation and use dual CPU core, 2GB memory drive with 64-bit
GMMs. Each GMM, one for the background windows file system in Microsoft Windows. Vari-
and one for the foreground, is taken to be a full- ous results obtained by the automatic algorithm
covariance Gaussian mixture with K components. (shown in Figure 4) are compared with manual
In order to deal with the GMM, the additional and automatic measurement results, respectively.
vector kn { K } is introduced in the optimisa- The manual measurement results are obtained by
tion framework, assigning to each pixel a unique two different nurses, and each person repeats three
GMM component, one component from either times.
the background or the foreground model, accord- With regards to the automatic method, the coor-
ing as α n ∈{0,1}. An energy function E(α ,k,θ ,z) dinates of the rectangles are detected automatically
is defined so that its minimum should correspond in the images for GrabCut segmentation. This is
to a good segmentation depending on k as follows: because both the manual and automatic measure-
ment results of the height H are highly dependent
α̂ˆ =arg min (E( ,k, ,z)) = on the results of the ventral straight length. The
α
arg min ( ( ,k, ,z) ( ,z)) (1) percentage difference between the manual method
α and automatic method is calculated as follows:
Figure 3. The border estimation results. Figure 4. The foreground segmentation results.
373
But these cameras have not been used widely due
to their limited application fields.
6 CONCLUSION
374
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Lamb wave metal plate defect detection based on COMSOL and finite
element analysis
Peng Qin
Institute of Signal Capturing and Processing Technology, North University of China, Taiyuan, China
School of Computer Science and Control Engineering, North University of China, Taiyuan, China
ABSTRACT: With the rapid development of China’s economy, and with metal plates being widely used
in aerospace, the national defence industry, shipbuilding industry, high-speed railway and so on, the domes-
tic demand for metal plates is increasing. However, in sheet metal processing and production processes,
due to the influence of the environment, there will inevitably be a variety of different types of defects. As a
result, it is of great significance to choose a reliable method to carry out a large area detection of the metal
plate. The electromagnetic ultrasonic guided wave transducer, because of possessing the advantages of
both the Electromagnetic Ultrasonic Transducer (EMAT) and the ultrasonic guided wave, which is namely
non-contact, large detection area, high sensitivity, small attenuation, and long distance transmission, is
very suitable for non-destructive testing of large areas of sheet metal. However, its energy-change efficiency
is not high. In order to improve the non-destructive testing of the electromagnetic ultrasonic Lamb wave
transducer, this paper studies the optimisation method of the Lamb wave transducer in the detection of
metal plate, carries out simulation calculations of the Lamb wave transducer after optimisation, and applies
the optimised Lamb wave transducer in the detection of sheet metal defects. Simulation and experimental
results show that for the Lamb wave, in the face of defect mode conversion, as the defect depth increases,
the received echo signal amplitude increases, which characterises the defect echo size.
375
and the pulse echo method. The projection method different dimensions modelling; 6) preprocessors
is highly sensitive to defects, which can avoid the have powerful functions, able to simply lead in the
detection blind area. Based on the pulse echo CAD format of geometric modelling form and
method, it can accurately locate the position of they have powerful grid partition function; 7) it
the defect by using COMSOL finite element simu- has a powerful solver and post processor.
lation software to simulate the electromagnetic The steps of finite element analysis are as fol-
ultrasonic Lamb wave transducer applied in flaw lows: 1) to determine the problem and its solu-
detection of aluminium plate. Through the parti- tion domain; 2) to discrete solution domain; 3) to
cle displacement observation of the Lamb wave in determine the state variables and control method;
the defect position, it can analyse the Lamb wave 4) derived units; 5) assembly solution; 6) to solve
defect propagation form. the equations and explain the results.
2.1 Finite element simulation of EMAT based 2.2 Detection and analysis of Lamb wave EMAT
on COMSOL defect based on COMSOL
The basic starting point of the finite element anal- 2.2.1 Establishment of finite element model
ysis method is to simplify the complex problem, After completing the global definition parameter,
and then solve the problem. The solution domain the excitation current is substituted into COMSOL
is divided into several small regions, each of which Multipgysics. Choose the space dimensions, which
is called a finite element. Solve the approximation are divided into three-dimensional, two-dimensional
solution of each finite element, and then according axisymmetric and one dimension, two dimension, and
to the boundary conditions that the whole region zero dimension. The simulation in this paper selects the
needs to meet, solve the problem, which is also an two-dimensional modelling, and uses the physical field
approximate solution. In practical engineering, needed. The permanent magnet chooses the magnetic
there are many problems only having an approxi- field (mf) in the low frequency electromagnetic field,
mate solution, so it is possible to use the finite ele- and the preset solution chooses the stable one (Station-
ment analysis method to solve the problem (Huang ary); the alternating magnetic field also chooses the
et al., 2016). Its calculation accuracy is very high, magnetic field (mf) in the low frequency electromag-
and it can solve all kinds of problems in a complex netic field, and the preset solution chooses the tran-
condition. Therefore, finite element analysis has sient (Time Dependent); the transient pipe chooses
been widely used in the fields of electromagnetic solid mechanics (solid) in structural mechanics, and
field, fluid mechanics, heat conduction and so on. the preset solution chooses the transient to carry out
COMSOL Multiphasic is a multiple-physical field the modelling calculation (Zhang et al., 2015). Carry
coupling analysis software, as shown in Figure 1. out the two-dimensional model simulation of the elec-
The main features of COMSOL Multiphasic tromagnetic ultrasonic Lamb wave, the basic model is
software are: 1) it can choose a variety of lan- composed of a permanent magnet, coil winding, alu-
guages on the interface and automatically establish minium plate and air layer, as shown in Figure 2.
coupling physical field; 2) users can automatically The establishment model process is to establish
construct the model that they themselves use; 3) bodies in different shapes by direct definition of
it can be seamlessly connected with MATLAB, size. It refers to make use of COMSOL Modelling—
strong two times development function; 4) it can Variables (defined parameters)—Geometry—
interactively model and simulate the external real Surface to define the size of different shapes and struc-
environment, and there are a large number of pre- tures. In addition, adopt Boolean operations, such as
set physical application modes and PDE applica- difference sets and set operations to complete the
tion modes (Nagy et al., 2014); 5) it can carry out establishment of the pipe model containing defects.
In the Figure 2 model, the permanent magnet is
perpendicular to the surface of the aluminium
plate, the material for the Nd-Fe-B permanent mag-
Figure 1. Multi-physics coupling of COMSOL Figure 2. The electromagnetic ultrasonic Lamb wave
Multiphasic. model.
376
net alloy; the excitation coil with zigzag coil. In order 2.2.3 Simulation results of EMAT analysis
to ensure the simulation results are more accurate, of Lamb wave
add an air field in the external, used to describe the After solution calculation, it can obtain the Lamb
dissipation of the electromagnetic field in a dissipa- wave particle displacement nephogram and ana-
tive far-field region. The basic structure of the elec- lyse the case and communication form of the
tromagnetic ultrasonic Lamb wave transducer uses Lamb wave in the defect. The Lorenz force is acted
a uni-polar permanent magnet, return type coil and to the aluminium plate to carry out structure anal-
the aluminium plate. The material properties are as ysis, and then obtain the aluminium plate X direc-
follows: the relative permeability of the coil is μr = 1, tion particle displacement nephogram, as shown in
the resistivity is ρ = 1 × 10−7Ω m; the aluminium resis- Figure 4.
tivity is ρ = 4.032 × 10−6Ω m. The Poisson’s ratio is Figure 4 and Figure 5 show the maximum dis-
0.33, Young’s modulus E = 6.9 × 1010 Pa, density placement of the particle in the area that the
ρ = 2750 kg/m3; relative permeability of air is μr = 1; EMAT coil is located in. By comparing the particle
permanent magnet: coercive force Hc = 895000. displacement in the X and Y direction at the same
moment, it can be seen that the motion amplitude
2.2.2 Grid division of the particle on the X axis is far greater than the
Before the solution of the finite element, the mate- displacement amplitude on the Y axis. The particle
rial parameters of the model are assigned to each is mainly propagated along the X axis, which indi-
model to define the material properties and carry cates that the whole wave is propagated along the
out the mesh generation. The static bias magnetic X axis (Masserey et al., 2014). The wave is propa-
field is applied in the direction of Y, and Br = −B0; gated along the X axis, and the closer it gets to the
in the 1, 3, 5 and 7 coils, the current I is applied, and positive and negative direction of the X axis, the
in the 2, 4, 6 and 8 coils, the current −I is applied; do smaller the displacement. The overall particle shape
not apply a low reflection boundary condition on of displacement is also the propagation shape of the
both ends of the aluminium plate; the mesh parti- wave in the internal of the plate. The total displace-
tion is divided into free mesh partition (free triangle ment nephogram of the aluminium plate particle is
mesh subdivision and free quadrilateral) and map- shown in Figure 6.
ping mesh partition. Mesh partition can improve In the figure, with the increase of time, the
the simulation accuracy and calculation accuracy. In Lamb wave gradually spreads to the defect posi-
particular, the irregular shape model should be car- tion. When the time is 12 μs, the particle displace-
ried out with refined mesh partition. The free mesh ment of the left wave of the defect is larger than
partition makes use of the COMSOL smart size to that in the other positions. When the time is 10 μs,
automatically control the scale and mesh density the particle displacement of the left wave of the
of the mesh partition; the mapping mesh partition defect is smaller than that in the other positions.
is the regular division of the regular model. There It can be obtained that, when the wave meets the
are both advantages and disadvantages for the two defect, the waveform is converted, and the new
methods, the free mesh partition and the mapping mode is generated, thus the particle displacement
mesh partition (Huang et al., 2014). The method of the wave increases (Zhang et al., 2016). The par-
for the mesh partition is supposed to be selected ticle displacement in the left of the defect is larger
according to the shape and boundary conditions of than that in the right side. In consequence, it can be
the model established. The aluminium plate selects obtained that, when the wave encounters defects,
the manual mesh partition, and uses the customised most of the waves will be reflected, and only a few
unit size (both the largest and the smallest element waves will continue to move forward.
size select 1 mm) to divide the aluminium plate con-
taining defects into five layers, making the results
for analysing specific areas (such as defects) more
accurate after the solution. The permanent magnet,
the coil and the air field are divided by using a smart
grid, and the shape of the unit is a free split triangle.
The mesh of the crack defect is shown in Figure 3.
Figure 4. Displacement contours of different particle.
377
Figure 7. Electromagnetic ultrasonic Lamb wave sys-
Figure 6. Displacement contours of different particles. tem block diagram.
378
Table 2. The defect parameters and distribution in steel
plate.
1 30 mm 3 mm
2 30 mm 2.5 mm
3 30 mm 2 mm
1 30 mm 2 mm
2 30 mm 1.5 mm
3 30 mm 1 mm
379
In the experiment, the system adopts manual of the received echo signal will also increase, and
winded sending and receiving integrated loop back the amplitude of the echo signal characterises the
coil, and the coil spacing is 3 mm. The probe is scale of the defects.
integrated, and the distance to the probe is 18 cm.
The crack parameters are shown in Table 2.
At this time, the frequency of the excitation REFERENCES
coil is 0.5 MHz, and the echo signal is obtained as
shown in Figure 10. Burrows, S.E., Dutton, B., & Dixon, S. (2012). Laser gen-
In Figure 10, when the Lamb wave encounters eration of Lamb waves for defect detection: Experi-
defects, waveform conversion will occur, and gen- mental methods and finite element modeling. IEEE
erate four kinds of modes of the Lamb waves. As transactions on ultrasonic, ferroelectrics, and frequency
control, 59(1), 82–89.
the defect depth increases, the amplitude of the Huang, S., Wei, Z., Zhao, W., & Wang, S. (2014). A new
mode increases. The experimental results verify Omni-directional EMAT for ultrasonic Lamb wave
the correctness of the Lamb wave detection of tomography imaging of metallic plate defects, Sen-
defects. sors, 14(2), 3458–3476.
Huang, S., Zhang, Y., Wang, S., & Zhao, W. (2016).
Multi-mode electromagnetic ultrasonic Lamb wave
4 CONCLUSION tomography imaging for variable-depth defects in
metal plates. Sensors, 16(5), 628.
In this paper, the application of electromagnetic Imano, K., & Endo, (2013). T. Experimental study on the
mode conversion of Lamb wave using a metal plate
ultrasonic guided wave in metal plate is studied having a notch type defect. International Journal of
by numerical calculation, simulation and experi- the Society of Materials Engineering for Resources,
mental verification. Through the COMSOL finite 19(1_2), 20–23.
element simulation software and experiment, the Masserey, B., Raemy, C., & Fromme, P. (2014). High-
propagation characteristics and detection abil- frequency guided ultrasonic waves for hidden defect
ity of the Lamb wave are analysed. The research detection in multi-layered aircraft structures. Ultra-
results of this paper are as follows: (1) the com- sonic, 54(7), 1720–1728.
bination mode of the unipolar permanent magnet Nagy, P.B., Simonetti, F., & Instanes, G. (2014). Corro-
and return type coil whose spacing is 3 mm can sion and erosion monitoring in plates and pipes using
constant group velocity Lamb wave inspection, Ultra-
excite the Lamb wave in sheet metal. By adjusting sonic, 54(7), 1832–1841.
the matching circuit capacitance and inductance Zhang, J., Ma, H., Yan, W., & Li, Z. (2016). Defect detec-
value, the output power reaches the maximum tion and location in switch rails by acoustic emission
value, and the signal-to-noise ratio is the highest, and Lamb wave analysis: A feasibility study. Applied
realising the optimisation of the echo signal. (2) Acoustics, 105, 67–74.
Simulation and experiment results show that the Zhang, Y., Wang, S., Huang, S., & Zhao, W. (2015).
Lamb wave mode will be converted when defects Mode recognition of Lamb wave detecting signals
occur, and a new Lamb wave mode will be gener- in metal plate using the Hilbert-Huang transform
ated. The depth of defects increase, the amplitude method. Journal of Sensor Technology, 5(1), 7–14.
380
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Lei Zhao
School of Mechanical Engineering, Shandong University, Jinan, China
ABSTRACT: This paper presents a novel optimisation algorithm for lane detection and fitting. We
use the Artificial Fish Swarm Algorithm (AFSA) which is based on a parabolic lane boundary model
to solve our boundary detection problem. Initially, the RGB road image is transformed into intensity
images. We then use the Finite Impulse Responses (FIR) filter to eliminate noise. Next, the Otsu’s method
is used to convert the intensity images into binary images. Thirdly, an objective function is constituted
with gradient character and grey level of the binary images, coming along with the road boundaries are
fitted by parabola model. The major point of the AFSA is to optimise the parameters of the quadratic
parabola based on the objective function, and setting a frame’s parameters’ values as the initial value of
the next frame, which is equivalent to the tracking method. Experimental results of the real-time image
sequences show that the method presented in this paper is capable of robustly and accurately detecting the
road boundaries on highways roads. The accuracy of the algorithm has reached a high level. The mean
processing speed of each image is 37 ms.
381
a research hotspot, but it has the demerits of high does not have the disadvantages that the existing
cost. methods have.
The third type are the model-based lane detec- The whole process can be summarised as fol-
tion methods which start with the hypothesis of lows. In the first place, we pre-process the sequen-
a road model. Models used the literature include: tial image; the RGB road images are transformed
A global linear model which is proposed to iden- into intensity images, coming along with Finite
tify road boundaries (Xu, 2004), B-Snake model Impulse Response (FIR) filter to eliminate noise.
which is used for lane detection and tracking Secondly, the Otsu’s method is used to convert
(Wang, 2004), a hyperbola-pair model which is intensity images to binary images. Finally, based
used for real-time lane detection (Q. Chen and on the information in the binary images, an
H. Wang, 2006; O. O. Khalifa, 2010), a linear- AFSA’s objective function is constituted with a
parabolic model which is used for lane detection gradient character and grey level. After the con-
and lane departure (C. R. Jung and C. R. Kelber, stitution of the objective function, AFSA is used
2005), and the Catmull-rom spline model which is to optimise the parameters of the quadratic para-
proposed to detect lane boundaries (Wang, 1998). bolic model based on the objective function, fol-
Compared with the above-mentioned two kinds of lowed by a setting of frame parameters’ values as
methods, the model-based lane detection methods the initial values of the next frame, which is the
have a huge number of merits. Uniquely, they are same as the tracking method. The contribution of
more comprehensive since only a few parameters this paper is that the FIR filter and the AFSA are
are needed to model the lane edges. In addition, creatively used, which are not found in the refer-
the model-based lane detection methods are more ence literatures. Figure 1 shows the complete pro-
robust against outside environmental influences cess flowchart of a frame.
(lighting changes, shadows, water areas and so on). The rest of this paper is organised as follows.
Taking the many advantages into account, we Section 2 gives a detailed description of the para-
adopt the model-based lane detection method. bolic model. Section 3 presents the image pre-
Note that model selection is vital. If the model processing including filtering and thresholding.
selected is not appropriate, lane detection becomes Section 4 shows the lane detection based on the
invalid. A linear (straight) model which is fast is AFSA algorithm. Section 5 presents the experi-
often fitted by the means of a Hough transform, ments and analysis. Finally, a conclusion is given
however this method constitutes relatively simplis- in section 6.
tic structures which are weak at curve recognition.
Splines (Wang, 2004; Wang, 1998; Zhao, 2012) can
process more complex lane marking shapes, but 2 ROAD MODEL
they require large computational resources result-
ing in too much time being consumed. Hyperbolic This paper uses a quadratic parabolic model which
models (Chen and Wang, 2006; Khalifa, 2010) have can integrate both linear and curved shapes to fit
a strong anti-noise capability, however there is a lane edges. Formula is expressed as follows:
curve fitting large fluctuation shortcoming when
the road encounters more noise. Different models x = ay 2 + by + c (1)
have been studied for the purpose of determining
a trade-off between complexity and accuracy. The We defined the upper left point of the image as
parabolic model (A. Linarth and E. Angelopoulou, the origin of coordinates. A horizontal line through
2011) is treated as being medium between complex- the origin point is defined as the x-axis, and the
ity and accuracy. Combined with the subsequent perpendicular direction to the x-axis through the
AFSA novel optimisation approach, we chose origin point is defined as the y-axis. Factor ‘a’ rep-
the parabolic model to achieve lane detection and resents a lane curvature, factor ‘b’ represents the
fitting. The processing of detecting lanes is then slope of the lane boundary at the bottom of the
equal to the processing of calculating those model image, factor ‘c’ represents the intersection point
parameters. Most noteworthy is the fact that the of the lane boundary and the x-axis. It is worth
technique is much more robust against noise, and mentioning that all three factors ‘a’, ‘b’, and ‘c’
382
can be calculated from the shape of the lane on the
ground based on the AFSA algorithm.
It should be pointed out that the plus or minus
of factor ‘a’ represents lane trends. If a > 0, roads
turn right, in contrast, if a < 0, roads turn left. In
the following sections, we will calculate the param-
eters of left and right lanes respectively using the
AFSA algorithm.
3 IMAGE PROCESSING
The input vision sequences are RGB images in our Figure 3. Thresholding result.
processing procedure. The first step is to convert
the RGB images to intensity images. During the σ ω2 (t ) ω1 ( ) σ 12 ( ) + ω 2 ( ) σ 22 ( ) (2)
process of converting the image from RGB to grey-
scale, that is to say, specific weights to channels R,
Parameter t is the threshold separating the two
G, and B ought to be applied. These weights are:
classes, ω i (t ) denotes the probabilities of the two
0.2989, 0.5870, and 0.1140.
classes separated by the threshold t, σ i2 (t ) denotes
the variances of the two classes.
3.1 Filtering Otsu’s method works better compared to other
thresholding methods, as the results of threshold-
Since it would affect subsequent processing if noise
ing a binary image are shown in Figure 3.
appeared in intensity images, noise removal is very
important. As our select, the transformed inten-
sity images are then filtered by a two dimensional
4 LANE DETECTION
Finite Impulse Response (FIR) filter. The FIR fil-
ter consumes much less time than the median filter
4.1 Determining the objective function
which is commonly used in many studies. The most
important thing is that the FIR filtering resulting The AFSA’s objective function is used to evaluate
image is much better than the median filter. The the accuracy of lane detection fitted by a quadratic
result of FIR filtering is shown in Figure 2. parabolic model. So it plays a key role throughout
the lane detection. All sequences tested in this
paper were captured with a resolution of 240 × 320
3.2 Thresholding
pixels. Since the lane boundaries are mainly con-
Thresholding is critical, because it allows the centrated on the lower half of the images, we only
images to be recognised more efficiently. We detect the 150 pixels below so that the real-time
use the adaptive Otsu’s method to alter intensity performance is improved, as shown in Figure 4.
images into binary images. The adaptive Otsu’s According to the basic requirements of road
method determines the threshold by splitting the construction, a lane marking line’s width is gener-
histogram of the input image to minimise the ally 0.15 metres which is approximately 5 pixels in
variance for each of the pixel groups. Equation (2) the image. In order to accurately reflect the statisti-
gives the main idea of the adaptive Otsu’s method cal characteristics of the binary images, we set 5 × 5
(Y. Zhang and L. Wu, 2011). pixel blocks as the minimum statistical units. When
detecting the left or right lane parabolic equations,
we sequentially take out N points downward as the
centre of pixel blocks starting from the 90th binary
image row in accordance with the principle of the
same y coordinate intervals (5 pixels). The whole
pixel blocks’ centre points thus fulfil the parabola.
If the x coordinates of any points were not within
the scope of [3,318], it indicated that the blocks were
not on the binary images and should be removed.
Finally, the valid blocks number is N (N≤30). The
left and right lane blocks are shown in Figure 5.
According to Figure 5, the valid blocks have a
high gradient character and grey level, therefore,
Figure 2. FIR filtering result. the objective function is determined by considering
383
where H is the mean grey of an image, h ( x y ) is
the grey value at coordinates ( x y ) .
Considering the fact that the lane boundary
at the bottom of the images is much clearer and
the lane boundary becomes blurred higher up,
we set different weighting coefficients for each
H k depending on the position of the blocks. The
weighting coefficients formula is as follows:
k
ρk = 1 − (5)
2N
∑ h (x + m
m , n= −2
y + n)
4.3 Artificial Fish Swarm Algorithm (AFSA)
Hk = (3)
4 × 4 × 255 AFSA, which was first proposed in 2002 (X.-l. Li,
2002), is one of the optimisation methods among
where H k is the average grey value of the kth the Swarm Intelligence (SI) algorithms. This algo-
block; h ( x + m y + n ) is the grey value at coordi-
nates ( x + m y + n ) .
The mean grey of an image is calculated by the Table 1. Region of Interest (ROI) of a, b, c.
following Equation (4). Parameters Left Right
240 320
a (−0.005, 0.005) (−0.005, 0.005)
∑ ∑ h(
y 90 x = 0
) b (0.3, 2.3) (−2.3, −0.3)
H= (4) c (−100, 150) (200, 450)
150 × 320 × 255
384
rithm is inspired by the collective movement and Depending on the object-oriented analyti-
various social behaviours of fish which result in an cal method, we define AFs encapsulated with
intelligent social behaviour. The basic idea of AFSA two parts: variables and functions. The variables
is to imitate the fish’s behaviour including preying, include: N is the number of AFs, X represents the
swarming, following and moving with local search current position of AF, Visual is the visual dis-
of fish individual, matter of course, reaching the tance, Step represents the moving step length, Try_
global optimum (X.-L. Li, 2003). AFSA has many number represents the try number, iterate _ times
merits including high convergence speed, high accu- is the maximum number of iterations. δ (0 < δ < 1)
racy, flexibility, autonomous and fault tolerance. is the crowding factor, dij | X i − X j | represents
Artificial Fish (AF) is a fictitious entity of true the distance between two AFs i and j. The func-
fish, which is used to seek out the blocks. With the tions include: the objective function Y F (a b c )
help of the object-oriented analytical method, we which represents the food concentration in the cur-
can regard the AF as an entity encapsulated with rent position; the behaviours of AF contain prey-
one’s own data and a series of behaviours, which ing, swarming, following, moving and evaluating.
can accept stimulating information from the envi-
1. Preying behaviour: This is a basic biological
ronment by sense organs. The environment where
behaviour of tending to the food; generally, a
the AF lives is the solution space and the states of
fish perceives the food concentration in water
other AFs. Its next behaviour relies on the current
to determine the movement by vision or sense
state and environmental state itself; meanwhile, it
shown in Figure 8.
influences the environment by virtue of its own
Behaviour description: as displayed in Equa-
activities and other companions’ activities.
tions (9) and (10), let Xi be an AF current state
AF realises external environment by its vision
and select a state Xj randomly in its visual dis-
shown in Figure 6. X s the current state of an
tance, the objective function Y is the food
AF, Visual is the visual distance, Step is the mov-
concentration.
ing step length, Xv is the visual position at some
moment, Xnext is the next position to be reached, Xi
Xj X i + Visual ⋅ Rand () (9)
is another AFs. If the state at the visual position is
better than the current state, X goes forward a Step
in this direction, and arrives at Xnext; otherwise, X If Y j Yi , it goes forward a step in this direc-
continues an inspection tour within its vision. The tion as displayed in Equation (9).
processing can be expressed as follows:
Xj X it
Xi 1
X it + ⋅ Step ⋅ Rand () (10)
X v = X + Visual ⋅ Rand () (7) || X j X it ||
Xv X
X next = X + ⋅ Step ⋅ Rand () (8) Otherwise, select a state Xj randomly again and
|| X v X || judge whether it satisfies the forward condition,
if it cannot satisfy the condition after Try_num-
where Rand() produces random numbers between ber times, it moves a step randomly as shown in
0 and 1. Equation (11).
Xi 1
X it + Visual ⋅ Rand () (11)
Figure 6. Vision concept of the artificial fish. Otherwise, execute the preying behaviour.
385
3. Following behaviour: In the swimming process,
the neighbourhood partners will trail and reach
the food quickly, when a single fish or several
ones find food.
Behaviour description: let Xi be an AF cur-
rent state, and it explores the companion Xj in
the neighbourhood ( ij ), which has
the greatest Y j .
If n cf > δYi , which means the companion
Y
Xj X it
Xi 1
X it + ⋅ Step ⋅ Rand () (13)
|| X j X it ||
Xi 1
X it + Visual ⋅ Rand () (14) Figure 7. Flowchart of lane detection based on AFSA.
iour that has been performed, and then retain closest to the true value of lane detection, and
the biggest one. After iterate _ times, the value the loop ends. Otherwise, step to step three.
on the bulletin board is the optimisation value The processing steps of each frame are the same
that is nearest to the true. And the best a, b, c as shown above. A flowchart of lane detection
is out. based on AFSA is shown as Figure 7.
386
problem. Prior to the adoption of AFSA, we
firstly preprocessed each frame of sequential
videos in order to get ideal binary images, which
involved setting the region of interest, removing
noise using anFIR filer and binarisation using the
Otsu’s method. Through the theoretical analysis
and experimental results, we can see the proposed
algorithm showed excellent lane detection in the
application to lane images on highway roads. The
experiments and analysis indicate the robustness
and real-time performance of our algorithm. As a
highlight of this paper, we used the ROI method
and ingeniously setting of objective function. And
the contribution of this paper is that the FIR filter
and AFSA are creatively used, which are not found
in the reference literatures.
REFERENCES
387
Ma B., S. Lakshmanan, and A. O. Hero, (2000). Simul- World Health Organization (2015). Global sta-
taneous detection of lane and pavement boundaries tus report on road safety 2015. Available from:
using model-based multisensor fusion. IEEE Trans- http://www.who.int/violence_injury_prevention/road_
actions on Intelligent Transportation Systems, 1(3), safety_status/2015/en/.
135–147. Xu Y., R. Wang, K. Li, and Y. Zhao (2004). A linear
Truong Q.-B. and B.-R. Lee (2008). New lane detection model based road identification algorithm. Journal of
algorithm for autonomous vehicles using computer Image and Graphics, 9(7), 859–864.
vision. IEEE International Conference on Control, Yu B. and A. K. Jain (1997). Lane boundary detection
Automation and Systems (ICCAS), 1208–1213. using a multiresolution hough transform. Proceedings
Turchetto R. and R. Manduchi (2003). Visual curb local- of the International Conference on Image Processing,
ization for autonomous navigation”. Proceedings of 748–751.
the IEEE/RSJ International Conference on Intelligent Zhang Y. and L. Wu (2011). Fast document image binari-
Robots and Systems (IROS), 1336–1342. zation based on an improved adaptive Otsu’s method
Wang Y., D. Shen, and E. K. Teoh. (1998). Lane detec- and destination word accumulation. Journal of Com-
tion using catmull-rom spline. IEEE International putational Information Systems, 7(6), 1886–1892.
Conference on Intelligent Vehicles, 51–57. Zhao K., M. Meuter, C. Nunn, D. Muller, S. Muller-Sch-
Wang Y., E. K. Teoh, and D. Shen (2004). Lane detection neiders, and J. Pauli. (2012). A novel multi-lane detec-
and tracking using B-Snake. Image and Vision Com- tion and tracking system. IEEE Intelligent Vehicles
puting, 22(4), 269–280. Symposium (IV), 1084–1089.
388
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Jinhui Lan
School of Automation and Electrical Engineering, University of Science and Technology Beijing, Beijing, China
ABSTRACT: This study proposes a vehicle guidance data-based method for supplementing incomplete
data of traffic flow in hazy conditions. An urban traffic monitoring system was used to determine the
completeness of traffic flow data. The incomplete traffic flow data were classified according to road
network location. A GPS was used to identify vehicle position and obtain guidance data. The guidance
data were to be used in supplementing the incomplete traffic flow data. The useful vehicle guidance data
were retained. A statistical vehicle guidance data method was established to generate traffic flow data
under hazy conditions. The traffic flow data were obtained and entered into the urban traffic monitoring
system and GPS. Then, we established an index for supplementing incomplete data of traffic flow under
hazy conditions. According to the simulation result, the proposed method based on vehicle guidance data
can supplement and enrich incomplete data of traffic flow in hazy conditions.
Keywords: Traffic Engineering; Vehicle Guidance; Haze; Supplementary Incomplete Data; GPS; Urban
Traffic Monitoring System
389
to guidance data; S6. Determine vehicle guid- Step S4 comprises the following:
ance data to supplement missing road network
S4-1. The missing status of the traffic flow data
data; S7. Retain useful vehicle guidance data; S8.
is classified as follows according to the road
Establish appropriate statistical vehicle guidance
network location of the missing road network
data method for supplementing traffic flow data;
traffic flow data. According to the missing
S9. Supplementary traffic flow data. S10. Traf-
characteristics of traffic flow data under hazy
fic flow data output. In these steps, traffic flow
conditions and hazy status, the road network
data include road network traffic flow, speed, and
location of missing traffic flow data is deter-
length fleet. Guidance data include vehicle speed
mined if it is continuous. The lane unit and
and traffic flow.
intersection unit have discontinuous missing
traffic flow data called missing breakpoints.
Within the same lane or the same intersection,
2 SPECIFIC STEPS the multiple lane unit and multiple intersection
unit have continuous missing traffic flow data
Step S1 comprises the following: called continuous missing points. The lanes
and intersection have continuous missing traf-
S1-1. Mark the location of the road network.
fic flow data called locally missing points.
Label the intersections and lanes. Suppose
S4-2. According to the classification result of
that three intersections i, j, and k exist. Sec-
step S4-1, missing traffic data are combined
tions ij represent the direction of the road
into one collection: the missing traffic flow
from intersection i to intersection j. When a
data collection with missing breakpoints
road connects intersection j to intersection
is recorded as D. The collection of traffic
k, sections ij include the lane through which
flow data with continuous missing points is
the intersections i and j connect to intersec-
recorded as X. The collection of traffic flow
tion k; we mark the lane as ij – k. On sections
data with locally missing data is recorded as J.
ij, the intersection part that is connected to
Collections D, X, and J are stored separately.
lane ij – k is marked as intersection ij – k′.
All lanes and intersections in accordance Step S5 comprises the following:
with per unit length are divided into several
S5-1. According to the GPS, determine vehi-
units and labelled accordingly. Each lane
cle location. According to the GPS, the
ij – k in accordance with per unit length is
respective lane unit or intersection unit
divided into several units in accordance with
owned by each vehicle is determined,
the vehicle travelling direction order marked
and vehicles in the road network are
as ij − k p, p 1 2 n. Each intersection
marked as c(iijj k p m ), m 1, 2, , n or
ij – k′ in accordance with per unit length is
c(iijj k ′ p h ), h , , , n in accordance
divided into several units in accordance with
with the travelling direction order.
the vehicle travelling in a reverse direction
S5-2. According to the GPS, obtain guid-
order marked as ij − k ′ q, q 1 2 n. If
ance data: according to the GPS, the
the length of the last unit of the lane and the
speed of each vehicle can be obtained
intersection is less than the per unit length,
with vc(ijj k p m ), m = 1, 2, , n and
then the last unit is marked as a cell.
vc(ijj k ′ p h ), h = 1, 2, , n, and vehi-
S1-2. Mark the related network traffic flow data
cle density data can be obtained with
of road network location: the traffic flow
ρc(iijj k p ) and ρc(iijj k ′ q ).
data of each lane unit ij – k – p are referred
to as ρ( j ), and the vehicle speed Step S7 comprises the following:
of each lane unit ij – k – p is referred to as
According to steps S4 and S6, the related vehi-
v(iijj k p ). The traffic flow data of each
cle guidance data of collections D, X, and J are
intersection unit ij – k′ – p are referred to
respectively stored in the corresponding guidance
as ρ( j ′ ), and the vehicle speed of
data collections D′, X′, and J′.
each lane unit ij – k′ – p is referred to as
Step S8 comprises the following:
v(iijj k ′ q ). The motorcade length of each
intersection ij – k′ is referred to as l (iij k ′ ). S8-1. Collections D′, X′, and J′ respectively corre-
S1-3. The urban traffic monitoring system deter- spond to collections D, X, and J.
mines whether the traffic flow data on the S8-2. For collection D through collection D′, a
road network location are complete. If vehicle guidance data statistics method to
complete, the data do not have to be sup- supplement traffic flow data is established.
plemented. If incomplete, the following steps A method is also established for missing lane
should be performed. unit data and missing intersection unit data.
390
A. For missing lane unit data: speed v(iijj k p, sT )visi under hazy conditions
a1. When the cycle time is long, collection D v(iijj k p, sT ).
related to the guidance data of this cycle is The corresponding vehicle speed v(iijj k p, sT )
used. of the lane unit ij − k p should be less than the
a1-1. When the road network position of the maximum driving speed and is related to the vehi-
guidance data in this cycle is the same as cle speed v(iijj k ( p 1) sT ) of the breakpoints
the road network position of the missing of the former unit ij − k ( p − ) in this cycle and
traffic flow data in collection D, we directly to the vehicle speed v(iijj k ( p + 1) sT ) of the
supplement collection D with the guidance breakpoints of the latter unit ij − k ( p + ) in this
data. Suppose that the corresponding traffic cycle.
flow data breakpoints of lane unit ij − k p
are missing. We directly take the guid- v(ijj k ( p − 1), sT )
v(iijj k p, sT ) mi {[v(ij
ance data vc(ijj k p m ), m = 1, 2, , n + v(ij
ij k ( p + 1) sT )] / ,v(ij k − p, sT )visi } (3)
and ρc(iijj k p ) as v(iijj k p ) and
ρ( j ). The minimum traffic flow values ρ( j )visi
a1-2. When the road network position of guidance under hazy conditions are related to driver lane
data in this cycle is different from the road visibility d (iij k p ) .
network position of missing traffic flow data
in collection D, we obtain the traffic flow 1
ρ( j )visi = (4)
data breakpoints of the unit according to d(( j p ) lv
the traffic flow data before and after the unit
breakpoints in this cycle and haze visibility. The lane unit ij − k p corresponding to
The result is supplemented to collection D. ρ( j ) should be higher than the minimum
The specific methods are as follows: vehicle flow value and is related to the vehicle flow
Suppose that the corresponding traffic flow data ρ( j k ( p − 1), sT ) of the breakpoints of the
breakpoints of lane unit − k p are missing and former unit ij − k ( p − ) in this cycle and to the
that the cycle is the s cycle. Haze visibility exerts an vehicle flow ρ( j k ( p + 1), sT ) of the break-
effect on drivers, thereby affecting vehicle speed. points of the latter unit ij − k ( p + ) in this cycle.
We determine the relationship between driver lane
visibility d (iij k p ) and the maximum driving ρ( T) {[ ρ(ij − k ( p ), )
speed limit v(iijj k p, sT )visi . + ρ( ) / ρ(ij k − p, sT )visi }
( + 1)) T )]
(5)
if d (iij k p, sT ) dijk0
v(iijj k p, sT )visi vllmax a2. When the cycle time is short, collection D is
else if dijk1 d (ij − k p, sT ) ≤ dijk0 related to the guidance data of this cycle and
d (ij
i k − p, sT ) [ allij 0 (vl (iij k − p, sT ))2 the former cycle.
+ allij1 ⋅ vl (iijj k p, sT ) allij 2 ] lv (1) a2-1. When the road network position of the
guidance data in this cycle is the same as
else if dijk2 d ((ij ijj k p, sT ) ≤ dijk1
the road network position of the missing
v(iij − k p, sT )visi = allij 3 ⋅ d iijj k − p sT T ) allij 4 traffic flow data in collection D, we directly
else if d (iij k − p, sT ) dijk2 supplement collection D with the guid-
v(iijj k p, sT )visi vlmin ance data. Suppose that the corresponding
traffic flow data breakpoints of lane unit
where vlmax = highest traffic speed limit of the lane; ij − k p are missing. We directly take the
vlmin = the lowest traffic speed limit of the lane; guidance data vc(ijj k p h ), h = 1, 2, , n
lv = the average length of the vehicle; alij0, alij1, alij2, and ρc(iijj k q ) as v(iijj k p ) and
alij3, alij4 are coefficients; and dijk0 dijk1, and dijk2 are ρ( j ).
the criterion values of dijk . a2-2. When the road network position of the guid-
We can obtain the ratio range of driver lane visi- ance data in the former cycle is the same as
bility d (iij k p ) and lane visibility d (iij k p )vis the road network position of the missing traf-
under hazy conditions. According to the measured fic flow data in collection D, we obtain the
range, we assume that the ratio is 1/10. traffic flow data value of the breakpoint unit
according to the guidance data of the break-
d (ij
i k p) dd(ij
(ijj k p )visi / 10 (2) point position in the former cycle, the traf-
fic flow data before and after the breakpoint
By substituting Formula (2) into For- unit in this cycle and the former cycle, and
mula (1), we can derive the maximum driving haze visibility. The result is supplemented
391
to collection D. The specific methods are we obtain the traffic flow data value of the
described as follows: breakpoint unit according to the traffic flow
data before and after the breakpoint unit in
Using Formulas (1) and (2), when this cycle is
this cycle and haze visibility. The result is
the s cycle and the traffic flow data of lane unit
supplemented to collection D. The specific
ij − k p represent the missing breakpoints under
methods are specified in (a1-2).
hazy conditions, we obtain visibility d (ij
i k p )visi
corresponding to the maximum driving speed limit B. For missing intersection unit data:
v(iijj k p, sT )visi . In accordance with the marked order, when
The lane unit ij − k p corresponding to vehi- the speed of each former intersection unit is zero,
cle speed v(iijj k p, sT ) should be less than the the intersection unit is preset as the occupied lane
maximum driving speed, and its value is related to of a waiting vehicle for supplementing data. For
the vehicle speed v(iijj k ( p 1) sT ) of the break- the missing intersection unit data, the approach
points of the former unit ij − k ( p − ) in this to supplementing traffic flow and vehicle veloc-
cycle, the vehicle speed v(iijj k ( p + 1) sT ) of the ity data is similar to that used for the missing lane
breakpoints of the latter unit ij − k ( p + ) in this unit data in (A). The difference is that the velocity
cycle, the vehicle speed v(iijj k p, ( s )T ) of this of the former unit with missing intersection data
unit ij − k p in the former cycle, the vehicle speed in this cycle is zero. The methods for supplement-
v(iijj k ( p 1)) (s ( s )T ) of the breakpoints of the ing the convoy length data of the intersection unit
former unit ij − k ( p − ) in the former cycle, and are described as follows: determine if the inter-
the vehicle speed v(iijj k ( p + 1)) (s
( s )T ) of the section speed of the original missing traffic flow
breakpoints of the latter unit ij − k ( p + ) in the data is zero according to the supplemented results
former cycle. of the traffic flow data. If the speed is zero, the
unit belongs to the lane part of the intersection
v(iijj k p, sT ) mi {v(ij − k p, ( s 1)T ) occupied by a waiting vehicle. We then determine
− [v
[v(iji k − ( p ) ( s − 1)T i − k ( p + ),
)T ) v(ij if the vehicle speed of the latter unit is zero, and
( s )T ) − v(iij k − ( p ), sT ) so on. When the value is not zero, the unit does
− v(iijj k − ( p + 1) sT )] / , v( j , sT )visi } not belong to the said lane. Thus, we determine the
convoy length l (iji k ′ ) of each intersection.
(6)
S8-3. For collection X through collection X′, we estab-
As shown in Formula (4), the minimum traffic lish a statistical vehicle guidance data method
flow values ρ( j )visi under hazy conditions to supplement traffic flow data. According to
are related to driver lane visibility d (iij k p ). the statistical vehicle guidance data method for
The lane unit ij − k p corresponding to supplementing traffic flow data in step S8-2,
ρ( j ) should be higher than the minimum collection X′ collection X twice.
vehicle flow value, and it is related to vehicle flow S8-4. For collection J through collection J′, we
ρ( j k ( p − 1), sT ) of the breakpoints of the establish a statistical vehicle guidance data
former unit ij − k ( p − ) in this cycle, the vehi- method to supplement traffic flow data.
cle flow ρ( j k ( p + 1), sT ) of the breakpoints According to the statistical vehicle guidance
of the latter unit ij − k ( p + ) in this cycle, the data method for supplementing traffic flow
vehicle flow ρ( j ,( )T ) of this unit data in step S8-2, collection J′ supplements
ij − k p in the former cycle, the vehicle flow collection J′ three times.
ρ( j k ( p − 1)1),
)), ( )T ) of the breakpoints of
the former unit ij − k ( p − ) in the former cycle, Step S9 comprises the following: collections D′,
and the vehicle flow ρ( j k ( p + 1)), ( )T ) of X′, and J′ supplement collections D, X, and J.
the breakpoints of the latter unit ij − k ( p + ) in
the former cycle. 3 TRAFFIC FLOW DATA SUPPLEMENT
RATE
ρ( T) {ρ( j ,( )T )
− [ ρ(ij k ( ) ( 1) ρ(ij k − ( p + ), The road network model is divided into the lane
( s )T ) − ρ(ij − k ( p − ), sT ) model and the intersection model. According to
− ρ(ij
(ijj − k ( p + 1),
) sT ) / , ρ(ij
T )] i − k p, sT )visi } road network visibility and an urban traffic data
(7) monitoring system, Gong (2015) shows statistics
on traffic flow missing rates for the two parts of
a2-3. When the road network position of the guid- the model, including the lane data missing rate lol
ance data in this and the former cycle are not and the intersection data missing rate loc.
the same as the road network position of For lanes, the lane data supplement rate is
the missing traffic flow data in collection D, related to lane data missing rate lol; the rate is the
392
difference in the lane data missing rates before and degree and haze affected area. Thus, the simula-
after supplementation. tion is divided into two portions: simulation of
haze influence degree of road network and simula-
Ol = lol b − lol a
LO (8) tion of haze affected area.
Simulation data of haze influence degree of road
where lol b = lane data missing rate before supple- network: the visibility values of the lanes and inter-
mentation; lol a = the lane data missing rate after sections with mild, moderate, and severe impact
supplementation. haze are set to 1,000, 500, and 150 m, respectively.
For the intersection, the intersection data sup- Simulation data of haze influence area of road
plement rate is related to the intersection data network: moderate haze and severe impact haze are
missing rate loc; the rate is the difference in the called blind areas. According to the missing data,
intersection data missing rate before and after intersection 12 is set as the point-blind area. The
supplementation. areas surrounded by intersections 12, 13, and 17
are set as the local-blind areas. In road networks,
Oc = loc b − loc a
LO (9) the visibility values of lanes and intersections are
set to 1,000 m in non-blind areas and to 400 m in
where loc b = intersection data missing rate before blind areas.
supplementation; loc a = intersection data missing
rate after supplementation. 4.2.1 Guidance data related to the method
Take 5% of all vehicles in the road network as
floating cars. To closely approximate the actual sit-
4 SIMULATION uation, the initial positions of the floating cars in
the road network are randomly distributed. After
4.1 Simulation data marking the position of the road network, the per
The proposed method is verified using MATLAB unit length of the lane units is set to 20 m, and
with the simulation lasting 1,800 s, during which the per unit length of the intersection units is set
the method is verified once every 10 s. to 10 m.
393
and the supplementation rate of the intersection
and lane data under point-blind haze is the low-
est. The supplementation rate of the intersection
data under full-blind haze is about 25–50%. The
results show that the method in full-blind haze is
more prominent than that in the other conditions.
5 CONCLUSION
REFERENCES
394
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: There is a recent trend in applying MEMS sensors in micro-satellite attitude determina-
tion. Considering MEMS sensors’ large bias drift and noise, a Multiplicative Extended Kalman Filter
(MEKF) has been designed to estimate a micro-satellite’s attitude, based on a series of measurement mod-
els of MEMS sensors in this paper. Simulation results show that this algorithm performs well in estimat-
ing micro-satellite’s attitude information; even though there is an initial error it achieves better accuracy
when compared to traditional methods. Moreover, it reduces computation load which is significant for
micro-satellite practical missions.
395
R = 6371.2 km, r is the radial distance between Generally, σ v2 is regarded as Angle Random
the micro-satellite and the centre of the Earth, λ Walk (ARW) and σ u2 is referred to as Rate Ran-
is east longitude and θ is co-latitude. Pnm (cos θ ) is dom Walk (RRW). Notice that the scale factor
the Schmidt quasi-normalised associated Legendre error and other time-correlation drifts are ignored
function of degree n and order m. The genera- in this model.
tion 12th IGRF is a spherical harmonic degree 13 It is necessary to transform ωbi to the angular
model and was published in 2014. velocity of the micro-satellite body frame relative
According to articles (Bak, 1999; Simpson, to the orbit frame ωbo during the process of atti-
1989; Castellanos, 2014; and Tohami, 2005), it is tude determination:
easy to calculate the geomagnetic vector by taking
the gradient of magnetic scalar potential V: ω bo ω bi Cobω oi ω oi = [0
[ − oi 0 ]T (8)
396
3.2 State equation of MEKF in attitude Finally, if the state vector is X = [ Δq Δb]T , the
determination state equation is given by:
A multiplicative error quaternion Δq is derived = F(
from the estimated quaternion q̂ and real quater- X F )X G( )W (20)
nion q by:
where
q = qˆ ⊗ Δq (12) ⎡
F(( ) ⎢
[ˆ ]bi 3 3 ⎤ ⎡ −0.5 3 3 ⎤
⎥, ( ) ⎢ ⎥,
Since the error quaternion is small, it is reason- ⎣ 3 3 3 3 ⎦ ⎣ 3 3⎦
= Δω bi − ( ( ˆ ) ( ˆ ))ω oi
(16)
≈ Δω bi +
+22 Δq ⊗ A(( qˆ )ω oi And Bo is the reference magnetic vector. The
error ΔBbbetween the magnetometer measurement
B and the estimated one B̂ can be given by:
Substituting (16) into (15) gives: b b
1 ΔB b = B −B ˆ =B − A(q)B
ˆ o
Δq = −(( ˆ bi
b b b
(ˆ) oi ) bi ( ˆ )ωˆ bi = A(q)B o + VB − A(q)B ˆ o
2
1 = ( A(qˆ q) A(q) ˆ )B o + VB
= −ωˆ bi ⊗ Δ
Δqq + Δω bi (17) = A(qˆ )( A((Δ
Δq) − I )B o + VB
2
≈ −22 q A(qˆ )B o + VB
= −2 Δq ⊗ B ˆ +V
b B
According to (4), it is easy to derive Δω bi : ˆ
= 2 B b ⊗ Δq + VB (25)
where Δb = b − bˆ and the estimated angular veloc- ˆ × ] 0 ]. Actually, the error vec-
where H b = [[2[B
2[B b 3×3
ity ωˆ bi = ω bi − bˆbbi ; tor VB includes errors from the model of IGRF,
397
Figure 2 shows the geomagnetic filed compo-
nents in the NED frame calculated from the IGRF
model according to the positions of the micro-sat-
ellite. Figure 3 shows the results of attitude deter-
mination by MEKF in attitude angles yaw, roll and
pitch.
Simulation results show that the attitude
determination algorithm of MEKF above, based
on gyroscope and magnetometer, gives a good
estimation of the satellite’s attitude. And it can
approach accuracy, especially for roll and pitch
angle.
Figure 4 shows the result of attitude deter-
mination by the traditional method—Runge-
Figure 1. The process of MEKF in micro-satellite atti- Kutta. It shows that the determination errors
tude determination. of attitude angles by Runge-Kutta increase over
time. However, MEKF in this paper avoids this
problem well. In addition, there is obvious accu-
measurement error, and so on. In this paper, it is racy promotion for MEKF when compared to
simply assumed that it is a zero-mean white noise. Runge-Kutta.
Figure 5 shows the results of attitude determi-
3.4 Process of MEKF in attitude determination nation when there are big errors in initial angles:
[10°, 10°, 10°] and [15°, 15°, 15°]. Results show that
There are three parts regarding the process of despite this, MEKF can still maintain output of
MEKF in micro-satellite attitude determination: acceptably accurate results, which is fundamentally
1) Prediction: calculate the one-step prediction important for practical satellite missions.
of state X ˆ
k,k −1 and its mean square error matrix
Pk,k −1; 2) Update measurements: calculate the esti-
mated state X̂ k by Kalman gain Kk and measure-
ment information; and 3) Result output: correct
the estimated quaternion q̂ k and bias b̂ k by the
estimated state:
⎡ 1 − Δˆ 2 ⎤
q k = qˆ k ⊗ ⎢ ⎥ (27)
⎢⎣ Δ ˆ ⎥⎦
b = bˆ + Δbˆ
k k k (28)
398
able accuracy within 2°. Moreover, even if there is
a big error in the initial attitude angles, the algo-
rithm can still work well. It is also important that
the algorithm reduces consumption of computa-
tion, which is meaningful for micro-satellite practi-
cal missions. In the following work, the feasibility
of the algorithm will be verified in the physical
platform of micro-satellite.
REFERENCES
399
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: With the rapid development of chip multiprocessors and the popularity of private cars
in recent years, all kinds of solutions and products related to vehicle top-view systems have appeared.
Because the systems widely use several microprocessors or heterogeneous structure CMP as core control
units, there are some problems has widely exits on the systems, such as development difficulty and complex
surrounding construction etc. This paper describes a vehicle top-view system that uses a monolithic four-
channel TW6865 video decoder to replace the traditional single channel based on i.MX6Q. Compared
with other solutions, this one has the advantage of simple design and development. Finally, we have
applied lens distortion corrections, bird-view transformation and image fusion algorithms on the system.
In the test, the system achieved the desired effect that a surrounding bird-view picture, which could be
used to monitor the surrounding conditions, was displayed on the screen.
Keywords: Vehicle top-view; i.MX6Q; Lens distortion corrections; Bird-view transformation; Bird view
1 INTRODUCTION
401
the application processor of Freescale i.MX6Q
uses the Image Processing Unit (IPU) to catch the
interlaced camera image solution mixed get to saw-
tooth smooth after the image processing, and run
on processors of image processing algorithm. Four
ARM architecture A9 kernel and three Graph-
ics Processing Units (GPUs) are embedded in the
i.MX6Q, with the ability of parallel processing pro-
grammable pipeline processing, which could guar-
antee the smooth implementation of the algorithm.
402
car body all around in the vehicle top-view system, 2. Set the effective area, that is, the dimensions
a certain viewing angle would be existed between of the four trapezoidal, effective areas rela-
optical axis and ground. Hence the image data tive to their respective correction chart of dis-
from the cameras have the effect of perspective. placement, intercepting the trapezoidal area
If we want an aerial view of the vehicle, we must effectively;
transform the perspective of all the image data 3. The trapezoidal intercept figure at panoramic
from the four cameras, to lay the foundation for aerial view coordinate system (X, Y, O) in con-
the next step of the stitching algorithm. figuration (Maik et al., 2014), according to,
In order to get the top view of the video image, from top to bottom, from left to right scan, the
there are some steps to establish a generated over- coordinates of the four ladder diagram are:
looking the pixel mapping relationship between
the image and the original image (Rose et al., ⎛ W 2 L1 L 2 + W 1⎞
2009). Above we have described the coordinate (0,0) , (0,0) , ( W2,0) , ⎜⎝ , ⎟⎠ .
2 2
point under the camera system ( xc , yc , c ) and the
bird’s-eye view of the world ( xw , yw , w ).
4.4 Experimental tests
⎡ xw ⎤ ⎡ xw ⎤
⎡ xc ⎤ ⎢ ⎥ ⎢ ⎥ In the experimental scenario, we simulated car size
⎢ y ⎥ = s R t ⎢ yw ⎥ = sM ⎢ yw ⎥
⎢ ⎥ c [ ] ⎢ zw ⎥ ⎢ zw ⎥
(2) to build the platform; the experimental platform is
3.1 metres long and 1.5 metres wide. The height
⎢⎣ zc ⎥⎦ ⎢ ⎥ ⎢ ⎥ is 0.7 metres of four cameras, the visual field is
⎣1⎦ ⎣1⎦
2.1 metres, and the original image from the four
cameras was shown in Figure 6. Figures 7–8 showed
4.3 Image mosaics the processed images of one direction of the cam-
era after a fisheye image correction and perspec-
After correcting the images and perspective trans- tive transformation algorithm of Rendering.
formation, the primitive image data have been After correction and perspective transformation
transformed to virtual vertical view without opti- for the four directions, the image fusion algorithm
cal distortion. There are three steps we need to do
for the purpose of getting four correction image
stitching around the vehicle.
1. The coordinate system as shown in Figure 5
would be set up, according to the experimental
vehicle conductor L1 and body width W1, and
the wide panoramic aerial views W2 and L2 are
set up;
403
architecture, we do not need to deal with a com-
munication mechanism between multi-core proces-
sors. This paper also made some related analysis
and research about the algorithms of a vehicle
top-view system. After the whole design had been
finished, the system was tested in the vehicle labo-
ratory which proved that it is feasible. Therefore,
this project has engineering value. The author
will make more improvement to the algorithms to
adapt it to more complex environments.
ACKNOWLEDGEMENTS
Figure 8. Transformation image.
This project was supported by the Doctoral
Scientific Research Foundation of Chongqing
(A2016-27), The Science and Technology Project
Affiliated to the Education Department of Chong-
qing Municipality (KJ120511) and Achievement
Transfer Programme of Institutions of Higher
Education in Chongqing (KJZH 14207).
REFERENCES
404
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: The purpose of this paper is to study the fault detection and repair technology of
submarine cable. The cause of the fault is analysed and the type of fault is put forward. The fault detection
methods and the repair technology for submarine cable are introduced in detail, and also some protective
measures for after the submarine cable is repaired are put forward.
405
Figure 1. The fault detection of submarine cable.
The α is the inlet angle of the submarine cable The typical repair technology steps of subma-
during fault repair. The H is the vertical distance rine cable are shown as follows:
from the sea floor to the maintenance of the ship’s a. After the location of the submarine cable fault
deck. The B is half of the length of the submarine is found, the ship is in place at the proposed
cable maintenance platform (Chandrabhan et al., fault point.
2007). The D is the broken section found by fault b. Calculate the length of the spare submarine
detection. The δ is the required redundancy length cable required.
for submarine cable repair. c. The diver cuts the cable underwater, removes the
The diver determines the location of the subma- damaged submarine cable and then installs the
rine cable fault underwater. They then draw out the waterproof component at both ends and marks
submarine cable along the bottom of the cable at (Mark No. 1 and No. 2).
the proposed fault point by using a high-pressure d. Remove the faulty submarine cable from the
water gun or other blowing equipment. The length water and fix it on the working platform by
of the submarine cable needed to be drawn out using a floating crane near the mark of No. 1.
should be determined by the depth of the water, e. After the damage point and the water inlet part
the bending radius of the cable, the margin of the is removed, eliminate other faults by conduct-
fault point and so on (Tian et al., 2004). ing the DC resistance, insulation resistance and
withstand voltage tests (S. et al., 2007).
f. Use the special connector of the submarine
4 THE REPAIR TECHNOLOGY cable to connect the bottom of the submarine
OF SUBMARINE CABLE cable marked No. 1 and then put it back.
g. Move the floating crane to the submarine cable
4.1 The repair technology breakpoint marked No. 2. Remove the faulty
The repair technology of different submarine cables submarine cable from the water and fix on
is different. This paper will focus on the repair the platform. After the damage point and the
technology of XLPE insulated lead sheathed thick water inlet part are removed, eliminate other
steel wire armoured submarine cable in a shallow faults by conducting the DC resistance, insu-
water area. lation resistance and withstand voltage tests.
406
Use the special connector of the submarine 5 METHODS OF DETECTION AFTER
cable to connect the bottom of the submarine REPAIR OF SUBMARINE CABLE
cable marked No. 2 and then put it back (Tat-
suo et al. 1996). Measure the insulation of the three values by using
h. After the repair of conductor DC resistance, megger until the cable connectors are all made and
insulation resistance, lead sheath DC resist- the measured value should be in the range of more
ance uniformity test and pressure test to con- than 1,000 megohm. If the leakage current is less
firm whether the test results meet the latest than 75 mA to 80 mA during the 10 minute voltage
APISpec17E (K. et al., 2006). regulation test under the 15 kV, it means that the
cable is qualified (P. et al., 2007).
4.2 The preventive measures
Submarine cable is the indispensable power trans- 6 CONCLUSION
mission facility between various platforms in the
sea. Its importance is self-evident. However, due to In this paper, the submarine cable fault detection
the particularity of its environment (marine envi- and repair technology is discussed. Finally, the
ronment), the maintenance of it and any main- detection method of submarine cable repair is
tenance work needed is difficult. Once damaged, introduced to ensure the cable’s qualification after
it will cause serious losses. repairing. The detection and repair technology pro-
The strengthening of the submarine cable used posed in this paper has been applied many times in
in the process of maintenance work and reasona- the submarine cable dimension repair project.
ble submarine cable construction are particularly
important in order to prevent submarine cable
faults and measurement errors in the event of REFERENCES
failure. Therefore, the following precautions are
recommended to prevent submarine cable faults Bauch, A., Piester, D., Moudrak, A., et al. (2004). Time
and measurement errors (Henningsen et al., com-parisons between USNO and PTB: A model for
1996): the determination of the time offset between GPS time
and the future galileo system time. Frequency Control
1. The ship should first obtain the permission Symposium and Exposition.
anchor coordinates and break down in the des- Chen, L., Zhu, X., & Li, T. (2006). Choice of Submarine
ignated area strictly according to the regula- Cable of Hainan Interconnection Project, 32(7), 39–42.
tions, when the ship needs to break down in the Couderc, D., Bourassa, P., & Muiras, J. M. (1996). Gas-
oil area. in-oil criteria for the monitoring of self-contained
2. The submarine cable protection should be uni- oil-filled power cables. IEEE 1996 Annual Report of
the Conference on Electrical Insulation and Dielectric
fied, inspected and the damage immediately Phenomena.
repaired to prevent the fracture along the cable Czupryna, S., Everaere, J., & Delattre, M. (2007). Improve-
protection pipe falling in the sea. ments in super absorbent water blocking materials for
3. The anti-wear measures should be taken at the new power cable applications. in Jicable Conf.
intersection of submarine cable and the inter- Du, P., & Fu, S. Z. (2007). Brief analysis on several kinds
section of submarine cable and submarine of detection technologies of optical fiber submarine
pipeline. cable. Guangxi Journal of Light Industry, 1(12), 67–68.
4. Fix and support the submarine cable under the Henningsen, C. G., et al. (1996). Experience with an on-
long-floating platform. line monitoring system for 400 kV XLPE cables. Pro-
ceedings of 1996 IEEE Transmission and Distribution
5. Collect the construction information of the Conference.
submarine cable and the direction of each, the Sasaki, T., & Kurihara, M. (1996). Oil-filled cable surveil-
bottom of the amount of surplus, the actual lance system using newly developed optical fiber gas
length of the detailed to facilitate accurate sensor. IEEE Transactions on Power Delivery.
measurement and fault location. Sharma, C., & Singh, P. (2007). Contribution of loads to
6. The length of the submarine cable should be low frequency oscillations in power system operation
regularly patrolled by the oil field ship on duty, 2007 iREP symposium. Revitalizing Operational Reli-
to prevent passing ships, fishing operations and ability, 19(24), 1–8.
others from endangering the safety of the sub- Tian, Y., Lewin, P. L., Wilkinson, J. S., et al. (2004). Con-
tinuous on-line monitoring of partial dischangees in
marine cables and to strengthen the safety of high voltage cables. Conference Record of the 2004
the submarine cables. IEEE International Symposium on Electrical Insulation.
7. Make emergency plans and contingency plans, Yung, K. M., Wong, K. C., & Ip, S. L. (2006). Quality
so that the submarine cable fault can be repaired plan for transmission plant and equipment. CLP
in time to minimise losses. Power Hong Kong Limited.
407
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: Based on the distribution of run feature and rank difference feature of coding sequence,
this paper proposed a method to identify a type of common coding sequence. Using the concept of
run distribution in combination with analysis of random nature within the coding sequence, it can
be distinguished whether the encoding type belongs to block codes or others. Based on the structural
features of turbo codes, rank difference analysis following the split of the coding sequence can distinguish
the encoding type from convolutional and turbo codes. Herein the simulation experiment is described,
the results of which demonstrate the validity and applicability of the proposed method.
Keywords: Block codes; Convolutional codes; Turbo codes; Run feature; Rank difference statistical
feature
409
2 BRIEF INTRODUCTION OF ERROR
CORRECTING CODES
410
1. If the number of one element was 2n–1 in one similar features as random sequence. The feature
period of the m sequence whose period is 2n – 1, performs on run is that the zero and one run num-
the other would be 2n–1 – 1. ber are decreasing in accordance with 1/2 law when
2. In one period of the m sequence whose period length of the run is increasing.
is 2n – 1, the total number of run is 2n – 1. Each
number of zero run and one run composes 50% 3.2.4 Run feature of turbo codes
of the period. The number of the run whose The biggest feature of turbo codes is random
length is k ( k n ) is 2n – k – 1. encoding, which is achieved by introducing an
interleaving device. It therefore has an excellent
This shows that the number of zero runs and
decoding performance that is close to the Shannon
one runs in the m sequence is decreasing with the
limit (Zhang Yongguang et al., 2010). Because of
increase of the run length, in accordance with
the above-mentioned reason, the random nature
the 1/2 law. Otherwise, their numbers are basically
of turbo codes is similar to random sequences.
the same when the lengths of zero and one run are
Performing on run is that the zero and one run
equal.
number are decreasing in accordance with 1/2 law
when the length of run is increasing. So the run
3.2.2 Run feature of block codes
feature cannot be used to distinguish the encod-
It is exhibited in Figure 4a that the (n, k) block
ing type between convolutional codes and turbo
code, where the length of information bit is k, has
codes.
2k kinds of output code words. While in Figure 4b,
By analysing these coding sequences’ random-
the binary random sequence with length of n has 2n
ness, two conclusions can be drawn as follows:
kinds of output code words. Thus the (n, k) block
code has 2n – 2k kinds of disable code words, which 1. The run feature of block codes is different
leads to invalidation of the random nature of the from that of convolutional codes and turbo
block code. Since the k-bits information symbols codes in terms of randomness. The random-
can be randomly generated, the run whose length ness feature of convolutional codes and turbo
is less than k can be obtained from the code word. codes is better than that of block codes and is
In comparison, the run with a length greater than similar to that of random sequence. The zero
or equal to k can only be obtained from the posi- and one run number of convolutional codes
tion where two code words are spliced. Therefore, and turbo codes decreases in accordance with
different from random sequence, the number of 1/2 law.
block code’s run that is around the information bit 2. With the increase of the run length, block
length would have a certain amount of distortion, codes’ run number presents an irregular
which is different from random sequence. descending, which is around the information
bit length would have a certain amount of
3.2.3 Run feature of convolutional codes distortion.
The most important feature of convolutional
codes is memory, which makes it different from
3.3 Analysis of rank feature
other block codes. The check bit of convolutional
codes does not only relate to its information bits, 3.3.1 Rank feature of convolutional codes
but also relates to the information bits that were Considering that the p × q(p > 2n, q < p) order
previously inputted into the encoder. The structure matrix consists of (n0, k0, m) convolutional code, if
of convolutional codes is similar to linear feedback q was an integer multiple of n, the upper left cor-
shift registers, which can generate an m sequence. ner matrices would have the same dimension and
Due to the above reasons, convolutional codes bear the rank of the p × q matrix would not be equal to
q (Zhang Yongguang et al., 2010).
From the definition of convolutional codes it is
known that the output vector is the linear transfor-
mation of the input vector. The linear constraint
relation expressed by any complete convolutional
codes is exactly the same and is equal to the system
form [Ik P]. Given the p × q(p = tn0 + l,q < p, t > 2)
order matrix C which consists of (n0, k0, m) convo-
lutional code.
• The matrix C consists of a complete code word
when q = an0 (a ≥ 1) and the code word starting
point is correct. After simplifying this matrix,
Figure 4. Distribution of block code. the formula (1) is reached:
411
⎛ c11 c12 c1q ⎞
⎜c c22 c2 q ⎟
C =⎜ ⎟→
21
⎜ ⎟
⎜c ⎟
⎝ p c p 2 c pq ⎠
⎛ I k0 Pn0 − k0 0 k0 0 k0 0 k0 ⎞
⎜ 0 0 0 0p ⎟
⎜ p k0 p k0 p k0 k0 ⎟
C = ⎜ 0 k0 0 0 k0 ⎟
⎜ k0 n0 k0 k0
⎟ Figure 5. Structure of RSC.
⎜ ⎟
⎜ ⎟
⎝ 0l 0l 0l 0l ⎠ Systematic Convolutional (RSC) code encoder is
(1) always used to take the place of sub-encoders and
its structure is showed in Figure 5.
Rank of matrix C is nk( n ). From the relationship between output and
• The matrix C consists of a number of sub- input of RSC in Figure 5, formulae (3) and (4) are
matrices when q = an0 (a ≥ 1) and the code derived:
word starting point is incorrect. At the left of
matrix C, there is a sub-matrix that has p rows mc
412
sequence could be either convolutional or turbo
codes; on the contrary, it would be block codes;
4. If the coding sequence was not block codes,
splitting this sequence and constructing a p × q
( , q < p, ) matrix;
5. Simplifying the p × q matrix and statistic rank
R j ( j , 2, , k ) of each matrix;
6. Statistic rank difference C j q j − R j and draw-
ing a map of it. Observing the period of rank
difference on the map and estimating encoding
type of each split sequence;
7. If one of the split sequences was convolutional
code and other two split sequences were block
codes, the coding sequence could be turbo
codes. On the contrary, it could be convolu-
tional codes.
4 EXPERIMENTS
Experiment 1: run statistics of coding sequence
Under the condition of no error bits, the follow-
ing were generated: (15, 5) block code, (3, 2, [4 3])
convolutional code and 1/3 turbo code whose poly-
nomial was (7, 5) and random interleaving device’s
Figure 6. Three kinds of split modes. length was 15 bits. Length of each test sequence
was 33,600 bits. Extracting test sequence’s run
number when length of run was varied from 1–10.
can be referred to as a block code. Likewise, the
Run distribution of each coding sequence and ran-
third split mode that is revealed in Figure 6(c) also
dom sequence are indicated in Figure 7:
shares the properties of block codes.
It can be observed for convolutional code
Through the analysis of these coding sequences’
(Figure 7 (b)) and turbo code (Figure 7 (c)) that
rank feature, two conclusions can be drawn:
the number of run decrease smoothly with the
1. Since the code length of convolutional codes increase of the length of run, while for block code
is generally less than eight and the encoder (Figure 7(a)) there is significant distortion.
of turbo codes is similar to convolutional Thus it can be drawn from the experimental
codes, it is possible to construct a p × q results that:
( , q < p, ) matrix the rank
of which can be periodically minimised after 1. There is a big difference of run distribution
simplification. between block codes and random sequence. The
2. Because of the unique encoding method of block codes’ run number around the informa-
turbo codes, the rank difference statistics of tion bit length would have a certain amount of
split turbo codes can detect the nature of block distortion.
codes and convolutional codes. 2. The run distributions of convolutional codes
and turbo codes coincide with random
sequences, and the zero and one run number
3.4 Identification step decreased in accordance with 1/2 law.
Through the analysis of run feature and rank fea- 3. Since the better random performance of con-
ture of coding sequence, steps of identification are volutional and turbo codes’ run distributions
proposed as following: are similar to each other, the characteristic of
run distribution to distinguish encoding type
1. Statistic run distribution vi (i , 2, …, t ) of between convolutional codes and turbo codes
coding sequence, i is run length and vi is the cannot be used.
number of run;
2. Drawing run distribution of coding sequence Experiment 2: rank difference statistics of coding
and random sequence; sequence
3. Observing run distribution: if run distribu- Under the condition of no error bits, the follow-
tion of coding sequence is similar to random ing were generated: (2,1,6) convolutional code and
sequences, and zero and one run number 1/3 turbo code whose polynomial was (7,5), and
decreased in accordance with 1/2 law, the coding random interleaving device’s length was 15 bits.
413
Figure 8. Rank difference distribution of coding
sequence.
414
As shown in Figure 9, rank difference distribu-
tions of these three split sequences have no peri-
odical peak values and they all have the feature of
random sequence.
Under the condition of no error bits, 1/3 turbo
code with polynomial (7, 5) and 15 bits random
interleaving device length was generated. Splitting
it into three modes and each test sequence’s length
was 33,600 bits. Rank difference distributions of
these sequences are shown in Figure 10.
As shown in Figure 10, rank difference distribu-
tions of these three split sequences have periodical
415
Table 1. Recognition rate under different BER.
Bit error rate 0.001 0.002 0.003 0.004 0.005 0.006 0.007 0.008 0.009 0.01
Recognition rate 1 1 1 0.99 0.98 0.96 0.90 0.77 0.52 0.21
416
Communication Engineering Graduate School of Wang, D. and Kobasyashi, H. (2009). Low-complexity
National University of Defense Technology. 11. MAP Decoding for Turbo Codes. Proceedings of
Liu Jiancheng and YANG Xiaojing. (2013). Research on IEEE Vehicular Technology, 1035–1039.
channel coding of convolutional codes.. Hefei: Elec- Wang Kaiyao. (2013). The Design of High Performance
tronic engineering institute. 6. LDPC Codes and its Application for Cognitive Radio
Li Xiangying. (2011). Key technologies of protocol iden- Networks. Beijing: Beijing Jiaotong University. 04.
tification for CCSDS data link layer. Beijing: Center Wang Xinmei and Xiao Guozhen. (2006). Error Cor-
for Space Science and Applied Research, Chinese recting Code—Principle and Method. Xian: Xidian
Academy of Sciences. University Press.
Li Yi. (2009). Study on Encoding and Decoding Algo- Wen Niancheng, Yang Xiaojing and Bai Yu. (2011). A
rithm of LDPC Code Based on WiMAX. Harbin: new recognition method of RS codes. Electronic Infor-
Harbin Institute of Technology. 06. mation Warfare Technology. 26(2), 36–40.
Moosavi, R. and Larson, E.G. (2011). A fast scheme for Wei Yuejun. (2013). Research on the decoding algorithms
blind identification of channel codes.Global Telecom- of channel codes in 3GPP UMTS and LTE systems.
munications Conference, Linkoping, Sweden. 1–5. Shanghai: Shanghai Jiaotong university.
Qi Lin, Hao Shiqi and Li Jinshan. (2011). Recognition Xie, H., Wang, F.H., Huang, Z.T. (2013). A Method for
method of RS codes based on Euclidean algorithm Blind Recognition of Convolutional Interleaver. Jour-
in Galois field. Journal of Detection & Control. 33(2), nal of Electronics and Information Technology. 35(8),
63–67. 1952–1957.
Reng Defeng. (2013). High speed turbo decoding and Xu Zhong, Zhang Kaiyuan, Lu Quan and Leng Guo-
cooperative spectrum sensing for next generation wei. (2001). Matrix Theory Concise Guide. Beijing:
wireless communications. Xian: Xidian University. Science Press. 01.
Sherif Welsen Shaker. (2014). DVB-RCS: Efficiently Yang Xiaowei, Gan Lu. (2012). Blind Estimation Algo-
Quantised Turbo Decoder. ICACT Transaction on rithm of the Linear Block Codes Parameters. Based
Advanced Communications Technology. 2(3), 426–433. on WHT. Journal of Electronics & Information Tech-
Sung-Joon, Park, Jun-Ho and Jeon. (2009). Interleaver nology. 34(7), 1642–1646.
Optimisation of Convolutional Turbo Coder for Zhang Chengchang, Peng Wanquan and Wei Bo. (2014).
802.16 Systems. IEEE Communications Letters. 5(13), Construction of a new class of (2k, k, 1) convolutional
339–341. codes. Journal on Communications. 35(6), 200–206.
Tang Qi. (2013). Research on Convolutional Code Based Zhang Yongguang and Lou Caiyi. (2010). Channel Cod-
on 3G. Wuhan: Central China Normal University. 05. ing and Recognition Analysis. Beijing: Publishing
Vladislav, Sorokine, Frank, R. and Kschischang, Sub- House of Electronics Industry.
barayan Pasupathy. (2000). Gallager Codes for Zhou Pan and Gan Lu. (2013). Blind recognition and
CDMA Applications [J]. IEEE Transactions on Com- parameter estimation of cyclic codes. Chengdu: Univer-
munications. 48(10). OCTOBER. sity of Electronic Science and Technology of China. 5.
417
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Research on the detection system for dynamic ship draft on the basis
of ultrasonic diffraction effect
ABSTRACT: A method to measure the dynamic ship draft by adopting ultrasonic diffraction effect
is proposed in the view of the current state of detection technology for ship draft: the depth data of
ship cross section is obtained using the diffraction effect produced by dynamic ship’s occlusion of the
ultrasonic transmission path under the water. Through the synchronous control of emitter array as well
as receiving array and the data processing method of corresponding diffraction curve fitting, the real-time
draft value of dynamic ship is measured. And according to the method mentioned above, the detection
system for dynamic ship draft is developed on the basis of ultrasonic diffraction effect. The system is
verified in a pool with the length of 25 meters, and the measurement precision of underwater standard
occlusion is 0.02 m; during the measurement of dynamic ship in the gate of Gezhouba Dam ship lock,
the contrast difference between the draft measured and the water gauge of ship reaches to 0.1 m, which
proves that the system and data processing method are practical and effective.
419
area. In the shadow and light areas at the junction,
a part of sound waves from the side shield to the
diffraction effect of the diffraction phenomenon
(SHI J W et al., 2009) (LU M H et al., 2015) (CHI
D ZH) occurred. Through real time detection and
analysis of diffraction patterns, it can be calculated
to draw the depth of the occlusion.
Straight edge diffraction formula:
E ⎡ ⎛ 2 ⎞ ⎤
E ( x, y ) ⎢F x F ( −∞ )⎥ (1)
1 + i ⎢⎣ ⎝ λ z1 ⎠ ⎥⎦ Figure 2. Simulation received light intensity pattern.
420
from these different paths ultrasonic does not con-
tain the ship’s draft information, this phenomenon
is called multipath effect. The crosstalk between
the sensors and the multipath effect will affect
the ultrasonic receiving sensor array to accurately
determine the path of ultrasonic occlusion of the
ship, in order to solve this problem, the synchro-
nous control unit is very important for the syn-
chronous control of ultrasonic transmitting and
receiving arrays.
The control unit of the synchronous control
unit adopts the method of time division control,
and only one path ultrasonic emission sensor is
Figure 4. System schematic diagram.
used to arrive at the receiving sensor array at a cer-
tain time period. As shown in Figure 5 is the simu-
with water level information and ultrasonic infor- lation of synchronous control unit for the control
mation, and calculate the depth of the ship draft. signal of the 6 ultrasonic sensors, a total cycle time
Finally, the ship draft information is transmitted to is t, the low level is the corresponding way of the
the ship draft information management database ultrasonic emission sensor is working.
through long distance transmission. The synchronous control unit controls the
The measurement principle is as follows: ultrasonic transmitting array at the same time,
the ultrasonic data acquisition unit collects the
H = X +Y (3) voltage signal receiving ultrasonic detector out-
Y N *d h (4) put in the array. After the operation of the ultra-
sonic emission sensor, the time of the delay direct
In the formula: H is the ship’s draft measured by ultrasonic transmission is T2, the ultrasonic data
the detection device; X is the ultrasonic transmitter acquisition card can start the data acquisition of
and receiver array in the depth of the first sensor the corresponding ultrasonic receiving sensor. The
under the water (When the water level is changed, X signal acquisition of an ultrasonic wave receiving
can be obtained by measuring the water level meter sensor is completed by the data processing after
installed at the first sensor position); Y is based on the acquisition of the time t1. t2 is the direct wave
the ultrasonic diffraction effect of the ship to calcu- transmission time, which can be measured by the
late the depth of the transmission of the ultrasonic identification of the first direct wave transmitted
transmission path; N is the number of acoustic wave from the ultrasonic transmitting sensor array to
intensity received by the ultrasonic wave receiving the ultrasonic receiving sensor array.
sensor array in the shelter area; D is the installation As shown in Figure 6, the CH1 is a synchronous
distance between the sensors in the sensor array, control unit control signal to an ultrasonic trans-
and the distance between the installation should be mitting sensor, CH2 voltage signal correspond-
smaller than the distance from the diffraction effect ing to the ultrasonic receiving sensor to collect
caused by the diffraction effect; Δh is calculated by ultrasonic sensor output, 0V–5V is the ultrasonic
the depth of the acoustic intensity calculated by the intensity of different voltage amplitude, higher
first sensors in the diffraction area, which is relative representative ultrasonic intensity. Observed from
to the depth of the sensor in the area. the figure, since the launch of post t2 time for the
first time the sensor receives the ultrasonic signal,
the signal for the direct ultrasonic signal, and after
3 SYNCHRONOUS CONTROL UNIT FOR t3 time can also receive the ultrasonic signal, but
TRANSMITTING AND RECEIVING is not the direct wave signal, using the method of
SYNCHRONOUS CONTROL OF
ULTRASONIC SENSOR
421
If a data satisfies the formula | f ( x ) ( x ) | > a,
the point is considered as noise data points, the
value of the use of g(x) value; If a data satisfies
the formula | f ( x ) ( x ) | < = a, the point is con-
sidered noise data points, the use of the original
value f(X). As shown in Figure 7, for the 4 channel
ultrasonic sensor data drawn under multiple cycles.
As shown in Figure 8, is to deal with the noise
Figure 6. Control chart of data acquisition unit with of the data points after the effect diagram. In com-
synchronization control unit. parison with Figure 7, it is found that the improved
median filtering algorithm can effectively remove
ultrasonic propagation delay can well eliminate the noise data points, and retain the original data.
these no direct wave signal.
4.3 Occlusion depth subdivision method
4 DATA PROCESSING METHOD When the ultrasonic receiving sensor receives
the ultrasonic intensity in the diffraction region
4.1 Data processing in a single receive cycle affected by ultrasonic diffraction, occlusion depth
The output voltage signal detection in the ultra- and ultrasonic intensity is not linear change. Based
sonic receiver array will have certain fluctuations, on the analysis of ultrasonic diffraction, combined
in order to reduce the affect caused by the fluctua- with thousands of sets of calibration results in the
tion of the need for appropriate treatment in the Dalian Maritime University survival Museum, fit-
ultrasound data acquisition unit. In the ultrasonic ting subdivision depth and normalized occlusion
data acquisition unit, the voltage of a receiving ultrasonic receiving sensor receives the ultrasonic
period ultrasonic receiving sensor detect the aver- intensity between the regression fitting using least
age voltage, which can replace the entire cycle square method (FAN W B et al., 2013) (TIAN L
of the ultrasonic receiving sensor output value. et al., 2012). As shown in the following formula,
It can also eliminate the interference of voltage Δh is a subdivision in the diffraction region relative
fluctuation in the output to reduce the amount of a road in the depth of the ultrasonic sensor occlu-
data at the same time. Use the following formula: sion blocking region, receiving sound wave inten-
sity sensor receives the ultrasonic in the diffraction
P (i ) = ( f f (2 ) + ...... + f n ) + f n ))/ n (5) region normalized in ultrasonic receiving array.
h a3 x 3 + a2 x 2 + a1x + a0 (7)
In the formula: P(i) is a period of ultrasonic
data after the mean value of the ultrasonic data;
f(x) is the ultrasonic voltage value collected by the
data acquisition unit; n is a total of n ultrasonic
voltage values collected in this cycle.
g( x ) = ( f x − N ( x N / 2 + 1)
f (x f x)
+…+ f x )) /(( N + 1)
N / 2))/( (6) Figure 8. Based on the improved median filtering algo-
rithm to deal with multiple cycles of data.
422
number of experimental data show that the meas-
urement error of the system under laboratory
conditions is better than 0.02 M.
The field experiment is working with the Yangtze
River Three Gorges Navigation Administration
Department of maritime affairs in Gezhouba Dam
5 MEASUREMENT EXPERIMENT
Figure 11. The site measured ship draft.
By using this system, the measurement of the simu-
lation of the ship draft and the measurement of the
ship draft in the field environment are completed.
As shown in Figure 10, the length of 25 meters, a
width of 25 meters, 4 meters deep in the swimming
pool. 650 sets of experiments were carried out to
simulate the ship draft of 0.5 meters to 1 meters,
which are different from the receiving end. In each
experiment, the same amount of draft to simulate
the ship repeated measurement three times.
As shown in Table 1, the measurement error of
the different distances between the ship and the Figure 12. Ultrasonic sensor data collected after
ultrasonic receiving array is simulated. A large treatment.
423
No. 2 Ship Gate test 29 ships, and the measuring ual reading ship draft is 4.05 meters. As shown in
errors of the system. Due to the limitation of the Figure 12, is installed in the field of the data pro-
field condition, the same ship can not be measured cessing unit for ultrasonic receiving sensor array to
for many times, so the measured data are the result receive the 12 channel ultrasonic signal processing
of single measurement. results. Data can be seen from the figure, the use of
Figure 11 is the draft image collected in the field the data processing methods in this paper no sig-
of ship “hung chun No. 2”, by the method of man- nificant noise, more easy to ship draft calculation.
Figure 13 is based on the ultrasonic wave receiv-
ing sensor array data and water level information
to simulate the ship’s underwater cross section
map, to calculate the ship’s draft value is 4.08 m.
The results of the ship draft at the site are shown
in Table 2.
From the field measured data, the contrast dif-
ference is –0.09 M. After analysis, the main error
sources are the following: uncertainty of the true
shape of the ship, read the draft measurement
Figure 13. Drawing of ship dynamic waterline. error and artificial water level system error. In gen-
eral, the amount of water that the system meas-
Table 2. Field measurement ship draft results. ured can be used as a basis for judging the actual
ship draft in the maritime sector.
System
Measured measure- Read
ship ment draught Contrast 6 CONCLUSION
name Time draft/m value/m deviation/m
guanhai009 4/2 3.56 3.45 0.09 The field experiment shows that the method can
hanwan 4/2 4.21 4.3 −0.09 be widely used in the measurement of the ship
yuanyang 4/2 3.62 3.56 0.06 draft based on the ultrasonic diffraction effect.
changjiangjiyun 4/2 3.8 3.9 −0.1 The side scan type ship draft detection system
Hunchun No. 2 4/21 4.08 4.05 0.03 has the advantages of convenient installation,
huijin 4/21 3.7 3.8 −0.1 high measurement accuracy and high real-time
nanhaihuihuang 4/21 3.68 3.75 −0.07 performance.
shunzou 4/21 3.79 3.8 −0.01
xiangfu 4/21 3.8 3.85 −0.05
xintao 4/21 3.69 3.6 0.09 ACKNOWLEDGMENTS
minjin 4/23 3.69 3.68 0.01
Bingang 4/23 3.54 3.6 −0.06 This work was financially supported by Liaoning
No. 888 province Talents Project fund.
zhongyuan 4/23 3.32 3.3 0.02
yuanlong 4/24 3 3 0
hongtai 4/24 3.36 3.36 0
jiangjiyun 4/25 3.81 3.79 0.02 REFERENCES
xinhuaxin 4/25 3.42 3.46 −0.04
Chi DZH. Research on characterization of weld defect
Hengda 4/25 3.61 3.7 −0.09
based on ultrasonic TOFD [D]. Harbin: Harbin Insti-
No. 1198
tute of Technology.
ezijiangyun 4/25 3.87 3.95 −0.08 Dong HT, Ma YY. Design of the automatic detection
jiangshunda 4/26 4.04 4.12 −0.08 system based on ultrasonic sensor array for quantity
changtai 4/26 4.19 4.27 0.08 of crowd [J]. Process Automation Instrumentation,
shuguang 4/26 4.27 4.22 0.05 2016, 37(1): 43–46.
taigang No. 899 4/26 4.39 4.42 −0.03 Fan WB, et al. Methods for Least Squares Fitting of a
hainiu No. 25 4/27 4.28 4.36 −0.08 Straight Line and Their Application in Geochronol-
huihuang 4/27 3.52 3.44 0.08 ogy [J]. Geological Review, 2013, 59(9): 801–815.
No. 168 Hu YL, et al. Research on Image Filtering Algorithm
huahai No. 6 4/27 3.19 3.1 0.09 and Its FPGA implementation [J]. Computer Meas-
hainiu No. 669 4/28 3.73 3.82 0.09 urement & Control, 2008, 16(11): 1672–1675.
yichangliming 4/28 3.48 3.4 0.08 Indukumar K, Reddy V. Broad-band DOA estimation
haohang 4/28 3.74 3.74 0 and beamforming in multipath environment[C]//
No. 1003 Radar Conference, 1990. Record of the IEEE 1990
International. IEEE, 1990: 532–537.
424
Lu MH, Pan WCH, Liu XF. The quantitative method of Wang SHJ, et al. FPGA implementation for solving lin-
hole-type defects with diffracted echo by phased array ear least square problem [J]. Chinese Journal of Scien-
ultrasonic technology [J]. Journal of Applied Acous- tific Instrument, 2012, 33(3):701–707.
tics, 2015, 34(5):385–390. Zh M, Shao FQ, Zhang WB. Ultrasonic imaging sensor
Sazontov AG, Matveyev AL, Vdovicheva NK. Acous- design and sound field measurement for settlement
tic coherence in shallow water: Theory and observa- process [J]. Control and Instruments in Chemical
tion. Oceanic Engineering, IEEE Journal of, 27(3): Industry, 2013, 40(7): 845–859.
653–664. Zhang HL. Theoretical Acoustics. Higher Education
Shi JW, Liu SP. Ultrasonic TOFD Technology for Detec- Press, 2012: 325–327.
tion [J]. Testing Technology, 2009, S1: 95–100. Zhao GCH, Zhang L, Wu FB. Application of
Shi J, Yang DS, Shi SHG. Research on noise sound improved median filtering algorithm to image
source localization method in shallow water based de-noising [J]. Journal of Applied Optics, 2011, 32(4):
on the multi-path model match [J]. Acta Electronic 678–682.
Sinica, 2013, 3(3): 575–581. Zhao W, Li YQ. Inland river ships draught problem and
Shu XL, et al. Effect of the multipath in the shallow testing technology research[J]. China Water Trans-
water to the source bearing estimation [J]. Ship Sci- port: 2015, 15(12): 20–21.
ence and Technology, 2009, 31(9): 121–124. Zhou DCH. Research on ship draft information
Tian L, Liu ZT. Least-squares method piecewise linear collection and process system [D]. Dalian: Dalian
fitting [J]. Computer Science, 2012, 39(6): 482–484. Maritime University, 2010.
425
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Chaoying Li
State Grid Shandong Electric Power Research Institute, Jinan, China
Bo Yang
State Grid Shandong Electric Power Company, Jinan, China
Ting Ge
Nanjing University of Science and Technology, Nanjing, China
ABSTRACT: In a power line inspection system, obstacle avoidance is an urgent problem which needs
to be solved when an unmanned helicopter flying at low altitude which will threat the flying safety with
complex background. Aiming at this problem, this paper presents a high-voltage power line detection
scheme, using MMV broadband LFM technology. In the obstacle avoidance system, we focus on the
signal accumulation technology of a small target, CFAR technique and polarisation detection. Based on
the theoretical analysis A system simulation was done and the radar based on obstacle detection system
was developed. The flight test results show that this method is effective.
Keywords: MMV radar; Power line inspection system; Small target detection
427
Figure 1. Block diagram of the millimetre wave obstacle avoidance radar system.
uses, is 500 MHz. The received signal is converted tion and constant false alarm algorithm to improve
to an intermediate frequency signal through the the detection abilities of targets (especially small
linear frequency modulation, that will be sent into targets).
the signal processing system based on FPGA to
a. Target echo signal which is gained by accumu-
extract the distance information of obstacles and
lation
then the obstacles information is sent into the
In radar signal detection, signal detection
flight control system in order to achieve obstacle
performance is closely related to the signal-to-
avoidance actions. The flight control system sends
noise ratio, the higher the signal-to-noise ratio, the
the radar control instructions at the same time.
better the signal detection performance (Ulaby,
When the signal processing system receives the
1990). Signals can effectively improve the target
command, it will control the obstacle avoidance
echo signal-to-noise ratio, and improve the ability
radar system state. The specific system structure is
of detecting targets (small targets), which generally
shown in Figure 1.
can be divided into the coherent accumulation and
the incoherent accumulation.
2.2 Technology of small target signal processing
The coherent accumulation is completed before
In the work of the unmanned helicopter for power the envelope detecting, it can improve signal-to-
line inspection, the background is complex and noise ratio by M times than before by accumulat-
changeable, the extent to which the radar beam ing the amplitude and phase of M echo signal that
strips may from open terrain to alpine vegeta- is sampled from the same distance from the door.
tion zone, forest, and from water to land. Serious So coherent accumulation is adopted in this paper.
changes have taken place in the characters of the b. Constant false alarm detection
background clutter. Millimetre wave obstacle In the process of radar signal detection, an echo
avoidance radar mainly detects on the power line, signal is often submerged in the receiver noise or
electrical wiring in front of the tower, the obstacles clutter, such as: building, grass, trees, mountains
such as trees, mountains that could be encountered and other background which scatters the echo.
on the flight path and the front. The RCS of the So it is necessary to detect the target signal and
power line is small, and due to the particularities make an accurate judgement under the false alarm
of the power structure itself, when the beam inci- probability of expected. In the automatic test sys-
dent Angle away from the Angle of Prague, it is tem of the radar, in order to enable the clutter
smaller. So the power line is difficult to detect. In and interference to have a minimal effect on the
order to better detect the transmission line, polari- false alarm probability of the system, constant
sation detection technology can be used. But the false alarm detection technology should provide
technology system is very complex and costly. a detection threshold (Wu Yi, 2009) to detection
This paper mainly studies the signal accumula- strategy.
428
Figure 2. Block diagram of GO—CFAR detection.
3 OUTFIELD EXPERIMENT
429
the outfield experiment show, this method is effec-
tive and reliable, and has the best reference value
for subsequent research and equipment.
REFERENCES
430
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: In the face of the continuously deteriorating traffic environment, this research studies
the key technology of automatic navigation target detection for visual vehicles. The image collected
by binocular vision system is carried out with real-time processing, and MATLAB is used to simulate
analysis of the related algorithms. It verifies that the method of combining threshold segmentation
and morphological processing can effectively segment part of a road; quantitative symmetry obstacle
calculation method can effectively detect the obstacles and achieve the automatic driving of intelligent
vehicles for the purpose of effective obstacle avoidance.
431
Figure 1. Marr’s vision theory framework.
432
Figure 5. Structure block diagram of the ranging system.
the running road. After the segmentation, the image set up AOI based on the white line, and further
is extracted. This is the segmentation of the second position obstacles in AOI.
part the road area and non-road area shown in
Figure 3 and the completely extracted road sections.
3.2 Identification and recognition of obstacles
According to the detection of pavement part
in target detection
obstacles, this paper puts forward effective a detec-
tion method, and describes it in detail in the follow- In the process of building, in order to include all
ing chapters. This method is a method of obstacle possible obstacles, it is supposed to be greater than
detection based on symmetry, because obstacles in the actual obstacle area. To further determine the
front in the structural road are mainly the vehicle, location of obstacles, a lot more work is required.
and this special vehicle has symmetric feature. The The next thing to do is to identify obstacles. Then,
obstacle detection algorithm, as shown in Figure 4, this paper proposes a detection algorithm based on
is in allusion to the main obstacle—vehicles on the vehicle symmetry.
structured road to detect (Sharma B. et al., 2014).
1. Symmetry analysis
This is of a great help in the improvement of detec-
If a plane image is reflected by a linear symmetric
tion algorithm speed. It is only needed to analyse
axis along its axis, and the image remains the same,
and judge based on the symmetry of vehicle.
the plane image is called the mirror symmetry.
Figure 5 (Chevalier, M. et al., 2016) shows the
Based on the following vehicle back model, give
structure of the distance measurement system. In
a simple introduction to the symmetry. First of all,
this paper, after detecting obstacles, it is neces-
the detection system is still running under the bin-
sary to detect some information on obstacles, and
ocular parallel mode that we set up. As shown in
this paper mainly measures the distance between
Figure 6, the whole vehicle back is a symmetrical
obstacles and vehicle body. Binocular stereo vision
plane model. According to the symmetry property,
ranging method is used, which first of all needs to
we can start the follow-up work.
calibrate the binocular stereo vision system. In this
Next, the area that needs to be measured in
paper, a variety of calibration methods are com-
symmetry is what has been found. This improves
pared and analysed, and then the direct linear cali-
the effectiveness and real-time performance of the
bration method selected for binocular stereo vision
algorithm.
system calibration. Finally, through the analysis of
2. Symmetry measurement and symmetry axis
the principle of binocular stereo vision distance
In this paper, a quantitative method is established
measurement and image matching, obtain the
to measure the symmetry by using the concept of
depth information of the obstacles.
continuous symmetry. The quantitative symmetry
433
The energy function of the odd function and the
even function is shown below (Lee G. et al., 2015):
w/2
E e ( xs , w ) ∑ e 2 (u, xs , w )
u w/2
E n ( xs , w ) E 0 ( xs , w )
S ( xs , w ) =
E n ( xs , w ) E 0 ( xs , w )
Figure 7. Symmetry characteristic of the vehicle.
Symmetric measurement S is an arbitrary
number in the range of (−1, 1). S = 1 suggests the
complete symmetry, S = 0 represents asymmetry
description method is as follows. In the image, a (Ontañón S., 2015), S = −1 refers to anti-symmetric,
line of gray data can be regarded as one-dimen- and the measure xs corresponds to the parameter w.
sional function g(x) of the horizontal pixel coor- According to the above method, to calculate the
dinates. Any function can be written as an even symmetry of AOI there is a statistical Table 1 of
function ge(x) and an odd function g0(x) (Srinivas the AOI symmetry measurement in Figure 6 (Shen
U, 2014). W. et al., 2016). Taking into account the algorithm
speed, S is the symmetry measurement that each of
g (u ) = ge (u ) + g0 (u ) the four lines carries out.
g (u ) + g(
g( u ) The average values of symmetry measurement
ge (u ) =
2 value calculated in Table 1 are compared with the
g(u ) − g( u ) ⎡ −d d ⎤ threshold set. If S is smaller than the threshold set
g0 (u ) = , u ∈⎢ , ⎥
2 ⎣ 2 2⎦ in advance, then it is believed that the vehicle bar-
rier does not exist in the AOI, and so this area can
The importance of even function and odd func- be removed (Hsieh J. W., 2014); if S is greater than
tion ge(x) and g0(x) can explain the symmetry of a given threshold, then determine that the vehicle
the image, which is the quantitative description of obstacles exist in the AOI. After the comparison,
symmetry (Zhang R. et al., 2013). The more sym- the determination of specific location of the vehi-
metric the image, the greater the proportion of cle can be carried out.
even function.
To establish the new symmetric coordinate sys- 3.3 Experimental results and analysis
tem u (−w/2 ≤ u ≤ w/2) that takes symmetry axis xg
The results of this study are analysed as follows:
as the origin, there are the following coordinates
Choose conditions in fine weather and gloomy
between u and x:
weather for analysis. Fine weather means the sit-
uation that the sky is bright and full of light; in
u x − xs
gloomy conditions, there is almost no sunlight
(Akita T., 2014). The two cases are carried out with
For certain xs and w, the even function and the video capture analysis.
odd function of the function g(x) = g (xs + u) are
respectively (Wang T., 2012): 1. Condition that the weather is fine and the vehi-
cle distance is moderate.
g(( ) + g( ) 2. Condition that the weather is gloomy and the
e(u, us , w ) = s s
vehicle distance is moderate.
2
g(( ) + g( ) From the above experimental results, it can be
0( , us , ) = s s
434
Table 1. AOI symmetry measurement.
Average
h 1 2 3 4 5 6 7 8 value
1 320 11 18 91% 9%
2 428 10 25 92% 8%
Average 374 10 21 92% 8%
large. Under low light conditions, the gray-scale of specific location of the obstacle, so as to achieve
obstacles and the road part may be relatively close, the purpose of automatic vehicle navigation.
which leads to the occurrence of missed and false
detection. The results show that the stability and
reliability of the system are relatively high when ACKNOWLEDGMENTS
the weather is sunny (Shiru Q., 2016); the system
also has certain adaptability when the weather is Hubei Provincial Department of Education
gloomy, but it needs further improvement. Guidance Project of Scientific Research Program
In this section, the key technologies of auto- (No. B2016 281).
matic target detection for a visual vehicle are
studied and analysed, and the method of object
detection based on symmetry is researched. REFERENCES
435
Duan, H., Deng, Y., Wang, X. et al. (2013). Small and Shiru, Q. & Xu, L. (2016). Research on multi-feature
dim target detection via lateral inhibition filtering and front vehicle detection algorithm based on video
artificial bee colony based selective visual attention. image. Control and Decision Conference (CCDC),
PLOS ONE, 8(8), e72035. Chinese. (pp. 3831–3835).
Gao, J., Blasch, E., Pham, K. et al. (2013). Automatic Srinivas, U., Monga, V., Raj, R.G. (2014). SAR auto-
vehicle license plate recognition with color compo- matic target recognition using discriminative graphi-
nent texture detection and template matching. SPIE cal models. IEEE Transactions on Aerospace and
Defense, Security, and Sensing. International Society Electronic Systems, 50(1): 591–606.
for Optics and Photonics, 8739, 0Z–87390Z–6. Wang, T. & Zhu, Z. (2012). Real time moving vehicle
Hancock, P.A., Mercad, J.E., Merlo, J. et al. (2013) detection and reconstruction for improving classifica-
Improving target detection in visual search through tion. Applications of Computer Vision (WACV), IEEE
the augmenting multi-sensory cues. Ergonomics, 56(5), Workshop on. IEEE (pp. 497–502).
729–738. Wang, T., Zhu, Z. & Taylor, C.N. (2013). A multimo-
Hsieh, J.W., Chen, L.C. & Chen, D.Y. (2014). Symmetrical dal temporal panorama approach for moving vehicle
surf and its applications to vehicle detection and vehi- detection, reconstruction and classification. Computer
cle make and model recognition. IEEE Transactions on Vision and Image Understanding, 117(12), 1724–1735.
Intelligent Transportation Systems, 15(1): 6–20. Yao, Y, Xiong G, Wang, K, et al. (2013). Vehicle detection
Lee, G., Yun, U., Ryang, H. et al. (2015). Multiple mini- method based on active basis model and symmetry in
mum support-based rare graph pattern mining con- ITS. 16th International IEEE Conference on Intelligent
sidering symmetry feature-based growth technique Transportation Systems (ITSC 2013). (pp. 614–618).
and the differing importance of graph elements. Sym- Zarco-Tejada, P.J., Diaz-Varela, R., Angileri, V. et al.
metry, 7(3): 1151–1163. (2014). Tree height quantification using very high
Ontañón, S. & Meseguer, P. (2015). Speeding up opera- resolution imagery acquired from an unmanned aerial
tions on feature terms using constraint programming vehicle (UAV) and automatic 3D photo-reconstruc-
and variable symmetry. Artificial Intelligence, 220, tion methods. European Journal of Agronomy, 55,
104–120. 89–99.
Sharma, B., Katiyar, V.K., Gupta, A.K. et al. (2014). Zhang, D., Han, J., Cheng, G. et al. Weakly supervised
The automated vehicle detection of highway traffic learning for target detection in remote sensing images.
images by differential morphological profile. Journal IEEE Geoscience and Remote Sensing Letters, 12(4),
of Transportation Technologies, 4(2). 701–705.
Shen, W., Bai, X., Hu, Z. et al. (2016). Multiple instance Zhang, R., Ge, P., Zhou, X. et al. (2013). A method
subspace learning via partial random projection tree for vehicle-flow detection and tracking in real-time
for local reflection symmetry in natural images. Pat- based on Gaussian mixture distribution. Advances in
tern Recognition, 52, 306–316. Mechanical Engineering, 5, 861321.
436
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: This paper studies the machine learning sign recognition based on the adaptive algorithm.
In allusion to the problem that the contrast degree of lane image obtained at night is low, a night-time
lane mark identification algorithm based on adaptive threshold segmentation is put forward. First of
all, the preprocessed image is divided into blocks to enhance the edge information. In combination with
the Otsu threshold method and the neighbourhood value method, the adaptive threshold is obtained
by weighted distribution, and the lane image is segmented. Finally, partition domain search and Hough
transformation are used to extract lane marking line accurately. The field test shows that, as for lane line
of structured road, the lane line extraction method is highly accurate and provides good in real-time
performance.
With the rapid development of highway, the traf- The lane image that a vehicle mounted camera col-
fic accident rate is rising, which brings great loss lects not only contains information on the remote
to people’s life and property. As a result, to design road and the sky, but also random noise of the
a system that can give the driver timely warning environment. The purpose of lane image preproc-
when the vehicle is not aware of its lane depar- essing is to obtain the effective area of lane (lane
ture can effectively reduce the occurrence of lane area) (Jumb, V. et al., 2014; Iglesias, J. E., 2015), to
departure accidents. In this system, the accurate eliminate the interference of random noise on the
and fast identification of lane marking is a key image, and to enhance the identification feature of
step (Juneja, P. et al., 2012; Juneja, P. et al., 2013). the lane mark edge, providing good precondition
Up to now, there are a lot of lane detection algo- for the subsequent recognition of lane marking
rithms based on vision. They usually use the road line.
model with straight line or curve, as well as Hough Because during the shoot, the camera is fixed
transformation, curve fitting, neural network and in the latter mirror position in the cab (horizon-
other techniques to achieve results. Although the tal centre position of the vehicle), the lane image
success rate of detection and recognition of algo- obtained is divided into two parts. The upper part
rithm is high, these algorithms lack the ability to belongs to the non-road area, containing a lot of
adapt to the changes of light, and the effect is not useless information; the other section is the lane
good when the light is uneven and under the night area needing to be identified, such as shown in
environment. In the night lane image, the road Figure 1 (Das, A. & Sabut, S. K., 2016). In this
gray pixel value is not uniform, and the contrast paper, the processing of lane image is only aimed
degree is relatively low (Hamdi, M. A., 2014). The at the lane area of the image.
opposite vehicle lights or roadside signs reflection
increase the light spot on the image, which makes
2.1 Gray scale and denoising of lane image
the lane marking line difficult identify. In this
at night
paper, through the image edge enhancement tech-
nology and local adaptive image segmentation Gray image only uses one colour channel, occupy-
technology, the lane marking line of lane image is ing a small memory space (Wang, F. et al., 2014).
segmented. And the lane marking line is identified Taking into account the real-time requirements of
by the improved Hough transformation. the algorithm, this paper uses gray that is matches
437
bility is wider than the global threshold, if a neigh-
bourhood is full of background then it is necessary
that a part is sentenced as the goal, thus exaggerat-
ing the new noise emerging in image details.
In view of the above shortcomings, this paper
proposes a method combining an adaptive global
threshold and local threshold to deal with image
after edge enhancement. The global threshold
is determined by the maximum class variance
method, and the local threshold value is determined
Figure 1. Lane image region division. by the neighbourhood median value method. The
flow chart of the adaptive algorithm is shown in
Figure 3 (Rahman, M. H. & Islam, M. R., 2013).
The neighbourhood median value method sorts
several pixel values of the neighbourhood window
W of a pixel f (i, j) on image in ascending order,
from which the value of TM is taken as the segmen-
tation threshold of the window, as shown in Table 1.
TM MedianPixel {W }
M (1)
438
An image segmentation algorithm based on gerates the details of the image, add increases the
global threshold and local threshold is described as noise interference of lane image, and Figure 4(d)
follows (Ju. Z. et al., 2013): is the image segmentation result, from the details,
is better than that of Figure 4(b), clearly retaining
1. The preprocessed lane image is divided into the
the lane mark edge information.
left and right lane area, and respectively divided
into equal parts. The improved window gray
stretching method is used to draw the area.
2. By using the method of maximum class vari- 4 LANE MARKING IDENTIFICATION
ance, the segmentation threshold value TL
and TR of the left and right lane regions are The structured road meets a series of strict indus-
obtained respectively, and the following formula try standards in design and construction. The lane
is used to obtain the global threshold T0. mark has a smooth curve in the extending direc-
tion, and the curvature is small. In general, myopia
⎧T j < center field lane can be approximated as a linear, thus tak-
TM = ⎨ L (2) ing line as the lane model and using Hough trans-
⎩TR j ≥ center formation to detect lane. Hough transformation is
not easily affected by the noise and the curve dis-
where j is the number of columns, and center continuity, and it can easily realise the identifica-
is the boundary threshold of the left and right tion of lane marking line.
lanes. In the practical application, the parameters for-
3. A new threshold T is obtained by using the mula of the linear polar coordinates is often used
global threshold T0 and the local threshold TM to represent the straight line, such as in Formula (4)
calculated by formula (1) to weight, which is the (Chen, T., et al., 2014).
adaptive segmentation threshold (Bhandari,
A. K. et al., 2014). ρ θ + y sinθ (4)
439
3. The angle θ is taken as circular reference, Table 2. Average time for two Hough transforms.
respectively statistics the points on a line of dif-
ferent polar radius p in lane image, and they are Time
Methods (ms)
stored in the corresponding cumulative space
Mem (ρ, θ). Basic Hough transform 58.48
4. Carry out the cumulative space search, and Hough transform in this paper 29.37
check out the two larger values of the left and
right lane storage space, converted into lane
marking parameters and recorded.
Table 3. Average time for the algorithm with different
steps.
5 EXPERIMENTAL RESULTS
Average
Methods adopted time (ms)
A night-time lane video image with 720 × 576 pixel
is obtained from the camera, with the speed of 25 Image preprocessing 16.51
frames per second to select 2,000 frames to do the Local adaptive image segmentation 11.19
experiment (Anguita, D. et al., 2012). The experi- Hough transform in this paper 29.37
mental results as shown in Figure 5. Figure 5(a) is
a normal night road mark recognition, Figure 5(b)
is the night after tunnel mark identification,
Figure 5(c) is the night after the bridge mark identi- In engineering applications, real-time perfor-
fication, Figure 5(d) is the night double lines mark mance is an important indicator to measure the
identification, Figure 5(e) is the night road sign overall performance of an algorithm. In order to
interference mark identification, and Figure 5(f) is verify the real-time performance of the detection
the night partial bend mark identification (Tian, T. algorithm, this paper presents the average time of
et al., 2014). the basic Hough transform and the partial search
From the above detection results of the lane Hough transform algorithm in this paper. Table 2
line in all kinds of circumstances, it is known that (Senior, A. et al., 2013) shows the running time of
this algorithm has strong anti-interference ability, steps of the algorithm in this paper.
capable of overcoming the interference of road Experiments took an average of 57.07 ms on
signs at night, capable ofadapting to the complex recognition algorithm on CPU of Intel (R) Core
road conditions, and has a strong recognition (TM) i3–21203.3 GHz (Hazar, M. A. et al., 2015),
performance. achieving the real-time processing speed of 15
frames per second.
6 CONCLUSION
ACKNOWLEDGEMENTS
440
REFERENCES adaptive thresholding. International Journal of Inno-
vative Technology and Exploring Engineering, 3(5).
Anguita, D., Ghio, A., Oneto, L. et al. (2012). Human Juneja, P., Harris, E.J., Kirby, A.M. et al. (2012).
activity recognition on smartphones using a mul- Adaptive breast radiation therapy using mod-
ticlass hardware-friendly support vector machine. eling of tissue mechanics: a breast tissue segmen-
International Workshop on Ambient Assisted Living. tation study. International Journal of Radiation
Springer Berlin Heidelberg, 7657, 216–223. Oncology*Biology*Physics, 84(3), e419-e425.
Bhandari, A.K., Singh, V.K., Kumar, A. et al. (2014) Korzynska, A., Roszkowiak, L., Lopez, C. et al. (2013).
Cuckoo search algorithm and wind driven optimiza- Validation of various adaptive threshold methods of
tion based study of satellite image segmentation for segmentation applied to follicular lymphoma digi-
multilevel thresholding using Kapur’s entropy. Expert tal images stained with 3, 3’-Diaminobenzidine &
Systems with Applications, 41(7), 3538–3560. Haematoxylin. Diagnostic Pathology, 8(1), 1.
Chen, T., Du, Z., and Sun, N. et al. (2014). Diannao: Lara, Ó.D., Pérez, A.J., Labrador, M.A. et al. (2012).
A small-footprint high-throughput accelerator for Centinela: A human activity recognition system based
ubiquitous machine-learning. ACM Sigplan Notices. on acceleration and vital sign data. Pervasive and
ACM, 49(4), 269–284. Mobile Computing, 8(5), 717–729.
Das, A. & Sabut, S.K. (2016). Kernelized fuzzy C-means Manikandan, S., Ramar, K., Iruthayarajan, M.W. et al.
clustering with adaptive thresholding for segment- (2014). Multilevel thresholding for segmentation of
ing liver tumors. Procedia Computer Science, 92, medical brain images using real coded genetic algo-
389–395. rithm. Measurement, 47, 558–568.
Deng, L. & Li, X. (2013). Machine learning paradigms Rahman, M.H. & Islam, M.R. (2013). Segmentation of
for speech recognition: An overview. IEEE Transac- color image using adaptive thresholding and masking
tions on Audio, Speech, and Language Processing, with watershed algorithm. Informatics, Electronics &
21(5), 1060–1089. Vision (ICIEV), 2013 International Conference on.
Hamdi, M.A. (2014). Modified algorithm marker-con- IEEE, (pp. 1–6).
trolled watershed transform for image segmentation Rodtook, A. & Makhanov, S.S. (2013). Multi-feature
based on curvelet threshold. Middle-East Journal of gradient vector flow snakes for adaptive segmentation
Scientific Research, 20(3), 323–327. of the ultrasound images of breast cancer. Journal
Hazar, M.A., Odabaşioğlu, N., Ensari, T. et al. (2015). of Visual Communication and Image Representation,
Evaluation of Machine Learning Algorithms for 24(8), 1414–1430.
Automatic Modulation Recognition. International Schuler, C.J., Burger, H.C., Harmeling, S. et al. (2013). A
Conference on Neural Information Processing, Springer machine learning approach for non-blind image decon-
International Publishing, 208–215. volution. Proceedings of the IEEE Conference on Com-
Iglesias, J.E., Augustinack, J.C., Nguyen, K. et al. puter Vision and Pattern Recognition. (pp. 1067–1074).
(2015). A computational atlas of the hippocampal Senior, A., Heigold, G. & Yang, K. (2013). An empiri-
formation using ex vivo, ultra-high resolution MRI: cal study of learning rates in deep neural networks for
application to adaptive segmentation of in vivo speech recognition. IEEE International Conference on
MRI. Neuroimage, 115, 117–137. Acoustics, Speech and Signal Processing, 6724–6728.
Ju, Z., Zhou, J., Wang, X. et al. (2013) Image segmenta- Tian, T., Sethi, I. & Patel, N. (2014). Traffic sign recog-
tion based on adaptive threshold edge detection and nition using a novel permutation-based local image
mean shift. Software Engineering and Service Sci- feature. International Joint Conference on Neural
ence (ICSESS), 2013 4th IEEE International Confer- Networks,. 947–954.
ence on Software Engineering and Service Science. Wang, F., Li, J., Liu, S. et al. (2014). An improved adaptive
(pp. 385–388). genetic algorithm for image segmentation and vision
Jumb, V., Sohani, M., & Shrivas, A. (2014). Color image alignment used in microelectronic bonding. IEEE/
segmentation using K-means clustering and Otsu’s ASME Transactions on Mechatronics, 19(3), 916–923.
441
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: In order to reduce the difficulty of measuring insulation by the dielectric loss method,
this paper studies the method of measuring the main insulation tanδ under low frequency according to
the structure characteristics of submarine cable. Firstly, the causes, selection and principle of the main
insulation monitoring of submarine cable is introduced. Then a specific embodiment of main insulation
monitoring of submarine cable based on the system low frequency signal is provided.
443
difficult to accurately analyse the sampling. In
comparison, the electrical parameters required
by the dielectric loss method are relatively easy
to obtain. Therefore, the dielectric loss method is
mainly considered for the main insulation moni-
toring of the submarine cable (Phung et al., 2007).
It is feasible to monitor the tanδ value of the main
insulation of the submarine cable by the dielectric
loss method. However, the tanδ can only reflect the
integrity defect of the insulation or the serious local
defect of a small-volume test. It is difficult to use Figure 2. The parallel equivalent circuit.
this method to find the local fault of a submarine
cable for long-distance and large-capacity sub-
marine cables. But it can reflect the overall ageing
tan δ = Icr = ωC1p Rp can be seen from Figure 1
I
of the cable and help to determine the remain-
ing life of the submarine cable. So we can take and Figure 2. The operating voltage is the main
appropriate measures in advance. This paper puts frequency in the operation of the power system
forward an idea to reduce the frequency of the volt- in which the other frequency voltage content is
age signal, so that the capacitive current decreases small, so that the equivalent insulation resistance
and the resistive current is basically unchanged, so and capacitance value of the insulating material is
as to increase the ratio between the resistive current known as the resistance, and the capacitance value
and the capacitive current to facilitate the purpose under the power frequency is not affected by the
of detection (Oyegoke et al., 2007). non-frequency signal. Therefore, the tanδ value of
the insulating material increases with the decrease
of the current and voltage frequency. The meas-
3 PRINCIPLE OF MAIN INSULATION urement principle of ultra-low frequency dielectric
MONITORING loss of submarine cable. The difference is that
when the signal frequency is lower, the tanδ value
The insulation medium under the AC electric measured is greater. The increase of the tanδ value
field has energy loss in its interior due to dielectric is helpful for detecting the resistive current and
conductance, partial discharge, dielectric polari- capacitive current flowing through the insulation,
sation and other reasons. Therefore, the current I and to distinguish the phase difference between
through the medium is not ahead of the voltage current and voltage, so as to reduce the difficulty
π/2 in the application of a sinusoidal voltage V, of field measurement. The phase of the current
but ϕ = π/2 − δ. The equivalent circuit is shown in and voltage is actually measured by the device,
Figure 1. I is the full current, Ic is the capacitive which reduces the difficulty of distinguishing the
current component, and IR is the resistive current phase angle of the current and voltage. This paper
component. The full current vector I deviates at presents a method to detect the main insulation
an angle δ from the capacitive current vector Ic (Ohki et al., 2007).
(Yu et al. 2007).
444
Figure 3. The monitoring logic diagram of submarine cable main insulation.
converted by A/D and sent to the host computer to calculate and deal with. Due to the phase angle
to calculate tanδ. The monitoring logic diagram of calculation of the current and voltage, the digital
the submarine cable main insulation is shown in signal after conversion is required to have high
Figure 3 (M. et al. 2007). precision.
Because the value of tanδ measured at low fre- The communication module: Used to transfer
quency is larger than the value measured at the the data measured at one end to the other end
power frequency, the original tanδ measured at the for unified data processing. It adopts the wireless
power frequency is no longer applicable. A new communication mode or the unused channel of the
ageing failure criterion needs to be established. submarine cable.
Therefore, the tanδ measured at low frequency
should be compared with the historical data.
When the tanδ value changes over a certain range, 5 CONCLUSION
the alarm signal is issued to remind the operating
unit to take oil and other necessary measures for The monitoring of tanδ based on the system
cable. The following units of the main submarine low frequency signal has no precedent in China.
cable insulation monitoring system are included The biggest feature of this scheme is the use of a
(Lei et al. 2007): large-scale system low frequency signal without
The current sampling module: Used to detect the introduction of additional signal sources to
the low frequency current in the ground wire. The avoid changing the system wiring, which ensures
module requires high measuring precision and the safety and reliability of the primary system.
anti-disturbance ability and should be convenient This scheme can achieve the function of long-term
for the spot installation. online monitoring.
The voltage sampling module: The low fre-
quency voltage signal can be obtained from the
output by the system voltage transformer. The REFERENCES
voltage signal acts as the time synchronisation ref-
erence signal measured at both ends of the cable so Bauch, A., Piester, D., Moudrak, A., et al. (2004). Time
that the phase of the voltage is calculated. comparisons between USNO and PTB: A model for
The synchronisation A/D module: In order to the determination of the time offset between GPS
ensure the accuracy of the conversion calcula- time and the future galileo system time. Frequency
tion, the synchronous A/D module must be used Control Symposium and Exposition.
to ensure that the phase of low frequency current Fothergill, J.C., Montanari, G.C., Stevens, G.C., Laurent,
C., Teyssedre, G., Dissado, L.A., Nilsson, U.H.,
and voltage is unchanged after the A/D conversion Platbrood, G. (2003). Electrical, microstructural,
(Fothergill et al., 2007). physical and chemical characterization of HV XLPE
The microcomputer unit: After the phase of low cable peelings for an electrical ageing diagnostic data
frequency current and voltage is unified after A/D base. IEEE Transactions on Dielectrics and Electrical
conversion, it will be sent to the main computer Insulation.
445
Given, M.J., Fouracre, R.A., Gregor, S.J., et al. (2001). IEEE Transactions on, IEEE Transactions on 10(5),
Diagnostic dielectric spectroscopy methods applied 862–873.
to water-treed cable. IEEE Transactions on Dielectrics Phung, B.T., et al. (1999). On-line partial discharge
and Electrical Insulation, 8(6), 917–920. measurement on high voltage power cables. Eleventh
Lei, M., Zeng, J., & Liu, G. (2009). Dynamic simulation International Symposium on High Voltage Engineering.
of running test to long distance 500 kV oil-filled Sasaki, T., & Kurihara, M. (1996). Oil-Filled cable
submarine cable. Proceedings of the 9th International surveillance system using newly developed optical
Conference on Properties and Applications of Dielectric fiber gas sensor. IEEE Transactions on Power Delivery,
Materials. 11(2), 656–662.
Ohki, Y., Yamada, T., & Hirai, N. (2011). Diagnosis of Sharma, C., & Singh, P. (2007). Contribution of loads to
cable ageing by broadband impedance spectroscopy, low frequency oscillations in power system operation
Electrical Insulation and Dielectric Phenomena 2007 irep symposium. Revitalizing Operational
(CEIDP) 2011 Annual Report Conference on. Reliability, 19(24), 1–8.
Oyegoke, B., Hyvonen, P., Aro, et al. (2003). Application Yu, H., & Wang, S.Y. (2008). Study and Application on
of dielectric response measurement on power Cable Duct Gas Online Monitoring System Based on
cable systems. Dielectrics and Electrical Insulation, GPRS, Distribution Equipments.
446
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: Object tracking in multi-camera systems has been widely used in social life, however
object re-identification between cameras is difficult and inefficient. It will improve the efficiency of
object re-identification by applying fast and real-time compressive sensing feature into multi-camera.
Due to the lighting conditions and projection size of an object in different cameras being different, while
a compressive feature is sensitive to the greyscale and size, for the greyscale and size problems, this paper
puts forward the idea of unification. It maps the compressive feature value of the sample frame to the
value of the original frame by the ratio of the average greyscale value and the ratio of the area of two
frames. Experiments show that the algorithm proposed in this paper behaves quickly and accurately in
object re-identification when lighting and object size changed.
447
then combines the compressive features for object greyscale in compressive feature between the origi-
re-identification. It is sensitive to greyscale and nal frame and sampling frame.
size.
2.2 Unification of multiple sizes
2.1 Unification of greyscale
The system reserved a size ratio table, size ratios of
When an object crossed from camera A to cam- the same object in different cameras. It means that
era B, system will call camera B to find the missed if size of object O projected in A camera is Sa, size
object. Due to the differences in environment, of object O projected in camera B is Sb, we save
s
appearances of the same object in different cam- the ratio r = sab in the size ratio table. Based on the
era behave differently. But one thing is invariable, size ratio table, we used 11 different size frames to
that is ratio of the greyscale value between differ- sample with 0.04 step size, it can improve the fault
ent pixels of the same object. Thus, as long as we tolerance and promote the robustness. If original
calculate the average greyscale value of two frames size ratio is r, 11 different size ratio are showed.
to get the greyscale ratio, we can map compressive The size of the random matrix changed with
feature value of the frame B to value of the frame different sampling scales, each element in the com-
B by the average greyscale ratio. pressive feature vector is the grey-scale convolu-
Figure 1 shows that before unification of grey- tion of the random matrix and fixed region of the
scale, the compressive feature vector of the origi- frame. So the compressive feature vector changed
nal frame expressed as Vo = ( v o v o v o v ot ) , with the sampling scales, we should unify the com-
the compressive feature vector of the sampling pressive feature value of the different sampling
frame expressed as Vs ( vs vs vs vst ). Then scale frames. Here we can map the compressive
the average greyscale values lo, ls of the origi- feature value of frame B to the value of frame A by
nal frame and sampling frames respectively are the size ratio according to the size ratio table, then
calculated. it unified the compressive feature of frame B and
compressive feature of frame A.
∑ ∑ ∑
wo ho w hs
Pij Pij As shown in Figure 2, the original frame size in
i =1 j =1
lo = , ls =
i j 1
j=
(1) camera A is wo * ho, the sampling frame size in camera
wo * ho ws * hs B is k2 * wo * ho (k presents the ratio of two cameras
according to the size ratio table). Before unification of
lo
r= (2) multiple sizes, the compressive feature vector of the
ls original frame expressed as Vo = ( v o v o v o … v ot ) ,
the compressive feature vector of sampling frame
After obtaining the ratio r, we can unify the expressed as Vs ( vs vs vs … vst ). We map the
compressive feature vector. compressive feature value of frame B to the value of
frame A by the size ratio.
v ′i = r * vsi (3)
wd * hd 1
K= = (4)
Compressive feature vectors which are mapped k2 * wd * hd k2
are presented as v′s′ = ( ′ ′ ′ … ′ ). After map-
ping operations, we realised the unification of v ′i = K * vsi (5)
448
Table 1. Size ratio table.
1 2 3 4 5 6 7 8 9 10 11
0.80 * r 0.84 * r 0.88 * r 0.92 * r 0.96 * r 1.00 * r 1.04 * r 1.08 * r 1.12 * r 1.16 * r 1.20 * r
449
work and process complexly, they performed worst re-identification when lighting and object size
real-time. HSV showed little better than CS-u and changed.
CS, because compressive sensing requires training
of the positive and negative samples before the
process. S-u is an improvement of CS by the unifi- REFERENCES
cation in greyscale and multiple sizes, it needs more
calculation than CS, so CS-u shows worse than Hamdoun, O., Moutarde, F., Stanciulescu, B., et al.
CS but it is only little. Finally, we can conclude (2008). Person re-identification in multi-camera sys-
that compressive sensing based on unification of tem by signature based on interest point descriptors
greyscale and multiple sizes has great real-time in collected on short video sequences. Proceedings of the
Second ACM/IEEE International Conference on Dis-
object re-identification. tributed Smart Cameras (ICDSC), 1–6.
In summary, in a multi-camera environment, Caihui Li, Qun Zhang, Qiyong Lu (2011). Object track-
compressive sensing based on unification of grey- ing algorithm based on adaptive background infor-
scale and multiple sizes improved the real-time mation. Journal of Terahertz Science and Electronic
on the base of keeping high accuracy in object Information Technology, 9(5), 596–599.
re-identification. Schwartz, W.R., Davis, L.S. (2009). Learning discrimi-
native appearance-based models using partial least
squares, pp. 322–329.
4 CONCLUSION Wang, X., Doretto, G., Sebastian, T., et al. (2007). Shape
and appearance context modeling. IEEE International
Conference on Computer Vision, 1–8.
In this paper, we proposed an object re-identifica- Wang, X., Ma, X., Grimson, E. (2007). Unsupervised
tion algorithm with compressive sensing theory in activity perception by hierarchical Bayesian models.
multi-cameras. Due to the lighting conditions and IEEE Conference on Computer Vision & Pattern Rec-
projection size of an object in different cameras ognition, pp. 1–8.
being different, while compressive feature is sensi- Wang, X. (2013). Intelligent multi-camera video surveil-
tive to the greyscale and size. For the greyscale and lance: A review. Pattern Recognition Letters, 34(1),
size problems, this paper puts forward the idea of 3–19.
unification. It maps the compressive feature value Wu Yutong (2013). Research and application of target
tracking algorithm in multi camera environment.
of the sample frame to the value of the original University of Electronic Science and technology of
frame by the ratio of the average greyscale value China.
and the ratio of the area of two frames. Experi- Zhang, K., Zhang, L., Yang, M.H. (2012). Real-time
ments show that the algorithm proposed in this compressive tracking. Computer Vision—ECCV.
paper behaves quickly and accurately in object Berlin: Springer pp. 864–877.
450
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: Serious lost circulation often occurs with relatively fast lost circulation velocity during
drilling construction in Yingtai Area, Daqing oilfield. The maximum lost circulation velocity may reach
100–120 m3/h. The lost circulation volume is large, and the highest lost circulation volume may reach
1100 m3/well. The main cause of the lost circulation in this area lies in the relatively developed natural
fracture in the Yingtai Area due to its geological structure. As to the characteristics of the lost circulation
in the Yingtai Area, a test on plugging materials was carried out in the laboratory to evaluate six plugging
materials of low-density rubber particles, dander plugging material, 801 plugging material, complex
plugging material, liquid casing plugging material and shielding temporary plugging material. Through
analysis of the effect of six plugging materials for fracture plugging of simulated formation, the plugging
material suitable for the Yingtai Area, Daqing oilfield was found, based on which a field application
was conducted, obtaining a good effect and effectively resolving the lost circulation problem during well
exploration and drilling in this area.
451
3 LABORATORY STUDY ON PLUGGING after stopping fluid discharge, and apply pressure
TECHNOLOGY to 0.69 MPa with a velocity of 0.014 MPa/s, record
the volume V0.69 (ml) of fluid discharged and
In view of the above characteristics of lost circula- observe the minimum pressure that may lead to
tion in the Yingtai Area, an evaluation was made plugging at the same time. Then increase the pres-
of six plugging materials of low-density rubber sure with a velocity of 0.069 MPa/s until it reaches
particles, dander plugging material, 801 plugging 6.9 MPa or until the plugging is damaged and the
material, complex plugging material, liquid casing drilling fluid in the instrument is emptied. Record
plugging material and shielding temporary plug- the volume V6.9 (ml) of the drilling fluid discharged
ging material. and the maximum pressure Prupture (MPa). If plug-
ging is successfully done, maintain this pressure for
10 min and record the final volume of the drilling
3.1 Test instrument
fluid.
The test instrument used is a QD type plugging Dynamic test: stabilise the pressure at 0.69 MPa
material tester produced by Special Instrument first, and then record the volume V0.69 (ml) of
Plant, Qingdao Haixin Optical Communication drilling fluid discharged and the time tplugging(s)
Co., Ltd. This instrument is mainly used to help to realise the plugging. Increase with velocity of
evaluate materials used to re-build circulation, it 0.069 MPa/s to 6.9 MPa or until the plugging is
may effectively simulate various different forma- damaged and the drilling fluid in the instrument is
tions by applying a series of fracture plates and emptied. Record the volume V6.9 (ml) of the drill-
bed layers in different sizes to determine the plug- ing fluid discharged and the maximum pressure
ging effect and the lost circulation volume before Prupture (MPa). If the plugging is successfully done,
plugging formation. The simulated bed particles maintain this pressure for 10 min and record the
used in the instrument are stainless steel beads final volume of drilling fluid.
(Φ14.3 mm and Φ4.39 mm). The simulated for-
mation fracture is a set of fracture plates of 1#–6# 3.4 Test result and analysis
(fracture width: 0.5–5 mm).
The Zwitter-ion drilling fluid used on site was taken
as the basic mud in the test. Six plugging materials
3.2 Test principle were then added for test. The added amount of
plugging material was respectively 8%, 10%, 12%
During the test, the prepared packed bed or selected
and 15%. After the addition of the above plugging
fracture plate were put in the assigned position of
materials the drilling fluid was fully stirred and
the main unit, the prepared plugging fluid was
prepared into plugging slurry, and then an evalua-
poured into the plugging material tank as required.
tion using the static and dynamic tests was carried
The plugging fluid would then be squeezed into the
out separately.
simulated lost circulation channel under pressure
effect. If the plugging material is properly applied, 1. A stainless steel bead bed was adopted to simu-
it will form blocking. continue to apply pressure to late irregular fracture, and the fracture width
the rated pressure of the unit, and it may form the was 0.5 mm–3 mm. Under a pressure of less
bearing capacity of blocking in test. If the plug- than 6.9 MPa, a dynamic and static test was
ging material is improperly applied, the plugging carried out for the six plugging materials. It was
fluid will be wholly squeezed out of the lost circu- discovered in the test that as for large fracture,
lation channel. After the test is done, the simulated a plugging slurry prepared with complex plug-
lost circulation channel is dismantled and the plug- ging material had the optimal plugging effect.
ging condition of the plugging material observed. The test data of the complex plugging material
are shown in Figure 1. As for the small fracture,
the plugging slurry prepared with a fluid casing
3.3 Test method
plugging material had the optimal effect and the
Based on the operation principle of a QD type test data of the liquid casing plugging material
plugging metre, four test methods of static simu- are shown in Figure 2. In this test, the effects
lated bed, static simulated formation fracture, of the static test are better than those of the
dynamic simulated bed and dynamic simulated dynamic test. As for each plugging material, it
formation fracture may be carried out. had a better plugging effect with the increase of
Static test: pour the prepared plugging fluid the added amount.
into the plugging material tank as required. Screw 2. Fracture plates were applied to simulate regular
the tank cap down, open the ball valve, record the fracture with a fracture width of 0.5 mm–5 mm,
volume V0 (ml) of fluid discharged without pres- and a dynamic and static test were carried out
sure applied. Open the pressure source as specified for six plugging materials under a pressure of
452
Figure 1. Added amount of static complex plugging Figure 4. Fracture of static dander plugging material
material versus. Leakage volume. versus. Leakage volume.
4 FIELD APPLICATION
453
low-density rubber particle plugging material ACKNOWLEDGMENTS
and liquid casing plugging material cannot be
used for effective plugging, because the rela- This work is supported by Petro China Innovation
tively small particle size of these four plugging Foundation (2016D-5007-0201).
materials is inappropriate for the fracture width.
The particle size of complex and dander plug-
ging material is appropriate for large fracture REFERENCES
widths, so the two may play the role of effective
plugging. Furthermore, the plugging effect of Longchao, Zhu Jianjun, Xu; Limei, Yan. (2016). Research
complex plugging material is better than that of on congestion elimination method of circuit overload
dander plugging material. and transmission congestion in the internet of things.
2. As for small irregular fracture, except that Multimedia Tools and Applications, 27, June, 1–20.
shielding temporary plugging material and Lv, Kaihe, Qiu, Zhengsong; Song, Yuansen, (2009).
801 plugging material cannot form effective Study on auto-adapting lost circulation curing drilling
plugging, all the remaining four plugging fluid with reservoir protection characteristics in
materials can be applied for effective plugging. drilling process. Yingyong Jichu yu Gongcheng Kexue
Xuebao/Journal of Basic Science and Engineering,
The plugging effect becomes better with the 17(5), October, 683–689.
increase of the added amount. Liquid casing Xu J.J., Gai D., Yan L.M. (2016). A new fault
plugging material and complex plugging identification and diagnosis on pump valves of medical
material have a better plugging effect, and the reciprocating pumps. Basic & Clinical Pharmacology
former one has the optimal plugging effect. & Toxicology, 118(1), pp. 38–38.
3. As for regular fracture, under a pressure of Xu Jianjun, Xu Yan-chao, Yan, Li-me, et al. (2013).
less than 6.9 Mpa, shielding plugging material Research on the method of optimal PMU placement.
and 801 plugging material can only be used International Journal of Online Engineering, 9(7), 24–29.
to effectively plug tiny fractures. Low-density Xu Jian-Jun, Y. Y. Zi., (2013). Numerical modeling
for enhancement of oil recovery via direct current.
active rubber particle plugging material and International Journal of Applied Mathematics and
liquid casing plugging material can only Statistics, 43(13), 318–326.
effectively plug fractures below 3 mm. As Yan Li-mei, Cui Jia, Xu Jian-jun, et al. (2014). Power
for large fractures between 3 mm–5 mm, the system state estimation of quadrature Kalman filter
plugging effect of complex and dander plugging based on PMU/SCADA measurements. Electric
materials is better. Machines and Control, 18(6), 78–84. (In Chinese).
4. It can be discovered through static fracture plate Yan Limei, Zhu Yusong, Xu Jianjun, et al. (2014).
and dynamic fracture plate that the test results Transmission lines modeling method based on
under the static condition are slightly better fractional order calculus theory. Transactions of China
Electrotechnical Society, 29(9), 260–268. (In Chinese).
than that under dynamic condition. Yan Limei, Xie Yibing, Xu Jianjun, et al. (2013).
5. Plugging material selected through tests exerted Improved forward and backward substitution in
a successful plugging role during drilling calculation of power distribution network with
construction in the Yingtai Area, obtaining a distributed generation. Journal of Xi’an Jiaotong
good plugging effect. University, 47(6), 117–123. (In Chinese).
454
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: Destackers are essential equipment in an automated logistics system, however the structure
of traditional destackers is simple. In this paper, we deliver an intelligent destacker with an ARM-based
laser scanner, which improves machine vision technology and makes up for the deficiencies in current
research. First, we introduce the main structure and design of the destacker, including hardware and
software design. The controller section, the drive section and the scanning section are then elaborated.
The key techniques of the technical system, including data acquisition of goods, data analysis, imaging
acquisition, automatic unpacking, are illustrated. The properties and advantages of this technology are
analysed using experiments. Finally, the conclusions drawn from the experimental results are summarised.
New problems and challenges, which are essential in developing more intelligent and precise automatic
equipment, are also discussed.
Keywords: Intelligent destackers; machine vision technology; ARM-based laser scanner; Automatic
unpacking
455
and advanced to ensure a better development of 2. Drive hardware design. Figure 2(a) shows the
the machines. drive isolation circuit: BTN7971 and MOS-
This paper is organised as follows: Section 2 FET are used to drive the motors in order that
describes the main structure and design, including the ARM processor can control the speed of
hardware and software. The process of how the the motors more conveniently. Meanwhile, the
destacker works, especially data acquisition and drive circuit achieves isolated measures of the
analysis is presented in this section. In Section 3, motor-driven by 74 LVC245 chip to prevent
the properties and advantages of the system are ARM processor burnout.
analysed by experiment and compared with tradi- As is shown in Figure 2 (b), the voltage regu-
tional destackers. Finally, the conclusions drawn lator circuit of the source realises 5 V voltage
from the experimental results are summarised regulation by means of an LM2940 chip. 5 V
in Section 4. is used to supply the SCM and other sensor
peripherals. The LM2576 chip provides a 6 V
Figure 1. The main structure and design. Figure 2. The circuit of the motor.
456
Figure 3. The structure of the destacker.
457
PWM. We can use this sensor to scan a one-dimen- I δ Ki ∗100 (7)
sional plane, but it is not enough. Thus, through
the mechanism mentioned above, which can drive Distance _ CtrOut = K + I + D (8)
the sensor to move, we can finish the two-dimen-
sional data acquisition. where δ is the error between the speed of the last
However, RPLIDAR is a 360-degree full-angle acquisition and the speed of the acquisition now,
scanner and we only need data acquisition within Distance_set is the initial set-up distance of the
no more than 120 degrees. To improve this, when goods, Distance is the distance moving now, k
ARM detects the laser head in this range, ARM is is the proportional value, Kp is the proportional
able to control the sensor to slow down the speed constant, D is the differential value, δo is the error
of acquisition. Once beyond this range, it speeds received before, Kd is the differential constant, I
up and discards the data. This can improve the effi- is the sum of the integrate, Ki is the integration
ciency of data acquisition. The data is the distance constant. Distance_CtrOut is the output distance.
from point to surface, and by Equation (3), it is
converted to the distance from plane to plane:
3 EXPERIMENTAL VERIFICATION
_dst = Distance_linear * cos (θ * π /180) (3)
In order to verify the applicability and precision
of the technique proposed in the paper, we accom-
where Direct_dst is the distance from plane to plish the scanning experiment. Table 1 shows the
plane, Distance_linear is the linear distance, θ is results calibrated by the ARM-based laser scanner
the angle at which the sensor turns. and manipulator. The measuring accuracy of the
Next, it is data analysis. Set a distance error destacker is 0.01 mm.
before, and the distance within the error range can The table above clearly demonstrates that the
be regarded as the same distance. Using a breadth proposed technique can achieve the precision
traversal algorithm quickly traverses all the data required by an automated logistics system. Mean-
in order to divide the two-dimensional data into while, the average time of measurement of the pro-
several areas. Then, through the analysis of the posed technique is 90.5 s. Compared to traditional
different areas, ARM can quickly find the area destackers, of which the average time is 58.4 s, our
where the goods are. Finally, ARM can get the destacker is slower than the traditional destacker.
precise position of the goods, such as the shape This needs to be improved.
of the goods and the distance of the goods from For the test, first, we put goods (several plugs)
the height of the manipulator. The advantages in the scanning range and turn on the power. Next,
of the breadth traversal algorithm are that it pro- we connect the host computer with Bluetooth and
cesses data quickly and has obvious data division send instructions. After that, stepping motors con-
(Valtteri Heiskanen et al., 2008; Yang et al., 2014; trol laser scanner moving together for data acquisi-
Song et al., 2011; Jiang, 2011). tion and send analysis to the host computer. Our
The processed data is then sent to the computer grab experiment has two modes.
by Bluetooth. After the data is received by the serial Mode one: The pictures of goods are presented
port, it is passed to the host computer. By setting on the host computer. Meanwhile, ARM controls
different greyscale for different distances, the con- manipulator to grab target goods.
trollers are able to observe the goods clearly.
To grab the goods automatically, we use a PID
algorithm to set up the software of the manipu- Table 1. Results of the scanning experiment.
lator claw. First we set a flag, and through time
Goods Crawl time Traditional
interruption to detect the flag in order to tell ARM spacing by the proposed crawl
that the data processing is completed. Then, the Code (mm) technology (s) time (s)
stepping motor is controlled to reach the specified
location using the PID algorithm. The two steer- 1 135.75 90 58
ing gears mentioned above are ready to control the 2 167.25 87 57
manipulator to unpack the goods. The formulas 3 213.50 92 56
of the position PID algorithm are forecast using 4 203.75 83 59
Equations (4)–(8): 5 189.25 94 62
6 182.50 93 61
δ = Distance _ Set − Distance (4) 7 120.00 95 56
8 148.50 88 57
K δ Kp (5) 9 155.25 94 61
D ( o ) Kd ∗100 (6) 10 232.75 89 57
458
ARM-based laser scanner and manipulator are sim-
plified, and the algorithms of scanning and control-
ling are introduced in the software section. The PWM
algorithm is used to control the stepping motors and
laser scanner. To extract and analyse more accurate
features of goods, the breadth traversal algorithm
is used to automatically grab the goods and locate
them, the PID algorithm is evaluated. Experimental
results show that the proposed algorithms improve
vision technology and are suitable for industrial
applications. With the advantageous features like
“double zero” and high accuracy, they can be widely
utilised in the real world. However future research
first needs to improve and solve problems occurring
in the model, such as lower speed.
ACKNOWLEDGMENTS
REFERENCES
Figure 5. Sample of the image processing.
Chen, B. (2009). Design of data acquisition system based
on ARM Processor. Wuhan University of Science and
Technology, 2009.
Mode two: The pictures are divided into multi- Fang, Z.J., Xia, L., Chen, G.D., et al. (2014). Vision-based
ple regions and numbered by the ARM. The host alignment control for grating tiling in petawatt-class
computer displays all the regions and sends the laser system. IEEE Transactions on Instrumentation
instructions of the number of the target region to and Measurement, 63(6), 1628–1638.
Forsyth, D.A., Ponce, J., Lin, X.Y., et al. (2004). Com-
grab.
puter vision: A modern approach. Beijing: Publishing
Figure 5 shows a simple sample of the image House of Electronics Industry.
after data acquisition and analysis. Hu, Y.M., Du, J., Wu, X.S. et al. (2003). Program realiza-
As we can see, the technique based on ARM- tion of high-speed and high-precision surface mount-
based laser scanner and machine vision just needs ing system based on vision. Computer Integrated
a high-resolution camera. It can work without Manufacturing Systems, 9(9), 760–764.
the projective light source, which means that our Improved method for the feature extraction of laser scan-
destacker can work in place even with black goods ner using genetic clustering. Journal of Systems Engi-
or reflective objects (Song et al., 2011). It is also neering and Electronics, 2, 280–285.
Jiang, Z.H. (2011). Research and design of bulk material
suitable to achieve the goal of “double zero” and
volume measurement system based on laser scanning.
calibrate for use with goods of various sizes or Huazhong University of Science and Technology.
configurations. Kim, C.J., Mayor, J., and Ni, J. (2004). A static model of
chip formation in microscale milling.Transactions of
the ASME, 126(11), 710–718.
4 CONCLUSION Li, J., Xu, C., and Zhu, J. (2014). The application of
CCD and two-dimensional laser scanner in the design
A vision technology about the application of ARM- of pipeline inspection system. Mechanical Design and
based laser scanner in destackers is presented. The Manufacturing, 1, 18–20+24.
technology not only has solved the issue of dam- Li, X.G. and Liu, J.H. (2011). Palletizing robot research
and application actuality, Problem and Countermeas-
aging goods using traditional destackers, but also ure. Packaging Engineering, 2011, 3, 96–102.
improves the efficiency of unpacking. Accord- Liu, X., de Vor, R.E., Kapoor, S.G., et al. The mechan-
ing to the experiment, the destacker needs more ics of machining at the microscale: Assessment of the
time to grab the goods, compared to traditional current state of the science.Transactions of the ASME,
destackers. The combination of the I-shaped slide, 126(11), 666–678.
459
Luo, J., Sun, Y.Q. (2007). Comparison of 51 series micro- dynamic contact angles in microchannel flows. Journal
controllers and ARM processor [J]. Industrial control of Bionic Engineering, 4, 282–290.
computer, 5, pp. 64–66. Vogler, M.P., de Vor, R.E., Kapoor, S.G. (2003).
Song, L.M., Zhang, C.B., Wei, Y.Y., Chen, H.W. (2011). Microstructure-level force prediction model for micro-
Technique for calibration of chassis components milling of multi-phase materials. Transactions of the
based on encoding marks and machine vision metrol- ASME, 125, 202–209.
ogy. Optoelectronics Letters, 1, 61–64. Yang, Z.D., Wang, P., Li, X.H. and Sun, Z.K. (2014).
Valtteri Heiskanen, Kalle Marjanen, and Pasi Kallio. Flexible calibration method for 3D laser scanner
(2008). Machine vision based measurement of system. Transactions of Tianjin University, 1, 27–35.
460
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Jiaqi Cai
Shanghai Jiao Tong University, Shanghai, China
Wenhan Yan
Zhengzhou University, Zhengzhou, China
Jiaming Liu
University of Electronic Science and Technology of China, Chengdu, China
ABSTRACT: The meaning of image quality mainly includes two aspects: the fidelity and the intelligibility
of the image. Image quality directly depends on the optical performance of imaging equipment, image
contrast, instrument noise and other factors. Image quality assessment research, which aims at reasonable
assessments of various aspects of image processing, has become one of the basic technologies of image
information engineering. The two typical models of image degradation are fuzzy and jitter, and the
effectiveness of different algorithms is analysed through the analysis of the existing image defogging.
A referenceless perceptual fog density prediction model has been proposed based on statistics obtained
by Environmental Scenery (SES) and fog responsive arithmetic structures. The projected idea is known
as Fog Responsive Thickness Evaluator (MRTE). The proposed display forecasts the perceivability of a
foggy scene on or after a solitary image that has no reference for comparison with an image that is free
of fog, without reliance on remarkable questions in a scene, deprived of side geological camera data,
deprived of assessing a profundity subordinate broadcast outline, without preparing on human-evaluated
judgments. In this paper, the authors test a few defogging methods and raise a practical design to use SVM
to predict if a defogging method is suitable for a fogging image.
Keywords: Fog; Environmental scenery; Fog; Fog Responsive Thickness Evaluator; Mean Deducted;
Difference Regularized; Multi-Variant Gaussian
461
addition to the transmission function. They pro- ety to happen in the foggy scene. The imperative
posed the dark channel prior to removing haze commitment was made of the dull channel earlier.
from a single input image (He Kaiming, 2011; Sending this requirement conveys more fruitful
He Kaiming, 2013). They estimated the thickness outcomes by refining the underlying transmission
of the haze and used a high-quality depth map outline using a delicate tangling technique; how-
to improve the output. Kratz et al. introduced a ever, delicate tangling is computationally costly,
method that leverages natural statistics of both despite the fact that it can be accelerated utilising
the albedo and depth of the scene (Kratz, 2009; a guided channel (Mittal, 2012; Mittal, 2013). A
Nishino, 2012). The image is modelled with a fac- quick arrangement was fabricated utilising an edge
torial Markov random field where the two vari- protecting middle of middle channel, yet the sepa-
ables are statistically independent latent layers. rated profundity delineate be smooth aside from
Tarel et al. (2009) introduced a fast algorithm to along edges that are incidental with substantial
handle both colour image and gray level images. profundity bounced.
Their algorithm has high processing speed which A Bayesian defogging model was recommended
allows visibility restoration to be applied for real- by a specialist for foreseeing both scene of albedo
time processing applications. alongside the profundities. These profundities
Current perceivability forecast prototypes that depend on the factorial Markov irregular fields
work on a foggy image require either a fog-free (Zhang Qieshi, 2012). Results are satisfying,
image taken in similar scene under various climate yet this strategy creates some dim ancient rari-
conditions to determine perceivability, or recog- ties at locales drawing closer vast profundity.
nised striking articles in a foggy image, for example, The execution of defogging calculations has just
path markings or movement signs to supply sepa- been assessed subjectively because of the nonat-
rate signals. However, achieving enough images is tendance of any fitting perceivability assessment
tedious, and it is hard to locate the most extreme apparatus.
and least level of polarisation amid quick scene Humans are viewed as definitive mediators of
changes (Mitchell, 2010). A programmed technique the quality of visual signs. Hence, in order to get
for fog identification and of estimation of perceiv- the best sign for the defogging, human judgments
ability separation utilising side topographical data are given the highest importance (Groen, 2013).
acquired from a locally available camera have been Human subjective assessments are difficult, tedi-
shown. While this strategy eased the requirement ous, and are not valuable for substantial, remote,
for numerous images, it is still hard to apply due portable information. Such bottlenecks have led
to the fact that making precise three-dimensional the researcher to create target execution assess-
symmetrical prototypes that catch dynamic true ment techniques for defogging calculations. As of
structure is difficult. What is more, this approach late, pick up parameters demonstrating recently
works just under constrained suspicion (Gibson, obvious edges, and the rate of pixels that get to
2013; Bovik, 2013). be dark or white subsequent to defogging (Choi,
As to upgrading images with fog, assorted defog- 2014). Target IQA calculations have additionally
ging models are required. The most punctual meth- been utilised in order to assess the upgraded dif-
odologies use a dull protest subtraction strategy to ferentiate along with the auxiliary deviations that
handle environmental dispersing rectification of are present in the image that is defogged. How-
multispectral information or various images of sim- ever, these correlation strategies necessitate first
ilar scene under various climate conditions. A more an image that is foggy as a kind of perspective to
proficient and alluring methodology is to utilise assess image that is defogged. In addition, present
just a solitary foggy image; in any case, coordinate image quality assessment measurements are for the
expectation of fog thickness from a solitary foggy most part wrong for the submission as it is intended
image is troublesome. In this manner, most defog- in evaluating the bending levels instead of the per-
ging calculations use an extra evaluated profundity ceivability of images that are foggy (Duda, 2012).
delineate a profundity subordinate transmission Henceforth, no-reference and defogging-purposed
guide to enhance perceivability utilizing presump- nonspecific perceivability assessment apparatuses
tions from, for example the air scrambling model. are alluring objectives.
Specialist anticipated scene by boosting neighbour-
hood differentiate while assuming a smooth layer of
air light. However the outcomes had a tendency to 3 CONTRIBUTION
be excessively immersed, making radiance impacts
(Ancuti, 2010). The whole image database was derived from an
The researcher enhanced perceivability by arrangement of source images that reflects sat-
accepting that transmission and surface shad- isfactory assorted qualities in image content.
ing are measurably uncorrelated. This strategy Twenty-nine high determination and excellent
requires considerable shading and luminance vari- shading images were gathered from the Internet.
462
Although it is generally not essential, frequently it black out shading, and moved luminance. To
is appealing towards having the capacity to evalu- assess the execution of MRTE, a study was per-
ate naturally, and lessens fog in a perceptually formed with the students in the universities. By
pleasant way (Bovik, 2010). Towards accomplish- way of effective applications, MRTE can precisely
ing discernment driven exact perceivability expec- assess the execution of defogging calculations by
tation, the authors have built up another model: anticipating related fog thickness in the image
Fog Responsive Thickness Evaluator (MRTE), in that is defogged. These are utilied in developing
view of models of statistic derived from by envi- models that support image defogging and that are
ronmental landscape and haze-aware measurable intended towards improving the perceivability of
elements. As compared to other techniques, the Foggy Images (FI).
proposed method has clear favourable circum- This paper also has contributions as follows.
stances. In particular, MRTE can anticipate per- First, the authors review four classic defogging
ceivability on a foggy scene that has no reference, solutions under common conditions and verify the
without different images that are foggy, with no effectiveness of each method.
reliance on pre-recognised notable questions that Second, the authors raise a practical design,
are present in a scene with fog, deprived of lateral using SVM to predict whether a certain method is
geological data acquired from a locally available useable to defog a given image.
camera, without assessing a profundity subordi-
nate transmission outline, and without preparing
on human-appraised judgments. MRTE just uses 4 IMAGE QUALITY ASSESSMENT
quantifiable deviations from measurable regu-
larities seen on environmental haze free images. Some of the quality assessment along with the
The thicknesses of the fog are related to the fog remarks has been projected. Peak Signal to Noise
aware elements. Two sets of images were consid- Ratio (PSNR) is one of the image quality assess-
ered. The first set of images are said to be foggy ments, where the luminance component alone is
images whereas the second set of images are said considered. Quality assessment such as Sarnoff,
to be fog-free images. Components are obtained Just Noticeable Differences (JND), and Metrix
from dependable space area statistics from an works on colour images. DCTune was originally
environmental view model, and on watched quali- designed for JPEG optimisation. It also works on
ties of foggy images including low difference, colour images. NQM works with luminance only.
Fuzzy S7 also works with luminance only. BSDM
works on colour images as well as multi-scale.
SSIM, IFC, and VIF work with luminance only
(Achanta, 2009).
463
been obtained from environmental fog images and able data from pre-handled images. There are three
fog-free images. Abnormalities are processed utilis- pre-handled images that are considered. Out of
ing separation extent amongst multi-variant Gauss- the three, one image is white adjusted and two are
ian attack of the haze aware elements, acquired complexity upgraded images.
from assessment image against a multi-variant Immersion, related fog thickness, fog mindful
Gaussian model of haze aware elements removed luminance, along with complexity weight maps are
from a set of images that are related to the fog, and connected on the pre-prepared images. The weight
another set of images that are fog-free images. maps are connected with the help of the Laplacian
The portion of the level of the foggy is related multi-scale modification. Figure 2 shows the Input
to the level of fog-free. The proportion technique FI and the result is the images with defogged, as
epitomises measurable components from FI and itemised in the accompanying.
Fog-Free Images (FFI) together, and in this man- The principal pre-handled image is white
ner can foresee perceptual fog thickness over a adjusted to change the environmental version of
more extensive territory than by utilising images at the yield by taking out chromatic throws brought
foggy level alone. on by air shading. The shades-of-dim shading
Fog Mindful Arithmetical Sorts is examined. steadiness procedure is utilised on the grounds that
Having the neighbourhood image patches, the three it was quick and strong.
initial fog mindful measurable are obtained. Fun- The Weight Maps (WM) specifically define the
damental small request measurements of FI & FFI, weight of the furthermost sharp districts present
that are relatedly applicable, separated on or after a in the pre-prepared images. The three WM were
3-D area statistic acquired by environmental land- characterised in light of estimations of immer-
scape model of neighbourhood Mean Deducted, sion, along with saliency. The authors utilise the
Distinction Regularised (M2DR) coefficients. arrangement of target WM. Then they propos
In the presence of environmental FI, the authors the utilisation of another arrangement of related
have established that the change of M2DR coef-
ficients diminishes as haze thickness increments.
The nearby standard deviation is a critical descrip-
tor of basic image data that evaluates neighbour-
hood sharpness. In any case, the perceptual effect
of neighbourhood standard deviation differs with
the nearby mean esteem. Henceforth, the coeffi-
cient of variety,
464
roused fog aware WM. Fog aware WM precisely albedo tends to 0, and they use the minimum value
catches the related perceivability of pre-processed filtering to roughly estimate the propagation func-
images, in this way creating the edges that are clear tion. They also use the propagation function which
on perceivability upgraded images. is refined by image matting algorithm. This refine-
The immersion weight outlines the immersion ment method is essentially a large—scale sparse lin-
pick up between neighbourhood immersion and ear equation used to solve the problem, with a high
the greatest immersion is equivalent to solidarity time complexity and spatial complexity. However,
in hue, saturation and value shading space. The the purpose of introducing α into image matting is
fog thickness weight delineates the additional WM to soften or anti-aliasing the transition regions of
to precisely adjust FI and FFI. Related fog thick- foreground and background, and the media propa-
ness outline one is anticipated utilising MRTE on gation function is the exponential decay factor of
covered patches, and after that a guided channel is scene radiance. Therefore, it is unreasonable to a
connected to diminish clamour. The scope of the use image matting algorithm for the refinement of
denoised haze thickness guide is scaled from 0 to 1. a media propagation function. And in the function
The difference weights outline image points of used, the data item is not important. However, if
interest by appointing advanced weights next to we increase the value of the regular parameter, it is
locales of great angle values. Gaussian weighting easy to create overshoot distortion in the colour at
capacity is tested out to three standard deviations. the edge of the depth-of-field mutation.
Standardised weight NW of number list maps are Kratz et al. (Kratz, 2009; Nishino, 2012) assume
acquired to guarantee that they aggregate to soli- that scene albedo and Depth-Of-field (DOF) are
darity as takes after: statistically independent, and can be modelled
using a regular prior probability. The gradient
NWi = Wi/∑i Wi (2) of the scene albedo is modelled as a heavy-tailed
prior, while the depth-of-field is determined by
where Wi incorporates chrominance weight, the specific scene, modelled basing on the natural
immersion weight, saliency weight, haze thickness scene feature as δ segment constant function or
weight, fog aware luminance weight, differentiate Gaussian smoothing function. By solving a MAP
weight. to estimate the problem, we can estimate the scene
Fattal (2008) assumes that it is a constant albedo albedo and the DOF. This algorithm needs us to
in a local area of an image, and the surface shad- select the DOF prior model according to the spe-
ing is not statistically related to the medium trans- cific image, and use experience to give the param-
mission. He uses independent component analysis eters of the prior model.
to estimate the constant albedo. The algorithm Tarel et al. (2009) propose a fast image de-
is a solution to a nonlinear inverse problem, and hazing algorithm, by assuming the atmospheric
its performance depends greatly on the statistical veil function approximates the maximum in the
properties of input data. It will lead to an unre- feasible region, and the local variation is flat. This
liable estimate that the change of independent algorithm uses the deformation of the median
component being not obvious or lack of colour filter to estimate the atmospheric veil function.
information. However, median filtering is not always a good edge-
He et al. (2011; 2013) assume that in the local preserving filtering method. Therefore, inappro-
area of at least one colour channel, the scene priate parameter settings are prone to halo effects.
465
Figure 4. Solution predicting flowchart.
In addition, the parameters of this algorithm are images were caught by an observation camera. The
difficult to adjust. sizes of the image changed from 450 × 750 pixels
For all these dehazing solutions, it is difficult to (that is 1.5″ to 2.5″) to 1200 × 1800 pixels (that is
predict which method is suitable in a future haze 4″ to 6″).
scene. So the authors also introduce SVM method The test methodology incorporates subjects,
to predict if a certain method is suitable. To build gear and the data about the show. A sum of 20
the SVM samples for predicting, there are ten dif- understudies at the university went to the subjec-
ferent and separate experimenters, to classify the tive study. No fiscal remuneration was given to the
result of each solution, “1” for acceptable and “0” subjects.
for unacceptable. If a result gets more than six in Hardware and show setup wer produced by the
total, the method is considered to be practical for authors. The real-time simulator Matlab was used.
the input fogging image. This simulator takes care of enhancing building
Also, few features of an image are required in and logical issues. The screen was set at a deter-
building SVM: variance, mean, skewness, and mination of high definition, that is 1920 × 1080
kurtosis in all RGB channels. And the defogging pixels. The test images that are considered are
images are separated into two groups according to shown at the focal point of an LED screen for
the previous classification. After using these inputs few moments at their local image determination,
to build the machine, it can be predicted whether a to keep any mutilations because of scaling opera-
method is effective for a given image. tions by means of programming or equipment. No
blunders, (for example, latencies) were experienced
while showing the images. The rest of the zones of
7 EXPERIMENT the show were dark.
466
look oversaturated and contain radiance impacts large, the subjective and target correlation brings
(Tan, Robby T, 2008). Images close to horizons of about.
the scene were paritally defogged, while (R. Fattal, In the next part, the authors use 20 images to
2008) yields darker sky locales. The images test different dehazing methods and three more
defogged by He Kaiming (2011) and Novel Defog- images to test whether the SVM works. The images
ging calculation re-establish more environmental are in two different groups: city images and coun-
hues. Amongst these the defogged images con- try images.
veyed by Novel Defogging calculation uncover all As a defogging solution evaluation, ten inde-
the sharper points of interest. Despite the fact that pendent experimenters are involved to classify each
the technique for single image dehazing by multi- result. They have two choices on each defogging
scale combination accomplishes the best decrease image: “acceptable” means 1 point, and “unac-
of perceptual haze thickness after rebuilding, most ceptable” means 0 points. Then, the total score of
defogged images delivered by that strategy lose a certain result is calculated. If it reaches 6, this
noticeable edges yielding higher estimations of the solution to this specific image is considered useful.
measurements because of oversaturation. By and Based on the classification part, the authors
come to the conclusion that different methods
have different usage. Fattal’s solution works well
in places with many subjects, as buildings, though
it does not always work, performing badly in the
thick fog. Kaiming He’s method works in most
conditions, but the fog is not entirely swept. Kartz’s
method requires choosing parameters appropri-
ately and takes the longest time of the four, but
can be the most accurate under some conditions.
Tarel’s method works fast and recognises the back-
ground and the foreground well, but the image
may generate a fake edge.
The result of evaluation is taken advantage of
to build an effective SVM. This SVM can predict
whether a certain defogging method is suitable
for a given image. The parameters of this SVM
is variance, mean, skewness, and kurtosis of all
Figure 5. Related fog density for various pixel size. channels. After building the machine, three more
467
Figure 7. Different defogging solutions.
testing images are used to verify the effectiveness ers, only one is incorrect amongst twelve predic-
of the machine. Comparing the prediction to the tions (“acceptable” in the prediction is “1” while in
rank given by those ten independent experiment- the actual score is over “6”).
468
9 CONCLUSION AND FUTURE Choi, L. K., You, J. & Bovik, A. C. (2014). Referenceless
ENHANCEMENT perceptual fog density prediction model. IS&T/SPIE
Electronic Imaging (pp. 90140H–90140H). Interna-
The authors have portrayed a forecast model of tional Society for Optics and Photonics.
Duda, R. O., Hart, P. E. & Stork, D. G. (2012). Pattern
perceptual haze thickness called Fog Responsive classification. New York: John Wiley & Sons.
Thickness Evaluator, and a perceptual image Fattal, R. (2008). Single image dehazing ACM
defogging calculation known as Novel Defogging Transactions on Graphics, 27(3), Article ID 72.
calculation; both are in the light of image statistics Gibson, K. B. & Nguyen, T. Q. (2013). A no-reference
acquired by environmental landscape and fog aware perceptual based contrast enhancement metric for
measurable elements. MRTE predicts the level of ocean scenes in fog. IEEE Transactions on Image Pro-
perceivability of a foggy scene from a solitary cessing 22(10), 3982–3993.
image, while Novel Defogging calculates upgrades Groen, I. I. A., Ghebreab, S., Prins, H., Lamme, V. A. F. &
the perceivability of a foggy image with no refer- Scholte, H. S. (2013). From image statistics to scene
gist: evoked neural activity reveals transition from low-
ence data. For example, numerous foggy images level environmental image structure to scene category.
of similar scene, diverse degrees of polarisation, The Journal of Neuroscience, 33(48), 18814–18824.
remarkable questions in the foggy scene, assistant Guo, F., Tang, J. & Cai, Z. (2014). Objective measure-
land data, a profundity subordinate transmission ment for image defogging algorithms. Journal of Cen-
delineate, situated presumptions, and even without tral South University, 21(1), 272–286.
preparing on human-appraised judgments. MRTE He, K., Sun, J. & Tang, X. (2011). Single image haze removal
saw in environmental foggy and haze free images, using dark channel prior. IEEE Transactions on Pattern
just by using quantifiable deviations from measur- Analysis and Machine Intelligence, 33(12), 2341–2353.
able regularities. The authors detailed the model He, K., Sun, J. & Tang, X. (2013). Guided image filtering.
IEEE Transactions on Pattern Analysis and Machine
and the fog aware factual components, and exhib- Intelligence, 35(6), 13971409.
ited how the haze thickness expectations delivered Kopf, J., Neubert, B., Chen, B., Cohen, M., Cohen-Or, D.,
by MRTE associate well with human judgments Deussen, O., Uyttendaele, M. & Lischinski, D. (2008).
of fog thickness taken in a subjective study on an Deep photo: Model-based photograph enhancement
extensive foggy image database. and viewing. ACM Transactions on Graphics 27(5), 116.
As an application, the authors showed that MRTE Kratz, L. & Nishino, K. (2009). Factorizing scene albedo
can be a helpful, using NR apparatus for assessing and depth from a single foggy image. 2009 IEEE 12th
the execution of defogging calculations. Future International Conference on Computer Vision, 1701–1708.
work could include creating equipment inviting var- Mitchell, H. B. (2010). Image fusion: theories, techniques
and applications. Heidelberg: Springer Science & Busi-
iants of Novel Defogging calculation, appropriate ness Media.
for incorporated circuit usage and the advancement Mittal, A., Moorthy, A. K. & Bovik, A. C. (2012). No-
of portable image defogging applications. reference image quality assessment in the spatial
domain. IEEE Transactions on Image Processing,
21(12), 4695–4708.
REFERENCES Mittal, A., R., Soundararajan, R. & Bovik, A. C. (2013).
Making a “completely blind” image quality analyzer.
Achanta, R., Hemami, S., Estrada, F. & Susstrunk, S. IEEE Signal Processing Letters, 20(3), 209–212.
(2009). Frequency-tuned salient region detection. Nishino, K., Kratz, L. & Lombardi, S. (2012). Bayesian
Computer Vision and Pattern Recognition, 2009. IEEE defogging. International Journal of Computer Vision,
Conference on Computer Vision and Pattern Recogni- 98(3), 263–278.
tion, 1597–1604. Saleem, A., Beghdadi, A. & Boashash, B. (2012). Image
Ancuti, C., O., Ancuti, C., Hermans, C. & Bekaert, P. fusion-based contrast enhancement. EURASIP
(2010). A fast semi-inverse approach to detect and Journal on Image and Video Processing, 1(2012):1.
remove the haze from a single image. Asian Conference Tan, R. T. (2008) Visibility in bad weather from a single
on Computer Vision (pp. 501–514). Heidelberg: Springer. image. 2008 IEEE Conference on Computer Vision and
Ancuti, C. O. & Ancuti, C. (2013). Single image dehaz- Pattern Recognition, (pp. 1–8).
ing by multi-scale fusion. IEEE Transactions on Image Tarel, J. & Hautiere, N. (2009). Fast visibility restoration
Processing, 22(8), 3271–3282. from a single color or gray level image. 2009 IEEE
Bovik, A. C. (2010). Perceptual video processing: Seeing 12th International Conference on Computer Vision.
the future [Point of view]. Proceedings of the IEEE, Zhang, Q. & Kamata, S. (2012). Improved optical model
98(11), 1799–1803. based on region segmentation for single image haze
Bovik, A. C. (2013). Automatic prediction of perceptual removal. International Journal of Information and
image and video quality. Proceedings of the IEEE, Electronics Engineering, 2(1), (2012): 62.
101(9), 2008–2024.
469
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: This work-in-progress paper introduces a method for detecting the face and eyes. An
Active Shape Model (ASM) is utilised to identify the driver’s facial features; the AdaBoost cascade
classifier is adopted to classify the Local Binary Pattern (LBP) features of the human eye corners and fit
eyelids by the parabola method and the Sobel edge pupil detection. After a subjective evaluation of a large
number of samples, it is proved that the method of the driver’s face and eye detection and positioning is
efficient and accurate.
471
3 EYE DETECTION AND LOCATION 3.2 Corner detection results
RESULTS
After positioning the face, the eye corner detection
uses the AdaBoost cascade classifier on the corner
3.1 Face detection results
of the eye LBP (Local Binary Pattern, local two
An ASM algorithm based on the point distribu- value model) feature classification (Tang Xumian
tion model is used for the face detection (Cootes et al., 2007). Each layer of the AdaBoost cascade
et al., 2008). The shape of a human face can be classifier is a strong classifier. They form a multi-
expressed as x ( x1, y1 x2 , y2 xn , yn ), where layer classification structure, constitute the classi-
( xi , yi ) represents the coordinates of point i, the fier parameters (Wang Wei et al., 2008), can make
training set contains K samples, and the sample each layer through almost all of eye corner sam-
covariance matrix is: ples, and refuse to a large number of non corner
samples. Thus, in the presence of the corner of the
W ( x − x )( x − x )T (1) eye area to spend more time, reduce the overall
computational time.
x K1 ∑ i =1 xi is the average value of the sample
K
During the training process on the inner and
training set. The eigenvalues and eigenvectors of outer corners of human eyes, a total of 4000 positive
W are: samples and 10000 negative samples were collected,
some of the positive samples as shown in Figure 4.
Wpk = λ k pk (2) Figure 5 shows the results of using a cascade
classifier to locate eye corners.
where λ k is the first k eigenvalue of W pk is the
eigenvector. 3.3 Results of the recognition of pupils
The greater the λ k , the more important it is and eyelids
for the pk . The eigenvalues are sorted by large
Since the contour of the pupil is a circle, we fit
to small, a new principal axis system composed
the contour of the pupil by its centre and radius.
of eigenvectors corresponding to the extracted
According to the characteristics of the human eye,
M eigenvalues is given by P [ p1, p2 pM ],
λ1 λ2 > … > λM .
Any face shape in the subspace of the face set
can be approximated by the average value coupled
with the new coordinate system and weighted sum
of a set of control parameters:
x=x+P b (3)
472
Figure 8. Eyelid fitting optimisation results.
( 0 )2 + ( y y0 )2 = r02 (4)
y = ax 2 + c (5)
473
statistical methods to calculate the parameters of images, and getting the result of optimisation
the upper and lower eyelids parabolic equation of the human eye. Subjective validation shows
a and c. In order to keep the points on the eye- that the rate of face recognition and eyelid fit-
lid contour as much as possible and remove the ting are over 95% and 93%, respectively. In the
redundant points, the gradient images obtained by case of eyes closed and dark light condition, the
the Sobel operator are improved. accuracy rate of pupil identification is more than
The absolute value of the gradient in the X 80%. According to current research results, this
direction and the gradient in the Y direction are method has shown a good detection accuracy,
summed up: and has obtained a certain amount reference val-
ues for further research.
sobelNew (i, j ) sobelx (i j ) + sobely (i j ) (6)
474
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Xuedong Wen
Naval University of Engineering, Wuhan, China
Equipment Mending Office of the Navy in Qingdao Area, Qingdao, China
Guo He
Naval University of Engineering, Wuhan, China
ABSTRACT: In order to solve the problem of Design For Testability (DFT) for a Remote Monitoring
and Alarming System of Marine Diesel Engine Power Plant (RMASMDEPP), a testability modeling
method based on Multi-signal flow graph is studied. After establishing function signal set S, fault pattern
sample set F, test point set TP and executable test set T of each subsystem for the power plant, the Multi-
signal directed graph model of the system can be obtained as well as the “Fault-Test” dependency matrix.
The research results of this paper provide basis for DFT and fault diagnosis of a RMASMDEPP and
some other similar equipment.
Keywords: Ship; Diesel engine power plant; Testability modeling; Multi-signal flow graph model
475
A typical Multi-signal flow graph model mainly 3 MULTI-SIGNAL FLOW GRAPH
consists of the following components: MODELING FOR A RMASMDEPP
1. A finite fault source set of system F = {f1, f2, …, fl}
The system of RMASMDEPP consists of 12 sub-
(l ∈ Z+), which represents the total number of
systems, and the diagram of structure and test
failure modes;
points distribution as shown in Fig. 1. The system
2. A set of functional signal S = {Si1, Si2, …, Sik}
uses the field bus network of CAN, whose struc-
for representing the change of system state;
tural composition is a double layer network. The
3. Available test p point set for np dimension
TP = TP{ P TPP TP }
Pnp , which means a test
point can achieve a number of test functions;
lower layer is used for data acquisition and pro-
cessing, and the upper one is the data transmission
and display network. According to the cabin struc-
4. The n-dimensional executable test set T = {t1, ture, the lower net is also divided into several inde-
t2, …, to} (o ∈ Z+), which represents the total pendent sub networks, which maintain data link
number of available tests of the system assum- with the upper network through each own router.
ing that each test are independent under given
failure mode condition;
5. Test point TPi contains a set of executable test 3.1 Modeling elements analysis for
sets PT (TPi), PT (TPi) ⊆ T; a RMASMDEPP
6. Fault source fi affects a set of signal attribute
variables MS (fi): failure rate λi, Fault criticality In the subsystems of a RMASMDEPP, except
sci, Failure position fli etc., and MS (fi ) ⊆ S; for the monitoring PC which is no need to set test
7. Test tj detect a set of signal attribute variables points because of its created advanced DFT, the
TS (tj): test reliability γj, test cost vj etc., and other 11 subsystems are all potential fault sources.
TS(tj) ⊆ S; Among them, the following parts are prone to
8. Directed graph model: DG = {F, TP, E}. Among failure: five types of sensors, power conversion
them, E is the edge of the directed graph, which module, A/D conversion module, photoelectric
indicates physical connection of the electronic isolation unit, module calibration unit, clock/reset
circuit and the pipeline of system. circuit, CAN control module, router and moni-
toring board etc. In the process of modeling, this
According to the influence range for the system paper chooses 22 kinds of test units, which are easy
function, Multi signal flow graph model has two to produce faults, as the sources of the faults that
kinds of fault type, that is, local fault (short for F) to be tested. And the sources can produce 18 meas-
and global fault (short for G). When local fault ured points, see Figure 1.
occurs, the partial function of the system is abnor- Modeling elements for a RMASMDEPP are as
mal or failure. Or else, global fault occurs. follows:
1. Finite fault source set of the system F = {f1, f2,
2.2 Modeling steps of multi-signal flow …, f22}.
graph model Where: f1: thermal resistive sensor; f2: thermo-
couple sensor; f3: 4∼20 mA current signal sen-
Based on the model definition, the process of test-
sor; f4: on-off quantity sensor; f5: pulse quantity
ability modeling can be divided into three steps:
sensor; f6: high temperature signal output unit;
Step 1. Familiar with the modeling object. That is, f7: power supply module I; f8: power supply
identifies and extracts the relevant infor- module II; f9: indicator light display module; f10:
mation of the test model. Such as system buzzer alarm module; f11 /f12: clock/reset circuit
structure, signal function, and test informa- module III; f13: CAN interface circuit III; f14 /f15:
tion, etc. clock/reset circuit module II; f16: CAN interface
Step 2. Build model. First of all, set up model with circuit I; f17/f18: clock/reset circuit module I; f19 /
system composition as well as node attrib- f20: calibration circuit for signal processing mod-
utes, and add the functional attributes of ule; f21: 24 V voltage conversion circuit module;
the signal. And then, determine input, f22: data conversion circuit.
output and internal links of system units 2. Signal feature set S = {S1, S2, …, S34} generated
according to the function of signal flows. by the fault source set F which cause system
Finally, set test points and related test sets function change.
on the basis of test requirements. S1: mV voltage input signal of thermal resist-
Step 3. Adjust, modify and calibrate the con- ance sensor; S2: drift signal of thermal resist-
structed model, and then generate directed ance sensor; S3: mV voltage input signal of
graph model and fault-test dependency thermocouple sensor; S4: drift signal of thermo-
matrix. couple sensor; S5: 4∼20 mA current input signal;
476
Figure 1. The diagram of structure and test points distribution for RMASMDEPP.
S6: drift signal of 4∼20 mA current input sen- fault. t3: voltage test of thermocouple sensor;
sor; S7: input signal of on-off quantity sensor; detected voltage signal should meet rated range
S8: detection signal of the on-off quantity sen- value of 0∼800°C, and then determine the test
sor; S9: input signal pulse quantity sensor; S10: pass, otherwise as a fault. t4: signal drift test of
drift signal of pulse sensor; S11: output signal thermocouple sensor; signal drift values need to
of mV—temperature; S12: power supply volt- satisfy test requirements, and then determine
age signal I; S13: critical signal of insulation for the test pass, otherwise as a fault. t5: input cur-
power line I; S14: reduced signal of insulation for rent test; the tested current signal should satisfy
power line I; S15: power supply voltage signal II; in the range of 4∼20 mA, and then determine
S16: critical signal of insulation for power line II; the test pass, otherwise as a fault. t6: drift meas-
S17: reduced signal of insulation for power line urement of 4∼20 mA current sensor; signal
II; S18: voltage signal of alarm lamp; S19: current drift values need to satisfy test requirements,
signal for buzzer; S20: frequency signal of clock and then determine the test pass, otherwise as
circuit III; S21: pulse signal of reset circuit III; a fault. t7: voltage test of on-off quantity sen-
S22: data signal of CAN communication III; S23: sor; tested voltage value should meet require-
frequency signal of clock circuit II; S24: pulse ments, which is normally open display ±5 V and
signal of reset circuit II; S25: data signal of CAN normally closed equal 0 V, otherwise determine
communication I; S26: frequency signal of clock it as a fault. t8: test for on-off quantity sensor;
circuit I; S27: pulse signal of reset circuit I; S28: tested voltage signal values need to satisfy test
value of jumper signal for calibration circuit; requirements, and then determine the test pass,
S29: CPU working signal; S30: critical signal of otherwise as a fault. t9: signal test of pulse sen-
insulation for circuit board; S31: reduced signal sor; the pulse signal (voltage VDD, pulse width,
of insulation for circuit board; S32: voltage sig- baud rate) meets with the required range of
nal of 24V conversion power supply; S33: output 0 Hz∼5000 Hz, or convince it as a fault. t10: drift
characteristics of A/D converter; S34: output of measurement of pulse sensor; the drift signal
on-off and pulse quantity signal. needs to meet the test requirements, and then
3. Test set T = {t1, t2, …, t24}, which is capable of determine the test pass, otherwise as a fault.
performing in 24 dimensional. t11: analog voltage signal test; the measurement
t1: input voltage test of thermal resistance analog value satisfy the requirement, and then
sensor; voltage signal to meet the rating of determine the test pass, otherwise as a fault.
0∼250°C requirements, and then determine the t12: power voltage test I; voltage values meet
test pass, otherwise as a fault. t2: drift meas- requirements of the rated input, and then deter-
urement of thermal resistance sensor; the drift mine the test pass, otherwise as a fault. t13: cir-
signal needs to meet the test requirements, and cuit insulation test I; the insulation resistance is
then determine the test pass, otherwise as a not less than 153 kΩ, which is recognized as the
477
test pass. And less than 148 kΩ is determined put and on-off quantity output/pulse quantity
to reduce the insulation. t14: test of power sup- output can meet the requirements, then deter-
ply voltage II; To meet the requirements of the mine the test pass, or otherwise recognize as a
rated input voltage value is passed, or convicted fault.
of failure. t15: circuit insulation test II; The insu- 4. 18 dimensional available test point set TP =
lation resistance is not less than 153 kΩ, which {TP1, TP2, …, TP18};
is recognized as the test pass. And less than 5. The corresponding test set PT(TPi) of each
148 kΩ is determined to reduce the insulation. test point TPi is as follows: PT(TP1) = {t1, t2};
t16: alarming lamp voltage test; work voltage PT(TP2) = {t3, t4}; PT(TP3) = {t5, t6}; PT(TP4)
value is at the rated value, then the test is passed, = {t7, t8}; PT(TP5) = {t9, t10}; PT(TP6) = {t11};
otherwise the sentence is a failure. t17: buzzer PT(TP7) = {t12, t13}; PT(TP8) = {t14, t15};
current test; 4∼20 mA current signal meet the PT(TP9) = {t16}; PT(TP10) = {t17}; PT(TP11) =
rating requirements, and then the test is passed, {t18, t19}; PT(TP12) = {t20}; PT(TP13) = {t21, t22};
otherwise the sentence as a failure. t18: crystal PT(TP14) = {t23}; PT(TP15) = {t24, t25}; PT(TP16)
oscillator circuit characteristic test III; the oscil- = {t26, t27}; PT(TP17) = {t28, t29}; PT(TP18) = {t30}.
lator frequency meets the rated value, then the 6. The set of FS(fi) corresponding to the 17 mod-
test is passed, or otherwise the test failed. t19: ule fi signal is as follows: FS(f1) = {S1}; FS(f2) =
Reset circuit characteristic test III; when turn {S2}; FS(f3) = {S3}; FS(f4) = {S4}; FS(f5) = {S5};
on or turn off the power, the reset pulse is an FS(f6) = {S6}; FS(f7) = {S7, S8}; FS(f8) = {S9, S10};
ideal square wave, or otherwise the reset cir- FS(f9) = {S11, S12}; FS(f10) = {S13, S14}; FS(f11)
cuit is faulty. t20: communication data test III; = {S15}; FS(f12) = {S16, S17}; FS(f13) = {S18};
the communication data signal is in conform- FS(f14) = {S19, S20}; FS(f15) = {S21 }; FS(f16) =
ity with the standard communication data, then {S22, S23}; FS(f17) = {S24, S25}; FS(f18) = {S26}.
the test is passed, or otherwise the test failed. t21: 7. The functional signal set TS(tj) that each test tj
crystal oscillator circuit characteristic test II; the capable of detecting is listed as follows: TS(t1)
oscillator frequency meets the rated value, then = {S1}; TS(t2) = {S2}; TS(t3) = {S3}; TS(t4) =
the test is passed, or otherwise the test failed. t22: {S4}; TS(t5) = {S5}; TS(t6) = {S6}; TS(t7) =
Reset circuit characteristic test II; when turn on {S7}; TS(t8) = {S8}; TS(t9) = {S9}; TS(t10) =
or turn off the power, the reset pulse is an ideal {S10}; TS(t11) = {S11}; TS(t12) = {S12}; TS(t13) =
square wave, or otherwise the reset circuit is {S13, S14}; TS(t14) = {S15}; TS(t15) = {S16, S17};
faulty. t23: communication data test I; the com- TS(t16) = {S18}; TS(t17) = {S19}; TS(t18) = {S20};
munication data signal is in conformity with the TS(t19) = {S21}; TS(t20) = {S22}; TS(t21) = {S23};
standard communication data, then the test is TS(t22) = {S24}; TS(t23) = {S25}; TS(t24) = {S26};
passed, or otherwise the test failed. t24: crystal TS(t25) = {S27}; TS(t26) = {S28}; TS(t27) = {S29};
oscillator circuit characteristic test I; the oscilla- TS(t28) = {S25, S31}; TS(t29) = {S32}; TS(t30) =
tor frequency meets the rated value, then the test {S33, S34}.
is passed, or otherwise the test failed. t25: Reset 8. According to the above mentioned parameters,
circuit characteristic test I; when turn on or turn combine the modeling elements and their cor-
off the power, the reset pulse is an ideal square responding relations can lead to the directed
wave, or otherwise the reset circuit is faulty. graph DG = {F, TP, E} of Multi-signal flow
t26: test of characteristic value for calibration graph model, see Figure 2.
circuit; characteristic value of digital circuit Figure 2 shows the dependence between the test
meets the established requirements value, then points and the fault sources. It can be seen from the
the test is passed, or otherwise the test failed. t27: flow direction of the function signal that each test
test for CPU working status; If read permission point of the set can detect all of the fault sources
signal can meet the jumper clock signal require- corresponding to the point.
ment, the test is passed, or otherwise identify it
as fault. t28: circuit insulation test; The insula- 3.2 Fault-test dependency matrix based
tion resistance is not less than 153 kΩ, which on multi-signal flow graph model
is recognized as the test pass. And less than
148 kΩ is determined to reduce the insulation. In this system, the fault source which may occur
t29: voltage test of voltage conversion module; with G type fault can be listed as follows: f4, f11, f12,
DC/DC parameters meet the requirements of f13, f14, f15, f16, f17, f18, f19, f20, f22. Possible fault sources
the rated output range, then the test is passed, for the F type fault are listed as follows: f6, f9, f10.
or otherwise the test failed. t30: test of input/out- The fault sources which are likely to occur in the G
put signal characteristic; If characteristics value type fault as well as the F type fault can be listed
of gating channel input, A/D conversion out- as follows: f1, f2, f3, f5, f7, f8, f21. After analyzing on
478
Figure 2. The directed graph of multi-signal flow graph model for a RMASMDEPP.
t1 t2 t3 t4 t5 t6 t7 t8 t9 t10 t11 t12 t13 t14 t15 t16 t17 t18 t19 t20 t21 t22 t23 t24 t25 t26 t27 t28 t29 t30
f1(G) 1 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 1 0 0 0 0 0 0 1
f1(F) 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
f2(G) 0 0 1 1 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 1 0 0 0 0 0 0 1
f2(F) 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
f3(G) 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 1 0 0 0 0 0 0 1
f3(F) 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
f4(G) 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 1 0 0 1 0 0 0 0 0 0 1
f5(G) 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 1 0 0 1 0 0 0 0 0 0 1
f5(F) 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
f6(F) 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
f7(G) 0 0 0 0 0 0 0 0 0 0 1 1 1 0 0 0 0 0 0 1 1 1 1 0 0 0 0 0 0 0
f7(F) 0 0 0 0 0 0 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
f8(G) 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0
f8(F) 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
f9(F) 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0
f10(F) 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0
f11(G) 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0 0 0
f12(G) 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0
f13(G) 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0
f14(G) 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0
f15(G) 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0
f16(G) 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 1 0 0 0 0 0 0 0
f17(G) 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 1 1 0 0 0 0 0 1
f18(G) 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 1 0 1 0 0 0 0 1
f19(G) 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 1 0 0 1 0 0 0 1
f20(G) 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 1 0 0 0 1 0 0 1
f21(G) 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 1 1 1 1 1 1 1 1
f21(F) 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0
f22(G) 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 1 0 0 0 0 0 0 1
479
ity modeling method using Multi-signal flow graph Integrated Circuits and Signal Processing 75(3):
model has been studied. On the basis of the com- 491–498.
prehensive study for the unit structure, modeling Oborski P. 2014. Developments in Integration of
elements and test sets of the system, the structure- Advanced Monitoring Systems. The international
Journal of Advanced Manufacturing Technology
function model of the system is transformed into 75(9): 1613–1632.
the testability directed graph model, and then a Su Y. D. et al. 2011. Missile testability requirement
“fault test” dependency matrix is obtained which analysis and index determination oriented to mis-
can be used to optimize the selection of test sets. sion. Journal of National University of Defense
The research results of this paper provide a techni- Technology 33(2): 125–129.
cal reference for the test model of similar equip- Wen X. d. et al. 2016. Research on method of modeling
ment, which is conducive to further in-depth complex electro-mechanical system for testability
analysis of the connotation of DFT and improve- based on contract index. Journal of naval university
ment measures for equipment’s testability. of engineering 24(4): 54–58.
Zhang S.G. et al. 2013. Optimal selection of imperfect
tests for fault detection and isolation. IEEE
REFERENCES Transactions on Systems Man and Cybernetics:
Systems 13(6): 1370–1384.
Zhang X.S. et al. 2015. Hierarchical hybrid testability
Deb S. & Pattipatik R. 1995. Multi-signal flow graphs:
modeling and evaluation method based on
a novel approach for system testability analysis and
information fusion. Journal of Systems Engineering
fault diagnosis. IEEE Aerospace and Electronic
and Electronics 26(3): 523–532.
Magazine 10(5): 14–25.
Lei H.J. & Qin K.Y. 2013. Quantum-inspired evolutionary
algorithm for analog test point selection. Analog
480
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: In recent years, the melting ice flood situation of the Yellow River was grim due to the
influence of extreme weather. Therefore, ice flood prevention work become very important. Flood control
departments could obtain real-time video streams about the Yellow River’s ice through remote video
surveillance systems. On this basis, by using target tracking technology and subsequent video measure-
ment technology, they could get the parameter of the ice velocity, which is needed by the ice flood hazard
prediction model for early warning. However, this paper found that there would be a phenomenon of false
targets and loss targets in the practical application by using the traditional methods of target detection
and tracking. Also it would directly impact on the calculation precision of the ice velocity. The reasons for
this problem are the characteristics of the Yellow River ice images as well as the problems of lost frames
in the process of remote wireless video streaming transmission. This article considers that introducing the
pyramid structure of the L-K optical flow method, which is based on a strong angular point feature point
set, can solve this problem. This article further verifies the effectiveness and robustness of the algorithm
through experiments.
Keywords: Ice velocity; The Yellow River; Image recognition; Target tracking
481
of the river ice and the water on the image is based tracking, model tracking and feature-based
indistinguishable. tracking.
2. Yellow River ice has characteristic of various Based on the analysis for this paper of the
type, shape with no regularity, and easy to keep characteristics of the wireless video stream of the
out each other. When ice target collisions pro- Yellow River ice image, the former three kinds of
duce deformation, we cannot advance to shape tracking algorithms are not applicable. This paper
modelling. argues that algorithms that are based on the char-
3. The Yellow River ice target shows, for the most acteristics of strong angular point set tracking
part, a weak target form. A lot of ice is in the have good distinguishing features, invariance of
form of an ice ball, which is concealed in the translation and rotation and scale change. In addi-
water. People could not rely on their edge infor- tion, the feature point set can be obtained quickly.
mation or grey information to extract intact ice So the algorithm is an ideal ice tracking algorithm.
targets.
4. Due to all the surveillance cameras being
4 L-K PYRAMID OPTICAL FLOW
arranged in the wild, and easily affected by local
METHOD BASED ON STRONG CORNER
climate conditions, such as strong winds, there-
FEATURE POINT SET
fore the ice images will appear to have an obvi-
ous shake, which is not conducive to sustained
4.1 L-K optical flow computation
and stable tracking.
5. The video streams about the Yellow River ice The Lucas-Kanade algorithm (hereinafter referred
image will inevitably be affected by lost frame to as L-K) is one of the main algorithms of the
phenomenon in the remote wireless transmis- sparse optical flow method. Sparse optical flow
sion process. The above phenomenon will cause method calculating just interested in points (fea-
ice targets to appear inconsistent, a phenom- ture points) around the small window are avail-
enon of large-scale motion in the images. able on the local information of optical flow value,
thereby reducing the time cost in the process of
calculation.
3 MOVING TARGET DETECTION AND The L-K algorithm, which is based on local
TRACKING ALGORITHM ANALYSED smoothing, is more efficient. This algorithm avoids
the fuzzy phenomenon of object borders, which is
In terms of moving target detection, the relatively caused by optical flow smooth in the global. How-
mature motion target detection method includes ever, the L-K algorithm is based on the continu-
the background difference method, the frame ous time or movement that is “a little movement”
difference method and the optical flow method. on the premise of this assumption, namely time
The background difference method is applicable relative to the percentage of target motion in the
to a fixed or not easily changed background of image is small enough, and this goal in the inter-
the application. Due to the background being a frame motion is small, so for this project to study
changeable river, in this paper using this method the ice quickly without a coherent movement tar-
is not suitable. get happening, simply using the L-K optical flow
The continuous inter-frame difference method method for target tracking of the actual effect is
algorithm is simple, easy to implement, and has not good.
better adaptability with a dynamic environment. Based on the above reasons, this paper argues
But in the inter-frame difference method obtained, that the image pyramid algorithm could effectively
the feature point set is not the most appropri- solve the problems. If the traditional optical flow
ate tracking feature point set for the application method cannot track large movement in the high
of this paper. Through comparative experiments, resolution image layer, it will need the image pyra-
this paper argues that the strong corner feature mid to find a suitable low resolution image layer,
point set with ice target tracking effect is signifi- and compute optical flow, then map the light flow
cantly better than that of the interframe difference into the original image to realise the optical flow
method. computation for the larger movement.
The optical flow method does not need to pre-
dict any movement information in the scene. It may
4.2 Obtain strong corner feature point set
be applicable to the paper application.
In terms of the tracking algorithm, based on the This paper chose strong angular points as fea-
expression of moving targets and similarity meas- ture points. A strong angular point is a point of
ure, the target tracking algorithm can be divided brightness that can change the sharp or edge
into four categories: active contour tracking, region- of the maximum curvature point on the curve.
482
The angular point is located in the place with the ∇I = (Ix, Iy) for image gradient at point M,
two maximum eigenvalues of the second derivative VM = (u, v) is at point M’s optical flow. This type
autocorrelation matrix in the image, proving that is called the optical flow constraint equation, after
there are around this point as the centre of the the extraction of the strong angular point, based
edge, at least two different directions (or textures), on the L-K method to calculate light flow.
so the problem of effective selection of the angular
point is converted to the algebra problems about
calculating and selecting larger eigenvalues at cor- 4.4 The construction of image pyramid
responding points in the image matrix. The paper The Yellow River ice images are based on the
algorithm steps to obtain feature points are as remote for 3 g wireless transmission, thus inevi-
follows: tably appear to have the lost frame phenomenon,
1. Calculate the second derivative autocorrelation which results in the phenomenon of the incoherent
matrix about the neighbourhood of the input large-scale movement under the condition of high
image pixel, namely image I (x, y) of the two- resolution target images. This phenomenon will
dimensional Hessian matrix is: not be able to meet the requirements of the L-K
method of optical flow constraint equation.
⎡ ∂2 I ∂2 I ⎤ In order to solve the problems, this article adds
⎢ ∂x 2 the image pyramid model to the L-K optical flow
∂x ∂y ⎥
H(p) = ⎢ 2 ⎥ (1) method, based on the multi-scale map layered pyr-
⎢ ∂I ∂2 I ⎥ amid structure and optical flow transformation for
⎣⎢ ∂x∂y ∂y 2 ⎦⎥ optical flow tracing.
Pyramid structure is a kind of computer vision
And then calculate the two corresponding char- multi-resolution representation, a different resolu-
acteristic values of the matrix. tion pyramid layer can parse out the different scales
2. Keep the local maximum of the neighbour- of the target. At the same time, the low resolution
hood. This pater puts some smaller eigenvalue of the high-level (coarse scale) information can
to compare with the threshold for selecting fea- also be used to guide the high resolution analysis
ture points. If the characteristic value is greater of low-rise (fine scale). This article uses the image
than the threshold, it is considered a strong pyramid structure; the current layer is lower after
angular point, otherwise ruled it out. smoothing down sampling results, and the origi-
3. In order to improve the stability and real-time nal image layer number is zero. When the image
performance of the algorithm, this paper can layer gets to a certain level, the target’s displace-
use distance measure to eliminate some angu- ment between the two frame quantities is small
lar points at close range to ensure the selected enough and can satisfy the constraint conditions
points for keeping sufficient distance. of the optical flow computation, which is used to
estimate optical flow.
4.3 The calculation of optical flow
5 THE TEST RESULTS AND ANALYSIS
After the extraction of the strong angular point,
mark the angular point position in the image
In this tracking test, using the inter-frame differ-
sequence. By calculating the displacement of the
ence method and the proposed based on strong
feature points between two adjacent frames, get
corner feature point set of L-K optical flow
the movement of the optical flow field. Assume
method to the same video data have been car-
that point M, whose grey value was I, in the
ried out. The video data were captured from Cao
image, at time t, and its grey value changes slowly
Jiawan monitoring stations in Inner Mongolia
with x, y, t, could get the basic equation of opti-
within reach of the Yellow River, the video data
cal flow:
is affected by strong winds and produced obvious
I x u + I y v + It = 0 (2) shaking. The background of the targets changed
rapidly. For Matlab2010a test environment, the
u = dx system hardware is i5 processor, 4 GB memory,
dt , v = dt on behalf of optical flow with
dy
direction of x, y, I x = ∂∂xI , I y = ∂∂yI , It = ∂∂It represent the operating system is Windows 7. The test results
the partial derivatives about image grey level for are shown in Figure 1 and Figure 2:
x, y, t. Its vector form is: From Figure 2, we found that using the inter-
frame difference method tracking feature point
∇ ⋅ v M + It = 0 (3) sets successfully in the absolute number is more
than the number of feature point sets by using the
483
accurate and stable. The above factors would have
no impact on the tracking result.
6 CONCLUSION
484
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
The on-line fault diagnosis technique for the radar system based on
one-class support vector machine and fuzzy expert system theory
ABSTRACT: A joint on-line fault diagnosis method based on the one-class Support Vector Machine
(SVM) and the fuzzy expert system theory was proposed. To the measured data during the on-line
faulty diagnosing, first a one-class SVM is applied to judge whether the device is faulty. Then the fuzzy
expert system is applied to reason and accurately locate the fault. The result from the conventional fault
diagnosing for certain radar indicates that the proposed method has a diagnosis accuracy higher than
90%. The new method has a high fault location accuracy and real-time processing capability, and improves
on-line fault diagnosis capabilities.
Keywords: On-line fault diagnosis; SVM; Fuzzy expert system; Location accuracy
485
the fault will be accurately located by the method
for a fuzzy expert system. Finally, the disabled
work-unit will be repaired or replaced.
486
sign Pi, and it shows the contribution of Pi to the 2. When m rules with the same conclusion are
whole system fault. ui also obeys the relationship: activated, the total confidence of the rules is
calculated as follows. All the m rules have the
n
same conclusion, that is:
∑u i 1 a d ui ≥ 0 (2)
i =1
u11 * P11 ∧ u12 * P12 ∧ ∧ u1nn * P1n Q(CF
CF1, 1 )
Maybe kinds of faults share one fault sign, so
the value of ui is different from the faults; that um * Pm1 ∧ um * Pm 2 ∧ ∧ umn * Pmn mn Q(CFm , m )
is, the more contribution, the larger the weight
coefficient. The fuzzy conclusion of the rule (6)
which always points to the fault, is indicated by Q. The premise feature Pji has the confidence
The confidence of the rule is CF and CF ∈ [0,1]. βji and the weight coefficient uji. There are
α stands for the threshold value. When the confi- i 1, 2, …, n; j 1 2 m. If the entire σj is
dence of the fault sign, σ, is larger than α, then this larger than the applied threshold αj indicated by
corresponding rule will be activated. Equation 7, we can obtain the total confidence β
As the key point during all the fuzzy reason- of all the rules’ conclusions by Equations 8–10.
ing process, there are many ways to calculate the
confidence, such as the forward and the backward n
⎫
reasoning (Pan J. Y., 1998). In the following part,
σ1 ∑ 1i β1i ≥ α1 ⎪
taking the generation of fuzzy rules in the fault
i =1
⎪⎪
diagnosis expert system of the radar system as ⎬ (7)
the example, the calculation process of forward- n ⎪
reasoning is discussed (Li W., 2008). σm ∑i =1
mi β mi ≥ α m ⎪
⎪⎭
The confidence calculation algorithm for the
m
forward fuzzy reasoning involves the following two
aspects:
β ∑
j =1
j σj (8)
487
on Computer Vision and Pattern Recognition Shen C. & Lu C. (2007). A voltage sag index considering
(pp. 983–990). compatibility between equipment and supply. IEEE
Pan J.Y. (1998). Fuzzy shell: A large-scale expert Transactions on Power Delivery, 22 (2), 996–1002.
system shell using fuzzy logic for uncertainty rea- Wang, X. (2015). Improved LS-SVM based radar fault
soning. IEEE Transactions on Fuzzy Systems, 6(4), diagnosis technology. Fire Control and Command
563–581. Control, I(2), 63–65 (In Chinese).
Sun F. (2014). Design of the fault diagnosis expert sys- W, L. (2008). Fuzzy models of overhead power line
tem for a certain type of radar system. Modern Radar, weather-related outages. IEEE Transactions on Power
36 (9), 74–78 (In Chinese). System, 23(3), 1529–1531.
488
Applied and computational mathematics, methods,
algorithms and optimization
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: Reliability is an important indicator for measuring the anti-pinch function of the power
window. Under circumstances such as pit roads, pulse width of the Hall signal is disturbed and the pulse
width curve can generate spike noise. Considering the noise, a high reliability anti-pinch algorithm based
on approximate integral is proposed. Firstly, the position of the approximate integral of the Hall signal
pulse width curve is determined and then the curve is approximately integrated. Finally the integral area
and threshold are compared; most of the spike noise can be filtered out, improving the correctness of
judgement as to whether to prevent the clip. Using MATLAB to establish the simulation model of the
power window, the simulation results show that this algorithm has much more reliability.
Keywords: Electric glass elevator; Anti-pinch control system; Hall signal; Gauss filter; Integration
method
491
Hall sensor, the Hall sensor exports a Hall signal 2.2 Power window mechanical transmission
pulse. This Hall sensor exports two Hall signals.
The research object of this anti-pinch algorithm
In the process of rising, window glass encounters
is a rope-wheel electric glass elevator. Through the
resistance and the rate of rise decreases. Through
turbo-worm mechanism, the DC motor output
the mechanical transmission structure, the DC
shaft will transfer torque to the reel. The motor out-
motor output shaft speed decreases, which causes
put shaft and the worm shaft are coaxial. The reel
the Hall signal pulse width to increase. Therefore,
and the turbine are coaxial. The reel is driven by the
the encountered resistance of the window glass can
wire rope to raise and lower the window glass.
be indirectly estimated by analysing the Hall signal
The force balance equation of the transmission
pulse width.
system is:
2.1 State space model of motor torque ⎧ D
⎪( ) = TL K
Window motors are generally two-phase brush DC ⎨ f
2 (7)
motors. The DC motor voltage balance equation is ⎩⎪F K N Δx
as follows:
where m is the window glass quality, g is the accel-
⎡ a ⎤ ⎡Ra 0 ⎤ ⎡ia ⎤ ⎡ La Lab ⎤ ⎡ia ⎤ ⎡ea ⎤ eration of gravity, Ff is the friction of the window
⎢⎣ub ⎥⎦ = ⎢⎣0 Rb ⎥⎦ ⎢⎣ib ⎥⎦ + ⎢⎣ Lba Lb ⎥⎦ P ⎢⎣ib ⎥⎦ + ⎢⎣eb ⎥⎦ (1) glass, F is the obstacle clamping force, KN is the
stiffness of the obstacle, Δx is the deformation of
the obstacle, D is the diameter of the roll, and K
where ua, ub is the phase voltage; Ra, Rb is the phase is the worm gearing ratio. Motor angular velocity
resistance; ia, ib is the phase current; La, Lb is the takes the following form:
coil self-inductance; Lba, Lab is the coil mutual
inductance; P is the differential operator; and ea, eb 2π
is the back electromotive force. w= (8)
Pwd
According to the symmetry of the motor
structure: where P is the number of Holzer signals generated
{
by each motor rotation, and wd is the Hall signal
La Lb = L ; Lab = Lba M pulse width.
(2)
Ra Rb = R ; ia + ib = 0 Worm gear tooth number is Z1, turbine tooth
number is Z2, and transmission ratio is K = Z2/Z1.
the DC motor voltage balance equation can be The turbine and reel are coaxial so that the two
reduced to: angular velocity is consistent. Turbine diameter is
D1, and the diameter of the roll is D. The window
⎡ua ⎤ ⎡R 0 ⎤ ⎡ia ⎤ ⎡ L M 0 ⎤ ⎡ia ⎤ ⎡ea ⎤ lift distance corresponding to each Holzer signal
⎢⎣ub ⎥⎦ = ⎢⎣0 R ⎥⎦ ⎢⎣ib ⎥⎦ + ⎢⎣0 L M ⎥⎦ P ⎢⎣ib ⎥⎦ + ⎢⎣eb ⎥⎦ (3) takes the following form:
Z1 D2 π D
The motor torque equation is: d= = (9)
Z2 P PK
Pe ⎡ e 0 ⎤ ⎡i ⎤
Te = ; Pe = ⎢ a ⎥ ⎢ a ⎥ (4) Accordingly, the window position can be deter-
w ⎣0 eb ⎦ ⎣ib ⎦
mined by the number of statistics of the Holzer
where w is motor angular speed? The coil motion signal. d is about 0.43 mm, according to the
equation is: calculation using practical parameters, as shown in
Table 1. The calculated window position accuracy
dw
Te TL + Bw + J (5) Table 1. Actual parameters of a power window.
dt
Mechanical part
where B is the coil damping coefficient. Motor parameters parameters
It is assumed that the motor speed changes very
slowly so that the relationship between the elec- ea 12 V m 5.3 Kg
tromagnetic torque of the DC motor, Te, and the ia 2.4 A g 9.8 m/s2
resistance torque of the motor, TL, can be simpli- eb 12 V Ff 5.2 N
fied as: ib 2.4 A KN 10 N/mm
P 1 K 11
Te TL + Bw (6) D 0.054 mm
492
has met the requirements of this anti-pinch of the electric vehicle window and within the area
algorithm. 4–200 mm to the top of the window. According to
Equation (9), the electric car window area for the
pinch is the area below the top of the electric vehi-
2.3 Relationship between Hall pulse width
cle window and within the area 9–465 Hall signal
and obstacle deformation
pulses to the top of the window.
According to the 74/60/EEC and MVSS18 regula-
tions, barrier clamping force cannot exceeding 100 N
3.2 Selection of integral start position
and barrier stiffness is (10 + 0.5) n/mm when measur-
ing window anti-pinch function. Obstacle deforma- When obstacles are encountered during automatic
tion is positively correlated with Holzer pulse width. ascent, motion of the window glass slows down
Assuming that the car body does not vibrate ideally, and the Hall pulse width increases, which shows a
the window encounters obstacles during rising. Tak- slope rising edge on the Hall pulse width curve, as
ing the formulae from Equations (4), (6), (7), and (8), shown in Figure 2.
the relationship between Hall pulse width and obsta- The position of integration is determined by
cle deformation takes the following form: the difference method. The sum of the first five
Hall pulse widths and the next five are first found
Cwd2 − Awd − E Δx (10) respectively, and then the difference between these
calculated.
where C, A, and E are the two term coefficients,
10 5
first order coefficients and constant terms on the
left side of the formula, respectively:
Δwd ∑w
n=6
dn − ∑ wdn
n 1
n=
(13)
T
4K π
T
KP ⎡ea ⎤ ⎡ia ⎤ 1 ⎡m ⎤ ⎡ g ⎤ When the sum of the Hall pulse width exceeds a
C= A= E=
K N ⎢⎣ eb ⎥⎦ ⎢⎣ib ⎥⎦
DK K N ⎢⎣ F f ⎥⎦ ⎢⎣1 ⎥⎦ DPK N certain threshold, Δw0, the first Hall signal of the
next five is set as the start position of integration.
Without obstacles, the power window Hall sig-
nal pulse width is about 42 ms. Bringing the param- Δwd Δw0 (14)
eters in Table 1 into Equation (10), it is clear that
the values of the two term and the constant term
on the left side of Equation (10) are one order of 3.3 Calculation of integral area
magnitude higher than the value of the first term, In the uniform rising stage of an electric vehicle
so the linear term can be ignored in Equation (10). window, the Hall signal pulse width curve basically
The relationship between Hall pulse width remains unchanged.
and obstacle deformation can be simplified as In the obstacle holding stage of the power win-
followed: dow, the Hall signal pulse width curve rises signifi-
cantly. When the difference (Δwd) of the Hall pulse
Cwd2 − E Δx (11) width exceeds a certain threshold (Δw0), approxi-
mate integration is started. If the contrary occurs,
wd ( E + x ) /C (12) approximate integration is ended and Δs is reset.
Approximate integration is started when clamp-
ing force is 0 N and ended when clamping force is
3 APPROXIMATE INTEGRATION
100 N. The region of integration is the area below
OF ANTI-PINCH ALGORITHM
the rising edge of the Hall pulse width curve, as
shown in the black triangle in Figure 2.
Whether the window is moving up automatically is
currently estimated by detecting the switch signal
of the window. If the window is currently moving
up automatically, calculation of the integral area
is started when the window enters the anti-pinch
zone. As long as Δs > Δs0, the judgement of the clip
is made and window is controlled to drop a certain
distance automatically.
493
Δwd Δw0 Δwd obtained by the difference method is 13.
Δs ∫
Δwd Δw0
(wddn − wd 0 )dn
d (15) Therefore, the threshold Δw0 of the integral start
position is set as 13.
where wd0 is the Hall signal pulse width before 4.2 Threshold of integral area
starting integration? wdn is the Hall signal pulse
width during integration. n is the number of pulses The area of integration is:
of Hall signal contained in the integral region.
Δn
When the integral area, Δs, exceeds a certain
F 100 N
4 ANTI-CLIP JUDGEMENT
Δs ∑ (w
n=0
ddn − wd 0 ) (19)
OF POWER WINDOW
Calculation of the pulse width of Hall signals in
According to 74/60/EEC and MVSS18 regulations, the integral region is done according to Equation
when measuring the window anti-pinch function, (12). Δs is 240, according to Equation (19). There-
the barrier-clamping force shall not exceed 100 N. fore, the threshold, Δs0, of the integral area is 240.
The calculation of the threshold, Δw0, of the inte-
gral start position and the threshold, Δs0, of the
integral area on the standard condition is based on 5 SIMULATION AND ANALYSES
the barrier clamping force, F ≤ 100 N, and barrier
stiffness of (10 + 0.5) N/mm. A power window simulation model was built to
test the highly robust anti-clip algorithm. The sim-
ulation model includes a control algorithm, test
4.1 Threshold of integral start position
conditions, Hall signal output, mechanical part of
According to Equation (12), when Δx = 0, the the window and model of the DC motor. The DC
Hall signal pulse width, wd, is 42 ms; when motor outputs two Hall signals with a phase differ-
Δx Fmax / K N 2
m, the Hall signal pulse width, ence, so that the control algorithm can detect the
wd, is 62 ms. Approximate integration is started phase difference and pulse width of the Hall signal,
when the clamping force is 0 N. Approximate inte- which can be used to determine whether or not to
gration is ended when the clamping force is 100 N. perform the anti-pinch command.
The number of pulses of the Hall signal contained During test conditions, obstructions are
in the integral region is as follows: designed in accordance with the European anti-
seize standards and the stiffness is 10 N/mm. In
Δx ΔxK
K1K the proposed algorithm, the pulse width curve is
Δn = = = 24 (17)
approximately integrated so that the integral area
d πD
can be calculated. The pulse width is related to the
For the parameters, refer to Table 1. resistance value, while the integral area is related to
The five Hall signal pulse widths before inte- the clamping force work.
gration started are wd1∼wd5. The five Hall signal
pulse widths after integration started are wd6∼wd10,
as shown in Table 2. According to Equation (13),
wd1 42 wd6 43
wd2 41 wd7 44
wd3 42 wd8 45
wd4 43 wd9 45
wd5 42 wd10 46
Figure 3. MATLAB model of the anti-pinch window.
494
5.1 Bumpy road
‘Bumpy road’ includes Belgium pavement and
gravel pavement, among other similar road types.
The car body vibration amplitude gets greater on
these types of road, which results in bigger noise of
the Hall signal pulse width. One of the hallmarks
of the Hall signal pulse width curve is the rising
edge.
As shown in Figure 4(c), as a result of the inte-
gration method, the anti-clamping force mutation
caused by the transient tremor is effectively filtered
out. Simulation results show that the algorithm
proposed can accurately determine the anti-pinch
when the car driving on a bumpy road; there is no
false anti-pinch and it has good robustness.
495
6 CONCLUSION vehicle [J]. Journal of Hangzhou Dianzi University,
28(3), 39–42.
An anti-clip algorithm based on an approximate Gui, Z. & Han, F. (2004). Wavelet packet-maximum
integral is proposed. When the windows encounter entropy spectrum estimation and its application in tur-
bineps fault diagnosis [J]. Automation of Electric Power
obstacles in the automatic rise process, the Hall sig- Systems, 28(2), 62–66.
nal pulse width curve will immediately rise. The bit Gui-yang F. (2014). Research on window controlling system
value at the beginning of the integration is judged of automobile and related anti-pinch algorithm [D]. Har-
by detecting the rising edge, whether or not the inte- bin: Harbin Institute of Technology.
gral area has reached the threshold value is used as Guojun, D., Xiang, Z., Huaixiang Z., Ertao, L., & Hong,
the judgement criterion as to whether or not to ini- Z. (2008). Modeling and Implementation of Power
tiate anti-pinch control. The results show that the Window Anti-pinch System [J]. Automotive Engineer-
proposed anti-pinch algorithm based on approxi- ing, 30(6), 539–542.
mate integral has much higher robustness under the Ra, W.S., Lee, H.J., Park, J.B., & Yoon, T.S. (2008). Prac-
tical pinch detection algorithm for smart automotive
conditions of bumpy road and deep pavement. power window control systems. IEEE Trans. Industrial
Electronics, 55(3), 1376–1384.
Sollmann, M., Schurr, G., Duffy-Baumgartner, D., &
REFERENCES Huck, C. (2004). Anti-pinch protection for power oper-
ated features. SAE Technical Paper Series, 2004-01-1108.
Chlebek, C., Steinbring, J., & Hanebeck, U.W. (2016). Pro- Wang, Z., Dou, Li., & Chen, J. (2007). An adaptive Gauss-
gressive Gaussian filter using importance sampling and ian filter with scale adjustable [J]. Optical Technology,
particle flow. IEEE International Conference on Infor- 32(3), 395–397.
mation Fusion, V42, 2043–2049. Weize1, M., Zhang, S., & Wang, H. (2008). The design of
EU Council Directive 74/60/EEC (1973). On the Approxi- anti-pinch car windows using hall sensor [J]. Automotive
mation of the Laws of the Member States Relating to Engineering, 30(12), 1122–1124.
the Interior Fittings of Motor Vehicles [S]. Xu J. (2007). Study on approximation theory and applica-
Fu K., Liu, B., & Li E. (2008). Research and design of tion of Gaussian filter [D]. Harbin: Harbin Institute of
LIN-Bus based on anti-pinched power window in Technology.
496
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Xiangmin Guan
Civil Aviation Management Institute of China, Beijing, China
ABSTRACT: With the high economic growth in China, the field of civil aviation transportation has
witnessed a rapid development. But the efficiency of current centralized air-traffic management is limited,
so billions of yuan was wasted by flight delay and fuel waste every year. It is a significant problem to
ensure the aircraft keep safe separation as the solutions must meet the requirements of the feasibility and
timeliness, but the existing algorithms can’t balance them in actual scenarios. In this paper, an algorithm
based on stochastic optimal control is proposed to improve the search capability. The experimental studies
which using real UAVs shown that the proposed algorithm provides robustness against uncertainties in the
system and is suitable for real applications.
497
too big in conflict resolution plan, so that real air- That means for the any t [0, Tw], inequality d (t)
craft could not fly like this. (i, j) > dsafe holds.
In this paper, a stochastic approximation algo-
rithm based on the Jacobi iteration is proposes
to solve the stochastic optimal control problem. 2.2 Optimal control using the Jacobi iteration
This approach is suitable for decomposition of We use the Jacobi iteration (H. J. Kushner and
optimization, which is able to reduce the com- P. Dupuis, 2001) in this paper. The Jacobi itera-
putational complexity. This paper studies the tion is a kind of gradient descent algorithm whose
decomposition within each pair of conflicting iterations converge to the optimal solution. For a
aircraft, which is able to reduce the computa- given cost function:
tional complexity further for centralized conflict
{
resolution. In the last part of this paper, two real
anyvalue, q Q
UAVs was used to analysis and verify the effec- Vˆ0 (q ) = (2)
tiveness of the algorithm. ) ∀q ∂Q
rˆ(q ),
If within the time Tw the minimum distance The optimal feedback control u* ( x ) for X tu
between two aircraft dmin (i, j) is less than the can be approximated by:
security separation, namely dmin (i, j) <dsafe, we
can define the aircraft conflict happened.
Aircraft conflict resolution means when two or u* ( x ) uˆ* (q ),
) x G (q ) (5)
more aircraft are predicted to be conflict, we to
have quickly finding an effective and ideal trajec- Figure 2 shown the control law presented in (5).
tory to avoid conflict, maintain safety distance The aircraft flies through the grids G (q), G (q’),
between aircraft by changing their heading, speed and G (q”) centered at x (q), x (q’), and x (q”).
and height. For each point, the optimal control input has been
computed by the Jacobi iteration. Then, when the
aircraft is located in G (q), the optimal control
input u* ( x ) is constant uˆ* (q ). When the aircraft
enter G (q), the optimal control input is changed
to uˆ* (q ) and is constant until the aircraft leaves
G (q’).
498
Figure 2. Optimal control at different sections of a
trajectory.
499
coordinate system are (x, y) and (x’, y’). Since minimum distance between two aircraft is 20 m, no
cos( B B′ ) ,cos(
cos(LL L ′ ) , bring into formula conflict risk. The experimental studies which using
(6), the obtained as followed: real UAVs shown that the proposed algorithm pro-
vides robustness against uncertainties in the sys-
⎧ πR
R(( )cos B tem and is suitable for real applications.
⎪( ) ≈ R cos B sin( )≈
⎨ 180
π R( b b′ )
⎪( y y ) ≈ R sin( B − B ′ ) ≈ 3 CONCLUSION
⎩ 180 (7)
This paper has considered the problem of aircraft
conflict resolution, the stochastic optimal con-
where R ≈ 6371393 m is the radius of the earth.
trol was applied to solving the conflict resolution
The experiment was conducted in 40 degrees north
problem, which has the capability of incorporat-
latitude, so π take as 3.1416. So the formula (7) can
ing various and uncertainties control strategy.
be simplified as:
The optimal control problem has been solved a
{
stochastic approximation algorithm based on the
( ) ≈ 85181( )
(8) Jacobi iteration. At last part of this paper, the real
( y y ) ≈ 111202( )
time and reliability of the distributed algorithm are
verified by two real UAVs. So it can be concluded
Take southwest corner of the playground as the that, the algorithm can solve the problem of air-
origin of the XoY coordinate system, the trajec- craft conflict resolution well in the real environ-
tory of the aircraft can be obtained by coordinate ment where wind and measurement uncertainties
transformation as it shown in Figure 7. is existence.
The distance between two aircraft is visible in
Figure 8. It can be seen from Figure 8 that the
ACKNOWLEDGEMENTS
REFERENCES
500
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: The wind speed probability distribution is one of the most important wind characteristics
for the performance of wind energy conversion systems and for the assessment of wind energy potential.
Several kinds of wind speed probability distribution models widely used in wind energy analysis are stud-
ied in this paper. The structural form, the estimation method and the simulation approach of different
models are introduced. The accuracy and simulation speed are compared using data from four wind sites.
The applicability of different models on reliability evaluation of power system including wind energy is
verified with the standard IEEE reliability test system (IEEE-RTS79).
Keywords: Wind speed model; Probability distribution; Probability density function; Wind farm
501
where v stands for the wind speed random variable, 1 n ⎛ v vi ⎞
c is the scale parameter and k is the shape param- fˆ (v ) ∑K ⎜ ⎟
nh i =1 ⎝ h ⎠
(7)
eter. When k = 2, the Weibull distribution becomes
the Rayleigh distribution, which can be expressed
as: where n is the size of wind speed sample, h is the
smooth parameters and K (⋅) is a known kernel
⎛v⎞ ⎛ v2 ⎞ function.
f v ) = ⎜ 2 ⎟ exp ⎜ − 2 ⎟ (2) When n→∞, h→0 and nh→∞, fˆ (v ) is converged
⎝c ⎠ ⎝ 2c ⎠
to f(v) with probability one. The performance of a
KDE depends on the kernel function and smooth
parameters. Reference indicates that the selection
2.2 Mixture distribution model of kernel function is insensitive in KDE. When
A mixture distribution function is a mixture of n is larger enough, the kernel function has a lim-
several component distributions. The PDF of a ited influence on the evaluated results. Therefore,
k-component finite mixture distribution can be it generally chooses a kernel function as a certain
expressed as: type for KDE.
B. Selection of smooth parameter
m
The selection of smooth parameter is critical to
f v| ) ∑w
j =1
j f j (v | θ j ) (3) KDE. The fˆ (v ) is not only related to sample size,
but also refers to the function of observation point
v. Studies show that the optimal smooth parameter
where the parameters Θ = (w1,…,wm, θ1,…, θm) are
can be calculated by the following formula:
such that wj >0 and ∑jwj = 1. wj is a mixing weight
and fj(v|θj) is a component density function param-
1/ 5
eterised by θj. m is the number of components. ⎡ R( K ) ⎤
When m = 2, the mixture distribution becomes a hAMISE = ⎢ ⎥ (8)
two-component mixture distribution, which can be
μ
⎣ 2 ( K ) 2
R ( f"(v ) ) n ⎦
expressed as:
It can be seen from Equation 8 that the opti-
f v | ) w1 f1 (v | 1 ) + (1 w ) f2 v 2 ) (4) mum smooth parameter hAMISE contains a second
derivative f′′(v) of the unknown function f(v), so
The Weibull-Weibull (W-W) mixture distribu- the calculation of the second derivative must be
tion is commonly used for fitting the measured carried out before calculation of smooth param-
wind speed data, which can be expressed as eter. Silverman (1986) presents a simple approach
on calculating smooth parameter, which is to
⎛k ⎞⎛ v⎞ ⎡ ⎛ v ⎞ k1 ⎤
k1 take a normal function as the reference distribu-
f v) = ω ⎜ 1 ⎟ ⎜ ⎟ exp ⎢ − ⎜ ⎟ ⎥ tion to the unknown function f(v), and achieve
⎝ c1 ⎠ ⎝ c1 ⎠ ⎢⎣ ⎝ c1 ⎠ ⎥⎦ hˆAMISE 1.06σ̂ˆ n 1/5 .
A
k2 −1
1
⎡ ⎛ v ⎞ k2 ⎤ (5) C. Wind speed simulation
⎛k ⎞⎛ v ⎞
+ ( − )⎜ 2 ⎟ ⎜ ⎟ exp ⎢ − ⎜ ⎟ ⎥ The PDF originated from KDF is extremely com-
⎝ c2 ⎠ ⎝ c2 ⎠ ⎢⎣ ⎝ c2 ⎠ ⎥⎦ plicated, which means that direct sampling would
face huge difficulties. This paper presents an
accept-rejection sampling approach to generate
It can be seen that W-W model, which has five
wind speed data. The basic idea of the proposed
parameters, is more complex than the one-compo-
technique is as following:
nent distribution model. The W-W model can be
Construct a reference probability density func-
estimated using the maximum likelihood method by:
tion g(v; α) (α represents model parameter vector),
n and make it approaching to wind speed KDF in
LL = ∑ l (wf vi c k w f vi c k ) (6) form and satisfying f (v) ≤Cg (v; α), where C is a
i =1 constant factor with C ≥1. The sampling process
can be illustrated as following steps:
2.3 Kernel density estimation model a. Generate a random sample u from U (0, 1) uni-
A. Basic principle of kernel density estimation form distribution;
Let V = (v1, v2,.., vn) represent a wind speed sample b. Generate a random sample v from the reference
data with PDF f(v). Its Kernel Density Function probability density function g(v; α);
(KDF) fˆ (v ) can be expressed by (Prakasa B.L.S., c. Test whether the conditions u< f(v)/(C × g (v;
1983; Silverman W., 1986): α)) are satisfied:
502
If satisfied, accept v as a sample for f(v); oth- model. The approach proposed in section 2.3.3 is
erwise, reject v, and repeat the simulation steps used to simulate KDE model. Five million wind
a)c). speed samples are generated ten times using Matlab
The simulation of wind speed based on the KDF and the simulation time is achieved by the average
can be performed through the above procedures. of the ten times. The simulation times of different
models are shown in Table 3.
It can be seen that the one-component model
3 RESULTS AND DISCUSSION shows the least simulation time costing while the
KDE model needs the longest simulation time.
3.1 Information of wind speed data The time consumed by KDE is far more than the
one-component model mixture component model,
The actual hourly wind speeds at four wind sites (des-
which limits the application of this method
ignated as A, B, C and D) for three years were used
to illustrate the establishment, accuracy and applica-
bility of the models. Weibull, Rayleigh, W-W model, 3.4 Application analysis
and KDE model are used to fit the actual speed data.
The applicability of different models on reliability
The calculation results of different model parame-
assessment of power system including wind power
ters of the four sites are shown in Table 1.
are investigated using the IEEE-RTS79 (Billiton
R. & Kumar S., 1989) by the addition of a wind farm
3.2 Accuracy analysis with 400 MW capacity. The cut-in, the rated, and the
The comparison between the four models includ- cut-off wind speed of wind turbine generators are
ing the Weibull, Rayleigh, W-W model, and KDE 3.3 m/s, 10.6 m/s, and 22.2 m/s, respectively. The reli-
model, is made using the statistic Ra2 and the results ability study on the test system is conducted using
are shown in Table 2. The PDF plot of wind speed KDE, Weibull model, Rayleigh, and W-W model.
data for the four sites using the histogram estima- Table 4 and Table 5 show the reliability evaluation
tion, Weibull, Rayleigh, W-W model, and KDE are results.
illustrated in Figure 1. Table 4 and Table 5 show that the reliabiliy
It is shown that the PDF of station A and B have indices including the Loss Of Load Expectation
one hump and all the test probability functions (LOLE) and Loss Of Energy Expectation (LOEE)
match well with the observed histogram. According exhibit great differences, which implies that the
to the Ra2 summarised in Table 2, the discrepancy selection of an appropriate probability function
of statistical errors among different models is basi- would be of importance for wind power assess-
cally not very significant for station A and B. ment. The differences between the KDE model
It can be seen that the wind regimes show two and W-W model are not significant, which means
humps on the PDF plot for station C and D, and that the two models have a similar performance.
the W-W and the KDE match still very well with
the observations and present relatively smaller
statistical errors, while the Weibull and Rayleigh Table 2. Calculation results of Ra2 of different models.
model seems to be unsuitable for describing the
Sites KDE Weibull W-W Rayleigh
wind speed data of station C and D.
A 0.9989 0.9119 0.9801 0.9106
3.3 Simulation speed analysis B 0.9994 0.9753 0.9784 0.9285
C 0.9929 0.8062 0.9936 0.7867
The inverse-transformation method is used to simu- D 0.9963 0.8353 0.9891 0.8333
late the one-component model and two-component
503
Table 3. Simulation time of different models.
4 CONCLUSION
ACKNOWLEDGEMENTS
504
REFERENCES series and its application in reliability assessment.
Power System Technology, 37(3), 840–846.
Akpinar, S. & Akpinar, E. (2009). Estimation of wind Papaefthymiou, G. & Klöckl, B. (2008). MCMC for wind
energy potential using finite mixture distribution. power simulation. IEEE Transactions on Energy Con-
Energy Conversion and Management. 50, 877–884. version, 23(1), 234–240.
Billiton R., Kumar, S. et al. (1989). A reliability test sys- Prakasa, B. L. S. (1983). Nonparametric function estima-
tem for educational purposes-basic data. IEEE Trans- tion. London: Academic Press.
actions on Power Systems, 4(3), 1238–1244. Qin, Z., Li, W., & Xiong, X. (2011). Estimating wind
Chang, T. P. (2011). Estimation of wind energy potential speed probability distribution using kernel density
using different probability density functions. Applied method. Electric Power Systems Research. 81(12),
Energy, 88(5), 1848–1856. 2139–2146.
Carta, J. A., Ramírez, P., & Velázquez, S. (2008). Influence Safari, B. & Gasore, J. (2010). Statistical investigation of
of the level of fit of a density probability function wind characteristics and wind energy potential based
to wind-speed data on the WECS mean power out- on the Weibull and Rayleigh models in Rwanda.
put estimation. Energy Conversion and Management. Renewable Energy, 35(12), 2874–2880.
49(10), 2647–2655. Silverman, B. W. (1986). Density estimation for statistics
Jakus, D., Goic, R. & Krstulovic, J. (2011). The impact of and data analysis. London: Chapman and Hall.
wind power plants on slow voltage variations in dis- Yan, W., Ren, Z., Zhao, X. et al. (2013). Probabilistic
tribution networks. Electric Power Systems Research, photovoltaic power modeling based on nonparamet-
81(2), 589–598. ric kernel density estimation. Automation of Electric
Klöckl, B. & Papaefthymiou, G. (2010). Multivariate PowerSsystems, 37(10), 35–40.
time series models for studies on stochastic generators Zhao, Y., Zhang, X., & Zhou, J. (2010). Load modeling
in power systems. Electric Power Systems Research, utilizing nonparametric and multivariate kernel den-
80(3), 265–276. sity estimation in bulk power system reliability evalua-
Li, Y., Xie, K. & Hu, B. (2013). Copula function-based tion. Proceedings of the CSEE. 29(31), 27–33.
dependent model for multivariate wind speed time
505
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Senjing Yao
Shenzhen Power Supply Bureau Co. Ltd., Shenzhen, China
Hongbo Zheng
Zhejiang Guozi Robotics Co. Ltd., Hangzhou, China
Bo Tan
Shenzhen Power Supply Bureau Co. Ltd., Shenzhen, China
ABSTRACT: The tunnel inspection robot has been studied widely. The localisation of the inspection
robot is very important when an accident happens. Localisation technology based on a wireless sen-
sor network can be used in this situation. In this work, the Fast KNN algorithm is proposed to obtain
the real-time position of the inspection robot. The inspection robot is based primarily on a fingerprint
localisation algorithm. The experimental results indicate that the proposed algorithm is superior to the
traditional NN and KNN algorithms.
Keywords: Tunnel inspection robot; Localisation technology; Fast KNN algorithm; Fingerprint
localisation
507
Besides, there are many different measurement
methods proposed in the indoor localisation system,
such as Time Of Arrival (TOA) (Horiba, Manato,
et al. 2014), Time Difference Of Arrival (TDOA)
(Han et al., 2010) and Received Signal Strength
(RSS) (Xiong, 2015). RSS is the first choice for
indoor localisation due to its low calculated cost.
In our work, the inspection robot realises the
localisation function based on a fingerprint locali-
sation algorithm that includes two stages: offline
measurement and online localisation. In the offline
measurement stage, the fingerprint information at
every reference point should be measured before
the localisation stage. In the online localisation
stage, the real-time position information is esti- Figure 1. The principle of triangle localisation
mated by the proposed Fast k Nearest Neighbor algorithm.
(Fast KNN) algorithm.
The remainder of this work is organised as fol-
lows: Section 2 discusses the related works on the point D to known points is d1, d2 and d3. So the
localisation algorithm. Section 3 describes the Fast coordination of unknown point D (x, y) can be cal-
KNN algorithm. The experimental results and culated as follows:
analysis are listed in Section 4. Finally, Section 5
concludes the work.
(x x )2 + ( y − y )2 = d12
(x x ) + ( y − y ) = d22
2 2
(x x ) + ( y − y ) = d32
2 2
2 RELATED WORKS
2.2 Fingerprint localisation algorithm
Although there is a plentiful of indoor localisation
algorithm applied in the different field. According The fingerprint localisation algorithm (Rahman
to the different localisation theory, the algorithm et al., 2012; Sorour et al., 2012) includes two
can be divided into two categories: triangle and stages: offline measurement and online localisa-
fingerprint localisation algorithms. tion stage. In the offline measurement stage, the
fingerprint map is built at every reference point.
The RSS of reference points is received in the
2.1 Triangle localisation algorithm
localisation region. The match algorithm is pro-
The triangle localisation algorithm (Yang & Chen, cessed in the online localisation stage (Esposito &
2009) is based on the signal attenuation model to Ficco, 2011; Ismail et al., 2016). The traditional
estimate the distance between the sending device match algorithm is k Nearest Neighbor (KNN)
and the receiving device. The traditional attenua- (Mirzaei Azandaryani, 2013). The k points are
tion model has been used widely, as follows: used to calculate the coordination unknown
point.
d
Pr P0 − 10 n lg +X
d0
3 FINGERPRINT LOCALISATION BASED
ON FAST KNN ALGORITHM
where P0 indicates the power measured at d0
(1 metre) distance; d is the distance between send-
In our work, the Fast KNN is proposed as a match
ing device and receiving device; the path attenua-
algorithm. After building the fingerprint map, the
tion exponent is expressed by n; X is a Gaussian
inspection robot can use the proposed algorithm
random variable.
to obtain the real-time position. The detailed algo-
The RSS includes the distance information.
rithm is described as follows:
In order to obtain the position information of
Algorithm: Fast KNN
the unknown point, three known points are used
Input: fingerprint; the real-time RSS x;
to calculate the distance. The principle can be
Output: optimal localisation result;
described in Figure 1.
In Figure 1, the A, B and C is the known point, 1: m is the level of fingerprint map; p is the num-
and the (x1, y1), (x2, y2), (x3, y3) is the coordination ber of node m; L is the final level of finger-
of known points. The distance from the unknown print map.
508
2: function obtain the optimal node (m,p,x)
3: select all the subsequent nodes of the p-st
node, and add into list.
4: for i = 0 to list.size
5: if D(x,M_list )>B+r_list
6: move the point i out from the list
7: end
8: min = D(x,M_list ) the smallest node
9: end
10: if list.size = = 0
11: m = m-1
12: if m = = 0
13: stop calculation
14: end Figure 3. The localisation computation comparison of
15: end different algorithms.
16: if m ! = L
17: obtain the optimal node (m+1,min,x)
18: else
19: obtain the coordination of min, return the 5 CONCLUSION
average value
20: end In this paper, we propose the Fast KNN algorithm
for tunnel inspection robot localisation. It can give
the position information of the inspection robot to
4 EXPERIMENTAL RESULTS the control centre in real-time while the accident
AND ANALYSIS happens. The experimental results demonstrate
that the Fast KNN achieves the superior localisa-
We simulate the experiment in an indoor corridor tion performance. In further work, we plan to use
that is similar to the tunnel environment. The total the proposed algorithm in a real tunnel environ-
dimension of the corridor is 10.6*2.2. The corri- ment, and improve the performance of the pro-
dor is equipped with WiFi. Thirty reference points posed algorithm further.
are selected to evaluate the performance of locali-
sation accuracy and speed.
In this work, we compare the Fast KNN against REFERENCES
the Nearest Neighbor (NN) and KNN algorithms
to evaluate the localisation accuracy. The experi- Esposito, C., & Ficco, M. (2011). Deployment of RSS-
based indoor positioning systems. International Jour-
mental results are shown in Figures 2 and 3. nal of Wireless Information Networks, 18(4), 224–242.
From Figures 2 and 3, we can see that Fast González, J.C. et al. (2009). Robot-aided tunnel inspec-
KNN achieves the optimal comprehensive perfor- tion and maintenance system. International Sympo-
mance. Not only the localisation accuracy, but also sium on Automation and Robotics in Construction,
the localisation speed of the proposed algorithm 629–636.
achieves the best performance. Han, T., Lu, X., & Lan, Q. (2010). Pattern recognition
based Kalman filter for indoor localization using
TDOA algorithm. Applied Mathematical Modelling,
34(10), 2893–2900.
Horiba, M. et al. (2014). A study on improvement of
NLOS detection accuracy in TOA-based indoor local-
ization. IEICE Technical Report. ASN Ambient Intel-
ligence & Sensor Networks, 113.
Ismail, A.H. et al. (2016). WiFi RSS fingerprint database
construction for mobile robot indoor positioning sys-
tem. IEEE International Conference of Systems, Man
and Cybernetics.
Mirzaei Azandaryani, S. (2013). Indoor localiza-
tion using Wi-Fi fingerprinting. Dissertations &
Theses—Gradworks.
Rahman, M.S., Park, Y., & Kim, K.D. (2012). RSS-based
indoor localization algorithm for wireless sensor net-
work using generalized regression neural network.
Figure 2. The accuracy performance comparison of Arabian Journal for Science and Engineering, 37(4),
different algorithms. 1043–1053.
509
Sorour, S., Lostanlen, Y., & Valaee, S. (2012). RSS Xiong, J., Sundaresan, K., & Jamieson, K. (2015). Ton-
based indoor localization with limited deployment eTrack: leveraging frequency-agile radios for time-
load. Global Communications Conference IEEE, based indoor wireless localization. International
303–308. Conference on Mobile Computing and Networking
Sun, Y., Liu, M., & Meng, Q.H. (2014). WiFi signal ACM, 537–549.
strength-based robot indoor localization. IEEE Inter- Yang, J., & Chen, Y. (2009). Indoor localization using
national Conference on Information and Automation, improved RSS-based lateration methods. IEEE Con-
250–256. ference on Global Telecommunications, IEEE Press,
Victores, J.G. et al. (2011). Robot-aided tunnel inspec- 1–6.
tion and maintenance system by vision and proximity Yang, Z., & Lei, C. (2014). Adaptive fitting reference
sensor integration. Automation in Construction, 20(5), frame for 2-D indoor localization based on RFID.
629–636. 6(2), 114–118.
Wu, C., Yang, Z., & Liu, Y. (2015). Smartphones based Zhang, C. et al. (2006). Accurate UWB indoor locali-
crowdsourcing for indoor localization. IEEE Transac- zation system utilizing time difference of arrival
tions on Mobile Computing, 14(2), 444–457. approach, 515–518.
510
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Keywords: extreme learning machine; kernel function; semi-supervised learning; behavior learning
λ T −1 ˆ L
⎩ G oG ( L L
T T
neural network without iterative training process. ) CT 1
N
Compared with those SVM based semi-supervised
algorithms such as TSVM and LapSVM, SSELM where L1 and N denote the number of labeled
can achieve similar or even better classification per- training instances and all training instances, Go
formance with less time. However, the parameter and G are the output matrix of the hidden layer
selection for heat kernel function during Laplacian when instances of training set and testing set are
matrix construction is very important and SSELM taken as input, respectively. L is the Laplacian
directly chooses the parameter by experience. We matrix and T̂ is the label matrix with respect
introduced human behavior learning strategy (X.J to instances of the training set. λ, C are param-
Zhu et al, 2010) (Khan, Faisal et al, 2011) so as eters specified by the user. More information can
511
be found in the work of Huang et al. (Huang, G In Equation (3), σ i (k
k d ( x k ) is called the
et al, 2014). Motivated by Kernel Extreme Learn- local behavior parameter, which measures the
ing Machine (KELM) which utilizes kernel func- distance between the sample xi and the sample
tion for data mapping to reduce the instability that is the k-th nearest sample xk in Euclidean
during network training, we rewrite the objective Space, where k is user specified. The introduc-
function in Equation (1), as shown in Equation (2). tion of the local behavior parameter σ utilizes
the probability distribution information around
T
⎡ K ( , 1) ⎤ xi and xj, so as to improve the classification
f = ⎢⎢ ⎥ I performance.
⎥ ( L + CΩ ELM + λ LΩ ELM ) CT
−1
ˆ
L
⎢⎣ K ( , L ) ⎥⎦ (2)
2.3 Behavior learning based semi-supervised
kernel ELM
where K ( i , x j ) is called the kernel function which Combine with the ideas above, we propose a
maps xi and xj onto a higher dimensional space, Behavior Learning based Semi-supervised Kernel
making instances easier to be separated. As a result, ELM (BLSSKELM).
the fluctuation caused by randomly generated input The effectiveness of the algorithm will be tested
weights will not influence the training process. by experiments in the next section.
512
Table 1. main steps of LBSSKELM.
Main steps:
⎡( )
l L1 × M1 ⎤
1. Calculate the similarity matrix W of the training samples ⎢ ⎥ with the local parameter k;
⎣⎢( u )L2 × M1 ⎥⎦
2. Calculate the Laplacian matrix L D − W, where D is a diagonal matrix whose diagonal elements are
∑
L
Dii j =1
wij (i 1, 2,..., L );
ΩELM = [ K (( ) ( X l + u ) j )]L L
l u i
⎡C ⎤
⎢ C ⎥
i, j =1,2,...,L, C = ⎢ ⎥;
⎢ ⎥
⎢ ⎥
⎣ C ⎦
5. Calculate the output when the testing samples are used as input of the network:
T T
⎡ K ( x, x1 ) ⎤ ⎡ K ((xx, x1 ) ⎤
f = ⎢⎢ ⎥ β*
⎥
⎢
⎢ ⎥ (I
⎥ L L
ˆ;
CΩ ELM + λ LΩ ELM )−1 CT
⎢⎣ K ( x, x L ) ⎥⎦ ⎢⎣ K ( x, x L ) ⎥⎦
where x ∈X
Xt x i X l + u , i = 1,..., L ( L = L1 + L2 ).
Table 2. Classification accuracy comparison with different numbers of labeled training samples.
Iris 79.3% 86.7% 91.7% 85.3% 87% 95% 84.7% 89% 98.3%
Wine 88.3% 85.3% 90.7% 91.3% 75.7% 93% 89% 83.3% 96.3%
Air 55.4% 58% 65.6% 73.8% 73.4% 74.4% 78.4% 82.3% 84%
3.2 Comparison with classification time Table 3. the comparison of training time and testing
time of SSELM and BLSSKELM.
Next we compare the training time and the testing
time between SSELM and BLSSKELM. We ran- SSELM BLSSKELM
domly choose 5 samples in the training set as the
labeled training samples and the rest is considered Training Testing Training Testing
as the unlabeled training samples, other parameters time time time time
are set as Experiment 1 does. The experiment is (ms) (ms) (ms) (ms)
repeated for 20 times, the average training time and
Iris 15.0 1.7 3.4 0.4
testing time of BLSSKELM is shown in Table 3.
Wine 19.7 3.0 5.4 0.4
From Table 3, we can conclude that:
Air 116.3 5.6 31.0 2.5
1. The training time and the testing time of both X8D5K 794.0 10.2 248.4 5.3
algorithms will increase when the number of sam-
ples or the number of feature dimension increases. the same condition. This is due to the fact that a
2. Generally, the training time and the testing time lot of hidden neurons are added for SSELM so
of BLSSKELM is less than that of SSELM under as to improve the classification performance.
513
4 CONCLUSION IEEE Transactions on Cybernetics, 44(12) (2014),
2405–2417.
In order to overcome the instability of SSELM Huang, Guang Bin. “What are Extreme Learning
caused by randomly generating weights between Machines? Filling the Gap Between Frank Rosenb-
the input layer and the hidden layer, and the latt’s Dream and John von Neumann’s Puzzle.” Cogni-
improper parameter selection for Laplacian matrix tive Computation, vol. 49, no. 22, pp. 263–278, 2015.
Joachims T. Transductive inference for text classification
construction, this paper introduces kernel func- using support vector machines. Proceedings of the
tion and human behavior learning so as to bring 16th International Conference on Machine Learning.
up the BLSSKELM algorithm. The simulation (Bled, Slovenia, 1999) 200–209.
experiments show that the classification accuracy Khan, Faisal, X. Zhu, and B. Mutlu. “How Do Humans
of BLSSKELM is better than that of SSELM Teach: On Curriculum Learning and Teaching
under the same condition, as well as less training Dimension.” Advances in Neural Information Pro-
and testing time. The next research is to analyze cessing Systems (2011): 1449–1457.
the effectiveness of the algorithm the theoretically. Mikhail Belkin, Niyogi P. Semi-Supervised Learning
on Riemannian Manifolds[J]. Machine Learning,
56(1–3) (2004) 209–239.
ACKNOWLEDGEMENTS UCI Machine Learning Repository [http:// archive. ics.
uci. edu/ml]. Irvine, CA: University of California,
This work is supported by National High-tech R&D School of Information and Computer Science.
Zhang, C; Yang, JN; Zhang, JY; Li, DS; Yong, AX.
Program (863 Program), and Anhui Provincial Semi-Supervised Learning by Local Behavioral
Natural Science Foundation (NO.1308085QF99, Searching Strategy. Applied Mathematics & Informa-
NO. 140 8085MKL46). tion Sciences, 8 (4)( 2014) 1781.
Zhu, X.J., B.R. Gibson, K.S. Jun, Cognitive Models
of TestItem Effects in Human Category Learning,
REFERENCES ICML, (2010).
Huang, G, Song, S, Gupta, J.N.D, et al. Semi-super-
vised and unsupervised extreme learning machines.
514
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Big data storage and processing method on the coal mine emergency
cloud platform
B.F. Yi
Computer Science Department, Salem State College, Salem, MA, USA
ABSTRACT: With the data explosion comes the need for big data storage and processing in digital coal
mine. This paper proposed a frame of big data management based on coal mine emergency cloud platform
and a method of big data storage and processing with the use of HBase and Hive. On this platform, an
abnormal model of environment parameter in coal mine safe production was designed and implemented.
As a test instance of this model, a big monitoring data from Huang Ling Coal Mine was used to store with
HBase in distributed database and processed with Hive in distributed warehouse. By comparing the real-
time monitoring value with the empirical value obtained from the model analysis, it was judged whether
the value is abnormal. The result shows that the cloud computing technology in the construction of the
digital coal mine is not only a useful practice, but also has important practical significance and research
value.
Keywords: Coal mine; Big data; Cloud computing; Distributed storage; Distributed processing
515
practical problems is the core to big data. SQL on 1. Calculate the average value of current hour
Hadoop thus has become an important tool to
query and analyze TB/PB level data in the era of Countn 1 + An
A(n− )hour * C
big data. Currently, Hive is the most commonly A(n)hour = (1)
used SQL on Hadoop solution in big data pro- Countn −1 + 1
cessing and warehouse building for the Internet
companies. Hadoop cluster is deployed in many A(n)hour is an average value of the n hour,
companies not to run the native MapReduce pro- Countn-1 is the cumulative number of times of the
gram but to execute the Hive SQL query. (n−1)th hour. The current inspection cycle of the
The paper integrates the advantages of HBase mine environment parameters is 1/0 s (that is, the
technology and Hive technology. When the data number of cumulative sensor inspection is 120
set gets updated, HBase is used to ensure the data times per hour). Therefore, Anhour is the average
to be fast inserted. When the big data gets proc- value of the 120 times sampling in the current nth
essed, it can be queried using HiveQL like SQL by hour, and the cumulative number of times and the
importing the data from HBase to Hive. present value of Anhour are cleared at the end of the
hour after the statistics, starting to calculate the
4 THE IMPLEMENTATION OF THE average value of the next hour.
VARIATION MODEL OF MINE SAFETY 2. Calculate the average value of the month
AND PRODUCTION OPERATING
ENVIRONMENT PARAMETER A(n Countn −1 + A(n)hour
)month * C
A(n)month = (2)
4.1 Analysis on the variation model of mine Countn −1 + 1
safety and production operating environment
parameter on the coal mine emergency cloud At the end of each hour, calculate A(n)month ,
platform which is the average value of the nth hour of the
The change in coal mine safety production oper- current month, A(n)hour is the average value of the
ating environment parameters is an obtained nth hour.
empirical value through the analysis of long-term 3. Calculate the empirical value
A(n )month C
Countn −3 ∗ w3 A(n )month ∗ countn − 2 ∗ w3 + A( − )month
∗ countn −1 ∗ w1 + A( )month ∗ countn
A ( n) empirical =
th
Countn −3 ∗ w3 + C
Cooountn 2 ∗ w C
Countn −1 ∗ w1 C
Countn
(3)
environmental parameters in the working place. A(n)empirical is the empirical value of the nth hour,
The results can be obtained through the com- which is obtained by the weighted average of the
parison with the empirical value. When the mine first three months, the first two months, last month
production environment parameters change, in and the current month. W3 is the weight of the
the meanwhile, there’s no alarm but the change first three months, W2 is the weight of the first two
rate is relatively large, the paper take this situation months, and W1 is the weight of the last month.
as the exception handling, which need for timely The average value of the first three months has less
reminder of regulators to prevent accidents. influence on the empirical value of the hour than
The algorithm model uses the average value of that of the last month, thus the common situation
the historical data for a period of time as the vari- is W3 <W2 <W1. A(n)empirical is stored into the data-
ation reference value to compare with the current base per hour.
value and set a certain extent of changes and dura- The determination of the parameter change
tion as the auxiliary reference, setting different
weights to the calculation of the data from differ- IF (*(1+S%)) and (Tlower limit < Tcontinue < Tupper limit)
ent time periods (He Yaoyi, 2007). Then Vpresent = usual (4)
The cumulative time: Every day is divided into
several stages, the average value of each stage is S is the floating range of the parameters that the
cumulative, take per hour for a tentative stage (i.e. mine managers set according to the actual situa-
24 times a day). tion. Tcontinue represents the duration of the param-
The change model of Huang Ling coal mine eter, Vpresent represents the real-time data collected
production environment parameter is as follow: by sensors every 30 seconds. When the value is
516
greater than the hourly empirical floating range
and duration is within the scope of an exception
period set manually, it is determined that the data
is abnormal.
“Scenario-Response-Contingency” handling
mechanism.
517
ment determines the informatization level of coal
mine emergency management.
ACKNOWLEDGMENTS
518
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: The data imbalance problem has become a challenge in many real-life classification appli-
cations. Although numerous synthetic over-sampling techniques have been put forward to alleviate this
problem, most of them do not consider the distribution of the minority examples and may generate noisy
synthetic minority examples which overlap the majority examples. In this regard, an improved synthetic
over-sampling algorithm, named Clustering Based Random Over-Sampling Examples (CBROSE) algo-
rithm, for balancing the binary class data sets is presented in this paper. CBROSE generates synthetic
minority examples by combining Kmeans clustering algorithm with the basic mechanism of existing syn-
thetic over-sampling methods. The synthetic minority examples created by CBROSE always be located in
an elliptical area centered at the observed minority example. The experimental results based on 5-folder
cross validation show the effective-ness of CBROSE on some real-life data sets in terms of AUC.
519
by random linear interpolation between original
minority examples. Subsequently, A variety of
SMOTE-based improved algorithms have been
proposed, such as Borderline-SMOTE (Han et al.
2005), ADASYN (He et al.), and CBSO (Barua
et al. 2011).
Considering the risk of new decision region gen-
erated by SMOTE algorithm for minority class in
the feature space is not large enough, (Menardi &
Torelli 2014) proposed a novel artificial examples
generation method, named ROSE, which com-
bined with under-sampling and over-sampling Figure 1. Distributions of the synthetic examples. (a)
techniques. In ROSE, synthetic examples are Based on ROSE. (b) Based on CBROSE.
generated based on a function of kernel density
estimation rather than based on k-nearest neigh-
bors. SMOTE creates synthetic examples for the This rest of this paper is organized as follows.
minority class only, and the synthetic examples Section 2 presents the proposed algorithm. Sec-
are added to the original data set. However, in tion 3 depicts the experiments including the char-
ROSE, synthetic examples generation is performed acteristics of the data sets, performance metrics,
for both classes and the synthetic examples com- the results and analysis. And then we summarize
pletely replace the original examples to generate some conclusions in the study finally.
a new training set. Although ROSE is superior to
SMOTE under certain conditions, the synthetic
examples of one class generated by ROSE may be 2 PROPOSED CBROSE ALGORITHM
located in the area of the other class if the feature
space do not completely follow Normal distribu- CBROSE is an improved algorithm for ROSE
tion, which will increase overlapping area between [7], and it can effectively avoid that the generated
classes. As shown in Figure 1(a), circles and minority examples overlapping the majority exam-
squares represent the majority and minority exam- ples. [Algorithm CBROSE] presents the pseudo-
ples, respectively. Because the minority examples code of CBROSE.
are distributed in two areas, some synthetic exam- [Algorithm CBROSE]
ples (stars) created by ROSE overlap the majority Input:
examples in dashed area. Although ROSE can be Training set Dtr of examples (x1, y1),…,(xm, ym),
combined with different kernel functions to adapt where xi is an example that belonging to d dimen-
to different examples distribution, it is difficult to sional feature space X, and yi ∈ Y, |Y| = 2;
recognize in advance the distribution of the exam- The balanced level factor: p, where p ∈ [0,1]. p = 1
ples for an unknown data set, and thus cannot means that the number of generated synthetic
have a base to select the appropriate kernel func- minority examples is equal to Mmaj (Mmaj denotes
tion to generate new examples, which will largely the number of majority examples).
affect the adaptability and robustness of ROSE. Step:
For the purpose of overcoming the drawback 1. Count the quantity of new minority examples
of ROSE, we propose an improved algorithm, that should be created:
named Clustering Based Random Over-Sampling
Examples (CBROSE) algorithm, which combines Ns round(
round
r d M maj p)
the k-means clustering algorithm with the exam-
ples creation mechanism of ROSE. Firstly, in the 2. Find the clusters of the minority class based on
training data set, k-means algorithm is adopted K-means algorithm.
to cluster the minority examples, and then a pre- 3. For j = 1, …, K #For each cluster Cj
defined number of original minority examples a. Count the quantity ns(j) of new examples that
are randomly selected to compose a temporary should to be created in cluster Cj:
minority data set in each cluster. Finally, the
ROSE method is performed in this temporary ( j)
mmin
minority data set for creating synthetic exam- ns( j ) = round(N
round ( N s i
)
M miin
ples. As a desired result (as show in Figure 1(b)),
the generated examples should be only located where Mmin and mmin(j) denote the quantity of minor-
around each cluster, so that it will reduces the ity instances in Dtr and cluster Cj, respectively.
overlap between new synthetic examples and the b. Perform the synthetic examples generation
majority examples. mechanism of ROSE in cluster Cj.
520
If mmin(j) > 1, then of the original minority example. In Step 4, all
artificial examples are outputted to replace the
1. For q = 1, …, d original minority examples, and combined with
Calculate the sample standard deviation estimation majority examples into a new training set.
of the q-th dimension of the minority examples. Taking into account that the value of K is one of
2. Calculate the diagonal smoothing matrices: the factors that affect seriously the performance of
K-means algorithm used in Step 2 of [Algorithm
H ( j ) = diag( ( )
1 ..., hd( j ) )
,,..., CBROSE]. So, for reducing the effect of different
value of K, an objective evaluation method sug-
where, gested by (Pham et al. 2005) is adopted to obtain a
suitable value of K for K-means algorithm. In this
1/( 4) method, an clustering result evaluation function
⎛ 4 ⎞ f(K) is applied to choose the most suitable value
hq( j ) = ⎜ ( j) ⎟
σˆ q( j )
⎝( 2)mmin
2)m ⎠ of K corresponding to the minimum clustering
distortion.
3. Create a temporary set Dt(j) of (X(j), Y(j)) that hav- The clustering distortion in K-means algorithm
ing ns(j) examples based on random over-sampling can be defined as:
with replacement.
4. Generate ns(j) new synthetic examples for minor- Nj
( j)
s = X ( j ) + N( μ ,σ 1) H ( j ) where Dj denotes the distortion of cluster Cj, Nj
is the number of examples of cluster Cj, xjt is the
where N(μ = 0, σ = 1) is a matrix of random num- t-th example of cluster Cj, wj is the center of cluster
bers following standard Normal distribution. Cj, and d(xjt, wj) is the Euclidean distance between
Else if mmin(j) = 1, then example xjt and the center wj of cluster Cj.
Duplicate the minority example of cluster Cj ns(j) Then, the total distortions of all clusters can be
times for the minority class. calculated as follow:
4. Return all synthetic examples for minority class.
Like ROSE, the actual conditional densities of K
the examples are assumed to be correspondent SK ∑D
j =1
j (2)
to Gaussian distribution by CBROSE. For avoid-
ing the loss of information of majority examples,
CBROSE only creates synthetic examples for the where, K is the pre-defined cluster number for
minority class rather than both classes. Before K-means algorithm.
the generation of synthetic examples, the original
minority examples of the training set are divided ⎧ 1 if K = 1
into several non-overlapping clusters by K-means ⎪
algorithm (Step 2 of [Algorithm CBROSE]). The ⎪ SK
f K) = ⎨ if SK −1 ≠ ,∀K > 1 (3)
quantity of new rare instances that should to be ⎪α K SK −1
created for each cluster is calculated in step 3a. ⎪⎩ 1 if SK −1 , ∀K > 1
On one hand, If the number of minority exam-
ples is more than one in a cluster, the examples ⎧ 3
generation mechanism of ROSE is performed ⎪⎪1− 4 N if K 2 d Nd > 1
in four steps (Step 3b (1)–(4)). Because Gauss- αK = ⎨ d
(4)
ian Kernels with diagonal smoothing matrices ⎪α + 1 − α K −1 if K 2 d Nd > 1
H is considered for each cluster, the generated ⎪⎩ K −1 6
examples are in fact random numbers following
Gaussian distribution centered at the random where Nd is the feature numbers used for cluster-
resampling minority examples. Compared to ing, and αK is a weight factor. When the distribu-
SMOTE, CBROSE can produces a better deci- tion of examples is uniform, f (K) is approximately
sion space for classifier. On the other hand, if equal to one. If some concentrated areas exist in
there is only one minority example in a cluster, the examples distribution, f (K) will decrease.
we will consider the only member to be a noisy The more concentrated the example distribution is,
example. For avoiding overlapping between new the smaller is f (K). Therefore, for K-means algo-
minority examples and the majority examples, rithm, the value of K which yields the smallest f (K)
the generated examples will be duplications can be selected as the pre-defined cluster number.
521
3 EXPERIMENTS 3.2 Performance metrics
For reflecting the actual classifier’s performance
In our experiments, the effectiveness of CBROSE
in imbalanced data sets, the area under the ROC
is evaluated and compared with SMOTE (Chawla
curve (AUC), which has been widely selected as a
et al. 2002) and ROSE (Menardi & Torelli 2014)
performance metric in the researching on imbal-
algorithm. Classification tree (CART) and Sup-
anced data sets (Menardi & Torelli 2014, Peng
port Vector Machine (SVM) are chose as two
et al. 2014), is used to assess our proposed method.
base classifiers. The experiments run on a Win7
AUC can be calculated by
operating system with 2.9 GHz of Intel core and
4GB of RAM. The codes of CBROSE, ROSE,
1 + TPR − FPR
and SMOTE are written in R programming AUC = (7)
language. 2
522
Table 2. Comparison of average AUC on 10 binary class data sets.
CART SVM
the smoothing parameter sigma is set to 0.05. For ing results, an objective evaluation method is adopted
SMOTE, k = 5 (Chawla et al. 2002), N = 300. For to obtain the suitable value of K for K-means algo-
CBROSE, the balance coefficient p is set to 1, so rithm. By comparing with SMOTE and ROSE, the
that the quantity of generated minority examples application of CBROSE to some real word data sets
is equal to that of majority examples. The num- shows satisfactory performance in terms of AUC.
ber of experiments on each data set is set to 100, Ensemble techniques, such as Adaboost, can be eas-
and the average value of the AUC is chose as the ily combined with CBROSE by relating the weights
final results for each algorithm. The experimen- update approach to the probability of example crea-
tal results of the algorithms are shown in Table 2 tion, which will be an object of our further research.
where the bests are shown in bold.
Form Table 2, in terms of AUC, we can see that
CBROSE wins more times than the other meth- ACKNOWLEDGMENTS
ods, which implies that CBROSE is superior to the
other methods in most of the data sets. There are This work is supported by the National Natural Sci-
still several data sets, such as vehicle and abalone ence Foundation of China (Grant No. 61374008).
9-18, on which CBROSE cannot obtain satisfac-
tory results. By observing the example distribu-
tions of these data sets, we find that they do not REFERENCES
obey Normal distribution. In addition, in most of
the data sets, the performance of CBROSE using Barua, S., Islam, M. M. & Murase, K. 2011. A Novel
SVM as the base classifier is higher than that of Synthetic Minority Oversampling Technique for
CBROSE using CART as the base classifier, indi- Imbalanced Data Set Learning. Berlin, Heidelberg:
cating that the proposed data balanced algorithm Springer Berlin Heidelberg.
may be more suitable for combining with SVM. Chawla, N.V., Bowyer, K.W., Hall, L.O. & Kegelmeyer,
W.P. 2002. SMOTE: Synthetic minority over-sampling
technique. Journal of Artificial Intelligence Research,
16: 321–357.
4 CONCLUSION Chawla, N.V., Lazarevic, A., Hall, L.O. & Bowyer, K.W.
2003. SMOTEBoost: Improving prediction of the
A novel synthetic over-sampling algorithm, named minority class in boosting. 7th European Conference
CBROSE, for balancing the binary class data sets on Principles and Practice of Knowledge Discovery in
is presented in this paper. CBROSE is an improved Databases, September 22, 2003 - September 26, 2003.
algorithm based on ROSE. Unlike ROSE, CBROSE Cavtat-Dubrovnik, Croatia: Springer Verlag.
creates synthetic examples combining with K-means Han, H., Wang, W.Y. & Mao, B.H. 2005. Borderline-
SMOTE: A new over-sampling method in imbal-
algorithm which guarantees that the created minor- anced data sets learning. Intelligent Computing, 2005.
ity examples always be located in an elliptical area 878–887.
centered at the observed minority example, thus, He, H., Bai, Y., Garcia, E.A. & Li, S. ADASYN: Adap-
avoiding any created minority examples overlap the tive synthetic sampling approach for imbalanced
majority. In addition, for getting the optimal cluster- learning. 2008. IEEE, 1322–1328.
523
Mazurowski, M.A., Habas, P.A., Zurada, J.M., Lo, J.Y., Tesfahun, A. & Bhaskari, D.L. 2013. Intrusion Detec-
Baker, J.A. & Tourassi, G.D. 2008. Training neural tion Using Random Forests Classifier with SMOTE
network classifiers for medical decision making: The and Feature Reduction. International Conference on
effects of imbalanced datasets on classification perfor- Cloud & Ubiquitous Computing & Emerging Tech-
mance. Neural Networks, 21(2): 427–436. nologies. IEEE.
Menardi, G. & Torelli, N. 2014. Training and assessing Ting, K.M. 2002. An instance-weighting method to
classification rules with imbalanced data. Data Min- induce cost-sensitive trees. IEEE Transactions on
ing and Knowledge Discovery, 28(1): 92–122. Knowledge and Data Engineering, 14(3): 659–665.
Peng, L.Z., Zhang, H.L., Yang, B. & Chen, Y.H. 2014. Wei, W., Li, J., Cao, L., Ou, Y. & Chen, J. 2013. Effective
A new approach for imbalanced data classification detection of sophisticated online banking fraud on
based on data gravitation. Information Sciences, 288: extremely imbalanced data. World Wide Web, 16(4):
347–373. 449–475.
Pham, D.T., Dimov, S.S. & Nguyen, C.D. 2005. Selec- Yen, S.-J. & Lee, Y.-S. 2006. Under-Sampling Approaches
tion of K in K-means clustering. Proceedings of the for Improving Prediction of the Minority Class in an
Institution of Mechanical Engineers Part C-Journal Imbalanced Dataset. Berlin, Heidelberg: Springer
of Mechanical Engineering Science, 219(1): 103–119. Berlin Heidelberg.
Qazi, N. & Raza, K. 2012. Effect of Feature Selection, Zheng, Z.Y., Cai, Y.P. & Li, Y. 2015. Oversampling
SMOTE and under Sampling on Class Imbalance Method for Imbalanced Classification. Computing
Classification. 14th International Conference on and Informatics, 34(5): 1017–1037.
Modelling and Simulation. IEEE. Zhou, Z.-H. & Liu, X.-Y. 2006. Training cost-sensitive
Seiffert, C., Khoshgoftaar, T.M., Van Hulse, J. & Napoli- neural networks with methods addressing the class
tano, A. 2010. RUSBoost: A Hybrid Approach to imbalance problem. IEEE Transactions on Knowl-
Alleviating Class Imbalance. IEEE Transactions on edge and Data Engineering, 18(1): 63–77.
Systems, Man, and Cybernetics, 40(1): 185–197.
Tan, S. 2005. Neighbor-weighted K-nearest neighbor for
unbalanced text corpus. Expert Systems with Applica-
tions, 28(4): 667–671.
524
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: The mathematical modelling method calculates and analyses four indexes of expert
systems, namely, RSI, W%R, MA and MACD by taking annual net profit margin, rate of return and
winning rate as the management goal. According to the results, when compared to the winning rate of
one-time buy-in of all funds, the step-by-step buy-in with 30% funds increases by a mere 9.29%, 6.31%,
1% and 6.31% respectively. However, the annual rate of return and net profit margin drop significantly to
41.85%, 50.93%, 50.94% and 50.95%. Thus, step-by-step buy-in is meaningless for the above four systems.
As can be seen from the results, the reverse directional expert system RSI is superior to W%R, and the
directional expert system MA is superior to MACD. The calculation result of reverse directional expert
systems is generally better than that of directional expert systems. For instance, the winning rate, annual
rate of return and net profit margin of the reverse directional RSI expert system are 1.19, 1.40 and 1.401
times that of the directional MACD expert system.
525
Cn H n EXITLONG: CROSS (WR, LL);
W %R 1 % (5) Source code of MA expert system
H n Ln
SHORT 1 30 5
LONG 5 100 30
where, n is the transaction period set by the dealer,
CROSS (MA (CLOSE, SHORT), MA (CLOSE,
Cn is the closing price in n day(s), Ln is the lowest
LONG))
price in n day(s), and Hn is the highest price in n
CROSS (MA (CLOSE, LONG), MA (CLOSE,
day(s).
SHORT))
The mathematical formula of the MACD is as
ENTERLONG: CROSS (MA (CLOSE,
follows:
SHORT), MA (CLOSE, LONG));
EXITLONG: CROSS (MA (CLOSE, LONG),
MACD = 12-daysEMA-26-daysEMA (6)
MA(CLOSE, SHORT))
The mathematical formula of the Exponential Source code of MACD expert system
MA (EMA) index is as follows: LONG 10 200 26
SHORT 2 200 12
p1 + (1 − ) p2 + (1 − )2 p3 + (1 − )3 p4 + M 2 200 9
EMA today = DIFF: = EMA (CLOSE, SHORT) – EMA
(1 − )2 + (1 − α )3 +
1 + (1 − ) + (1
(CLOSE, LONG);
(7) DEA: = EMA (DIFF, M);
2 MACD: = 2*(DIFF-DEA);
α= N represents the periodicity (8) ENTERLONG: CROSS (MACD, 0);
N +1
EXITLONG: CROSS (0, MACD);
Where, pi (i , 2, n ) refers to the closing price 2. Experiment platform: V5.00 version of DZH
of day i, and n refers to the MA periodicity. securities information platform
Mathematical formula of the MA is: 3. Experimental parameters: one-time position
opening or full position closing for funds meeting
c1 + c2 + + cn the conditions, with a transaction cost of 0.5%
MA = (9) 4. Experimental samples: all A-share daily line
n data in Shanghai stock market (26 August
2015–24 November, 2016)
where ci (i , 2, n ) refers to the closing price of 5. Experimental process, time and results:
day i, and n refers to the MA periodicity.
Table 1. The first test result of RSI expert system.
2 EMPIRICAL ANALYSIS OF RSI EXPERT
SYSTEM, W%R EXPERT SYSTEM, MACD
EXPERT SYSTEM AND MA EXPERT
SYSTEM
1. Experimental procedure:
Source code of the RSI expert system
N1 1 100 14
LL 0 40 20
LH 60 100 80
LC: = REF (CLOSE, 1);
R S I : S M A ( M A X ( C L O S E - L C, 0 ) , N 1 , 1 ) /
SMA(ABS(CLOSE-LC),N1,1)*100,colorwhite;
ENTERLONG: CROSS (RSI, LL);
EXITLONG: CROSS (LH, RSI)
Source code of the W%R expert system
N 2.00 100.00 14.00
LL 0.00 100.00 20.00
LH 0.00 100.00 80.00
WR:=100*(HHV (HIGH, N)-CLOSE)/(HHV
(HIGH,N)-LLV(LOW,N));
ENTERLONG: CROSS (WR, LH); (Continued)
526
Table 1. (Continued) Table 2. The second test result of RSI expert system.
527
Table 3. (Continued)
528
Table 4. The second test result of the MA expert
system.
(Continued)
529
Table 5. (Continued) of return and net profit margin, the reverse direc-
tional expert system RSI is superior to W%R,
Step-by-step 47.61 4.36 5.45 5,595.20
and the directional expert system MA is superior
buy-in
of MAexpert to MACD (regardless of the poor performance
system with on the winning rate). Seen in Table 5, the calcula-
30% funds tion result of reverse directional expert systems is
One-time buy-in 67.52 12.27 15.33 7,605.60 generally better than that of directional expert sys-
of MACD tems. For instance, the winning rate, annual rate of
expert system return and net profit margin of the reverse direc-
with all tional RSI expert system are 1.19, 1.40 and 1.401
funds times that of the directional MACD expert system.
Step-by-step 73.83 6.25 7.81 6,847.20 Thus, it can be seen that the RSI system should be
buy-in
the first choice for investors.
of MACD
expert
system with
30% funds REFERENCES
530
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Shilong Fan
Army of PLA, Sanya, China
ABSTRACT: In this paper a novel approach for modelling and simulation of a centrifugal compres-
sor based on bond graph theory is proposed. The heat-work conversion, heat transfer, mass transfer and
other energy interactions in the system were analysed by the bond graph method which offers a different
perspective to pervious work. The main parts of the compressor system were mathematically modelled for
developing compressor characteristics. The comparison of the modelled and measured data shows good
agreement both in steady working condition and deep surge condition. Furthermore, the effects of differ-
ent plenum volume on the amplitude and frequency of the outlet pressure when the compressor operates
in deep surge were simulated and analysed.
4.1 Compressor
532
Figure 4. Word bond graph model of the compressor system.
533
4.1.3 Compressor resistance loss The continuity equation of the air in the plenum
The energy loss in the compressor includes the fan- is written:
shaped loss and the friction loss etc. For modelling,
the losses are simplified as fan-shaped resistance Rs dρ
and friction resistance Rb, which are described by wd w = Vp (13)
dt
the following equations:
The thermodynamic process of the air in the
0 7 ( Lcl rv )
2
Rs (8) plenum being adiabatic reversible, the relationship
between the density and the pressure of the air is
Rb 16 c rv5 nc3 ρ (9) written:
H p H out (20)
κ −1
Tout ⎛ pout ⎞ κ
= (21)
Figure 7. Bond graph model of the plenum. Tp ⎜⎝ p p ⎟⎠
534
Figure 8. Bond graph model of throttle valve.
p
Figure 9. Flow inertia of the air.
sponding to a supersonic flow, the air mass flow
rate is written:
1
⎛ 2 ⎞ κ −1 2κ
pp
wout μout Aout ⎜ ⎟ (22)
Tp ⎝ κ + 1⎠
RT κ +1
p
sponding to a subsonic flow, the air mass flow rate
is written: Figure 10. Overall bond graph model of compressor
system.
⎡ 2 κ +1
⎤
pp 2κ ⎢⎛ pout ⎞ κ ⎛ pout ⎞ κ
⎥
wout μout Aout −⎜ (23)
RTp κ − 1 ⎢⎜⎝ p p ⎟⎠ ⎟
⎝ pp ⎠ ⎥ I=
ρ Lc
(27)
⎢⎣ ⎥⎦ Ac
535
shown in Figure 11. The graph shows quite a good
agreement, especially for low speed.
Parameter Value
536
5.2 Surge characteristics analysis 2. The established compressor model has high pre-
cision and can be used to analyse the influence
The 16PA6STC diesel engine is a sequentially tur-
of several parameters on the performance of
bocharged engine. The volume of plenum can be
the compressor, so as to provide reference for
changed in a short time when one of the turbo-
the analysis and optimisation of the compressor
chargers is forced to blow against a closed valve.
system.
For this reason, an additional simulation was per-
formed to analyse the effect of the plenum volume
on surge behaviour. Figure 14 shows the evolution
ACKNOWLEDGMENTS
of outlet pressure and corresponding spectrum
map for the plenum volume of 0.1 m3, 0.25 m3
Supported by the National Nature Science Fund
and 0.5 m3 respectively (Galindo J. et al., 2006). It
of China (51579242).
can be seen from the graph that the amplitude of
outlet pressure increases and the surge frequency
decreases with the increase of the volume. The
REFERENCES
fundamental wave of the frequency signal gradu-
ally moves to the left. Compared to Figure 14(a), Afshari H.H., Zanj A., Novinzadeh A.B. (2010).
the amplitude of the pressure in Figures 14(b) Dynamic analysis of a nonlinear pressure regulator
and (c) increased 291.5% and 359.2% respectively. using bondgraph simulation technique. Simulation
The fundamental wave frequency is reduced from Modelling Practice and Theory, 18(2), 240–252.
14.0 Hz, to 10.1 Hz and 7.1 Hz respectively and the Fink D.A., Cumpsty N.A., Greitzer E.M. (1992). Surge
amplitude increased to 120.4% and 187.8%. dynamics in a free-spool centrifugal compressor sys-
tem. Journal of Turbomachinery, 114, 321–332.
Galindo J., Serrano J.R., Guardiola C. et al. (2006). Surge
6 CONCLUSION limit definition in a specific test bench for the charac-
terization of automotive turbochargers. Experimental
Thermal and Fluid Science, 30, 449–462.
An experimental and modelling work of a compres- Gravdahl J.T. (1998). Modeling and control of surge and
sor system based on bond graph has been presented rotating stall in compressors. Norwegian University of
in this paper aimed to analyse the surge phenomenon Science and Technology, Trondheim.
of the compressor. Firstly, the modelling of the com- Moore F.K. and Greitzer E.M. (1986). A theory of post-
pressor was introduced. Then the simulation and stall transients in axial compression systems: Part
experiment of both the steady state and the surge I-development of equations. Journal of Engineering
state were conducted to verify the model. Finally, the for Gas Turbines and Power, 108, 68–76.
effects of different plenum volume on surge behav- Sun J., Guo C., Wei H. et al. (2008). Calculation and char-
acteristic analysis on turbocharger surging of marine
iour were analysed. Simulation results show that: diesel engine. Journal of Dalian Maritime University,
1. The energy flow shown in the bond graph 34(1), 28–31.
method has obvious physical meaning and gives Wang W. and Wang Y.. (2007) Establishment of a
a simple description of compressor working dynamic model for a compressor and analysis of the
surge process. Journal of Engineering for Thermal
process, which is quite suitable for the model- Energy, 22(2), 124–128.
ling of complex physical systems that coupled
among multi-energy domains.
537
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: Optimisation is a common issue facing people in the fields of engineering technology,
scientific research and economic management. This paper, taking the operational management of a pig
farm as an example, makes simplifying assumptions, changes the original breeding process diagram, and
takes one month as the interval to obtain the recurrence relation. According to the required targets, opti-
misation models are respectively established to obtain the result that seven piglets per sow per year can
reach or exceed the breakeven point and three years’ total profit of 8,854,166 RMB, namely an average
annual profit of 2,951,388 RMB. The whole analysis and solution process reasonably reflects the situa-
tions occurring in the operational management of this pig farm, providing theoretical support for deter-
mining its operating strategy.
539
Figure 1. The prediction curve of the price.
a mathematical model and answer the following Model Assumption. (1) The farm uses the
questions: advanced artificial insemination technology (breed-
ing stock of boar: breeding sock of sow = 1:100). (2)
1. Assuming the cost of pig breeding and the price
Each sow gives birth twice. Each time, nine piglets
of a pig remain unchanged, piglets are not sold,
survive. (3) Pig farming costs remain unchanged;
and all porkets are turned into boars and pork
the feeding cost of a pork pig and spare boar is
pigs, to reach or exceed the breakeven point,
100 RMB/head/month; the feeding cost of a boar
how many piglets will a sow have on average per
in the growth period is 150 RMB/head/month; the
year?
price of a piglet is 300 RMB/head; the weight of a
2. Given that it takes nine months from fertilisa-
pork pig at slaughter is 100 kg.
tion to slaughter, assuming that the prediction
curve of price change of pig within three years
after slaughter is show in the figure, please
determine, according to the price prediction, 3 MODELLING AND SOLUTION
the optimal operating strategy of this pig farm,
calculate the average profit within three years, Problem 1. Given the following notations: F:
and provide the curve of number of livestock annual average number (heads) of piglets each sow
for sow and pork pig in this strategy. has per year; Z: breeding stock (heads) of boar
during growth period; Y: breeding stock (heads) of
Question Analysis. (1) The key to this question is pork pig; C: total breeding stock (heads).
to reasonably define the variables (pig breeding cost, According to the assumption, the annual
pig price, breeding stock of boar and breeding stock slaughter is two times the breeding stock and the
of sow), define the relationship between annual pigs slaughtered are pork pigs; the elimination
slaughter and breeding stock in this farm as well as period is four years, then the annual elimination
the annual elimination rate of boar, and establish the quantity of boars is 14 × Z. Breeding stock of
optimisation model with the minimum annual aver- boar: breeding stock of sow = 1:100, then breed-
age farrowing amount as the objective function, and 101 × Z. Calculate the annual
ing stock of sow is 100
reaching the breakeven point as the restriction. (2) average farrowing amount of each sow by divid-
The key factor to consider with this question is that ing the annual total farrowing amount (farrowing
the breeding stock of sows and the breeding rate of amount equals sum of annual breeding stock and
sows at the breeding age directly affect the breeding number of eliminated boars) by breeding stock of
stock of live pigs after nine months, thus affecting sows, and establish the (1) 1 of annual minimum
the profit ration. Therefore, first be clear that the total farrowing amount:
income source of this pig farm is selling pork pigs
and piglets. According to the prediction curve of the ⎛ 1 ⎞ ⎛ 100 ⎞
min F 2C + × Z Z
pig price provided, determine the reserve percentage ⎝ 4 ⎠ ⎝ 101 ⎠
to control the quantity of produced pork pigs as well s.t.0 ≤ ( C ) 2C × 100 × 9 − Z × 150 × 12 (1)
as the quantity of piglets and give the correspond- 0 ≤ Z ≤ Y ≤ Y + Z ≤ 10000
ing breeding process diagram. Take one month as
the interval to establish the recurrence model. Based Use Lingo software to solve the above model
on the recurrence results, establish the optimisation and obtain F = 7 Under the given condition, it is
model with optimal profit as the objective, calculate obtained that seven piglets per sow per year on
the annual average profit within three years, deter- average can reach or exceed the breakeven point
mine the breeding stocks of sows and pork pigs in and will not affect the scale of this pig farm.
a certain period, and obtain the optimal operating Problem 2. According to the result analysis of
strategy of this pig farm through prediction. Problem 1, determine the reserve percentage to con-
540
trol the quantity of pork pigs as well as the quantity
of piglets, and change the original breeding process
Diagram 1 to the breeding process Diagram 2.
Assume that each sow gives birth to 18 piglets
per year, then a sow can give birth to 1.5 piglets per
month. According to the question, given the fertil-
ity period of a sow is generally three to five years,
averaging three years, so assume the elimination rate
of sow and boar is 1/48. According to the literature
(Shouzhi, 2003), the lactation period of the piglet is
35 years, it takes 35 days for porkets to turn into pig-
lets, pork pigs and spare sows, and it takes 110 days
for a pork pig to grow until slaughter. According to Figure 3. New breeding process.
the predicted data for pig prices within three years in
the question, we take one month as the interval, and
establish the following recurrence (2): From the literature (Shouzhi, 2003), according
to the recurrence (2), by adjusting the percentage of
1 30 25 reserve Ci, the percentage of pork pig Ci and the
Sn Sn − Sn Hn number of piglets sold, establish (3) with the high-
48 110 26
1 30 1 est total profit within three years as the objective
Gn Gn − Gn Hn function:
48 110 26
30
H n +1 = Cn Ln × 36
3
35 max = ∑ (P × xi i × 100 + Qi × 300 − ( + ) × 150
−( ))
i =1
Rn Sn + + ×
2 (2)
30 Pi + Qi Si + Gi Li + H i Yi ≤ 10000, i = 1, 2, , 36
Ln Rn
35
30 (3)
Yn Cn′Ln ×
35 Use Lingo software for the solution and obtain
30 the total profit 8,854,166 RMB, within three years,
Pn Yn
110 namely an annual average profit of 2,951,388 RMB.
30
Qn ( Cn − Cn′ ) L n × 35 Meanwhile, give the breeding stock of sow and the
breed stock of pork pig within three years accord-
ing to this result, and draw the corresponding curve
Wherein: Si: breeding stock of sow; Gi: breed- graph.
ing stock of boar; Ri: breeding stock of piglet; Li: Model Evaluation: Problem 1, make simplifying
breeding stock of porket (nursing pig); Yi breeding assumptions, consider the relationship between
stock of pork pig; Hi: breeding stock of spare boar; various cost parameters and pig price and, accord-
Qi breeding stock of piglet; Pi slaughter quantity ing to the model, relatively ideally, calculate the
of pork pig; xi: average pig price per month within farrowing amount of each sow per year. This
three years after nine months; Ci: percentage of result, to a certain degree, can determine the breed-
porkets selected as boars; Ci′ : percentage of por- ing stock of sow, thereby saving the breeding cost.
kets selected as pork pigs, (i, j = 1,2,…,36). Problem 2, clarify that the income source of this
pig farm is selling pork pigs and piglets, accord-
ing to the prediction curve of pig price given in
the question, give the corresponding breeding pro-
cess diagram, establish a clever recurrence mode,
obtain the optimisation model with optimal profit
as the objective, calculate the annual average profit
within three years, and determine the breeding
stock of sow and breeding stock of pork pig within
three years. However, in the modelling process,
we should note that there is a certain deviation
between the predicted pig price given in the ques-
tion and the actual price. Therefore, by considering
the deviation, we can better determine the optimal
Figure 2. Original breeding process. operating strategy of this pig farm.
541
Figure 4. The curve graph of the breeding stock of sow and breed stock of pork pig.
4 CONCLUSION pork pig breeding stock within the three years have
also been given under this result. In addition, the
From the abovementioned assumed conditions of corresponding curve has been drawn.
the mathematical model: 1) boar breeding stock:
sow breeding stock = 1:100; 2) each sow gives
birth twice annually with nine piglets surviving ACKNOWLEDGEMENTS
each delivery; 3) the feeding costs of pigs remain
unchanged with the feeding cost of pork pigs and This paper is supported by the Guangxi Office
breeding pigs being 100 RMB/head/month, and for Education Sciences Planning, China (project
the feeding cost of pigs in the period of duration approval number: 2013C108), and Guangxi Pro-
being 150 RMB/head/month; the selling price of vincial Natural Science Research Project for Uni-
piglets is 300 RMB each; the weight of pigs that versities (project approval number: 2013YB378),
are ready for slaughter is 100 kg. F = 7 is obtained and Characteristic Professional Project fund of the
by utilising Lingo software to solve the mathemat- Education Department of Guangxi, China (pro-
ical model, that is, as long as the annual average ject approval number: GXTSZY277).
farrowing quantity of each sow reaches seven, the
breakeven point can be achieved or surpassed, and
there will be no impact on the scale of the livestock REFERENCES
farm. Under the condition that each sow delivers
18 piglets, each sow can give birth to 1.5 piglets Lijie, Z., & Xibiao, W. (2009). Simulation study of
monthly. As the period of duration for sows gener- dynamic change of pig herd in pig farm. Northeast
ally lasts for three to five years, the monthly elimi- Agricultural University (in Chinese), 40(6).
nation rate of boars and sows is 1/48 by taking the Ni, R. (2013). Primary investigation of ordinary differen-
tial equation teaching by integrating mathematical mod-
average duration period of four years. Through eling thought. University Education (in Chinese), (4).
making use of Lingo software again, it can be Qiyuan, J., & Jinxing, X. (2003). Mathematical model.
obtained by solution that the total gross profit of Higher Education Press, Beijing.
the three years is 8,854,166 RMB, that is to say, Shouzhi, Z. (2003). Pig herd structure in modern pig
the annual average profit is 2,951,388.67 RMB. breeding and calculation of pigsty configuration. Pig
In the meantime, the sow breeding stock and the Breeding (in Chinese) (2).
542
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Hongen Li
Department of Basic Courses, Zhengzhou University of Industrial Technology, Zhengzhou, China
Shuxian Deng
Department of Basic Courses, Zhengzhou University of Industrial Technology, Zhengzhou, China
College of Science, Henan University of Engineering, Zhengzhou, China
ABSTRACT: We consider global large behaviour on a 2-D equation in turbulent fluid. We use a so-
called energy perturbation method to establish results of numerical simulations of some selected unsteady
flows via the analysis of the governing PDE. We show that boundary conditions necessary to solve the
incompressible 2-D equation are conditions either for the normal or alternatively for the normal velocity
with discretised algebraic method, by estimating the relationship between energy inequalities and attenu-
ating property of weak solutions. Under various assumptions on u, we obtain estimates for the size of its
large behaviour.
543
solution, in the case of small initial data. Mak- For some constant β > 0, where u0 H
+ u1 H2
ing use of combining the Lp-theorem of Sobolev is a constant depending on:
space and semi-group theorem of operators,
Nakao (2016) and Kato (Friedman & Necas, 2014)
{ }+ ∫
2
utt ( s ) ds ≤ C ( M M ).
ω
sup ut t + ∇utt t
devised a certain decay rate of the energy of global 0
t ∈[ 0 ]
solutions with large data under a specific condi-
tion, which is certainly satisfied if the mean curva-
It turns out that this has an influence on the
ture of the boundary ∂ Ω is non-positive. For n > 1
control of weak solution with structural damping.
and f = 1, nonlinear elliptic equation with periodic-
We can continue the following argument.
ity conditions was studied (Kato, 1984):
d γ υ
( 2+
x′′ ( ) + τ0 ( + )
( + ) )
() ≤ y(t ) + τ 1 (1 + t )δ (6) 2 MAIN RESULTS
n We note that Equation (6) implies the existence
wt Δw + u(r ) q = + 1 − pn + 2 pδ
2 of u0 u1 ∈ H 2 as a distribution. Also Equation
(7)
(4) is known as the energy inequality. This con-
cept of a solution appears too weak to guarantee
With w(t ) = u (t ) − u0 (t ) c, and that C 2 ( I L2 ) satisfies local energy type inequali-
ties or that p is an integrable function. In order to
describe the manoeuvrability, let us define global
y(t ) = w (t )
m
(8)
p weak solution with decay for Equations (1)–(3).
w( x t ) w(x
(x t) (9) In the above theorem, we can denote the Haus-
dorff function ω, one measure that uses parabolic
d ′ ( ) + k1 w1 (t ) − w2 (tt d (tt ≤ k2 d ( )
υ p + q −1
cylinders for coverings (as defined above in Equa-
p
tion (7)); we say that Equation (5) is a suitable
+κ d ( ) μ υ +1
w1 (t ) 2 weak solution to Equations (1)–(3), if u and ω are
−
λ Lebesgue measurable functions on R2 and:
In the case of w(t ) ≤ k0 ( t ) 2 , and: (a)
τ n 1 1 1⎧ ∇ω
2
⎫
∫Ω ∫ τ ( ) dξ ddy ⎬
2
⎨ ω t (t
( − ))
w(t ) p ≤ τ ( t)
(
2 2 2 p
(10) E (t ) ≡ (t )
2⎩ 0
⎭
1⎧ ∇ω 0
2
⎫
τ (ξ ) dξ dy
t
= ∫ ∇ω t (t ) ds
d + ⎨ ∇ω1 (t ) + ∫ ∫
2 2
Thus, we can conclude immediately the follow- d ⎬
0 2⎩ Ω 0
⎭
ing results (Beirao da Veiga, 2014):
(b)
Lemma
f ( x, t ) H 1 ( I , L2 ( )) ∫ {(div (τ∇ω ) , μ ) − (Δω , μ ) − ( f , μ )} = 0
t
Let and u0, u1 t
∈ 2 (Ω) ∩ 01 (Ω) , then under assumption H1,
0
∞ Θ {Γ Ω → Γ ∈ Γ′ ∈
Γ Ω }
+ ∫ ∇utt ds ≤ Ce − β t
2 2 2 2 2
utt + Δu + ∇ut (t ) + Δut
t
544
∫ {(ω (τ∇ω ) , μ ) (Δωt , μ ) ( f μ )} = 0
And notice that:
μt ) − (
t
t
0
p−2
E (ξu t ) tω L2 + (ϕ (∇ω ) ,κ )
2 1/ 2 3/ 2 2 p
t 2 ∂ tv ≤ λ t 2 ∂ tv L∞
∂ tv L2
≤ C 3ρ 2 2
∂tω L∞
H p
(∂ )= (v Δ xφ − (
∂tv, Δ x ) + (v ) + ( g,φ ) −
pn + 4
∇ω L2 + λ ( ∂tω ,ω )
2
(19)
p+4 n
following estimate:
ε
where the constants Cε and λε depend only on ε.
γ
≤ λ1 y ( ) Hence by the standard Galerkin method, inverse
( + ) μ
y ′ (t ) + y(t ) 2 + λ2 ( + t ) − q ⋅ ∇xω (t ) (12)
domination principle, interpolation inequality, and
ω ∈ L∞ ([ 0 T ], H 2 ( ) ∩ H04 ( )) (13) Young and Sobolev inequality, this section can be
estimated by:
ω ′ ∈ L∞ (Θ, H 04 ( )) (14)
)) (15)
∀ξ1 ξ2 ∈ 2 (21)
Thus:
3 CONCLUSION
n +1
⎛ 4
1 1
−
2 p
⎞
To verify the correctness of the above theorem, we α u ⎜ v0 + u ⎟
will give its proof. In fact,, for n = 3 ω ∈L1 ∩ Lp ,
Lq
⎜⎝ L2 p L2
⎟⎠
and v (t ) − v0 (t ) ≤ σ (1 + t ) ( − ) note that the initial
γ (22)
p+2 p −1 λp
≤α λε + Cε u
3 q
d κ
λ+
δ ′ ( ) + λ1 ( + )
κ
⎛ ⎞
1
p
2 y(t ) 4 2 p+ μ p μ
∂t ∂ tv L2
+ u L2 ⎟ + ρ ∂t L2 p
+C u L2
+ ∂t u L2
n ⎛ 1 1⎞ 1 ⎝ ⎠
≤ λ2δ ( ) ⎜ − ⎟
2 ⎝ 2⎠ +ε( + )−( − ) δ ( ) q (17) 1 n
≤ ( ( ) −∂ )1+ γ
+
2
( ′ (∇ ) 1
∇ ∂ ) −
2 (24)
Where ε is a small positive number, which will n⎛ 1 1⎞
≤ C (1 + ) +C ε (1 + ) +C 0 (1 + )
− pυ − − −γ
2⎝ 2 ⎠
be fixed. Then we arrive at:
545
2 Cε 2 2 2 2 2 2
Obviously, from Equations (27)–(32), we can
u + g + ∇u + g + 1 ∂ t u H + u H easily establish the control of stability for poly-
4 nomial decay to Equations (13)–(15). In compari-
≤ ( g ut ) − ∇ut (t ) + 1 ∂t u H + u H − ε ∇u
2 2 2 2
(25) son to Equation (12), we give the strong stability
p +υ
≤ ε ut
2
− a ∇u + κ 2 ∂t u
2
estimates. Add the limit t → ∞ to the dissipative
L1−a H
Equation (12), for the approximations ω(t), and
Similar to above, we derive the differential inequal- together with Sobolev embedding theorem, we can
ity as long as the local weak solution u(t) exists, insert- immediately conclude that the limit weak solution
ing the above estimates, and using the energy estimate ω(t) also satisfies:
for estimating the energy norms. One can get:
+ (∂ ) ∇ω 2H
2
∇ + ∂t L2
utt − i {(a ∇u r + ) ∇u} Δut + Δ x u g ( x t )
2
t (36)
+ ∫ ∇h( x ) 2 ddx + λ (1 + t )
2
≤ ∂t u1
( g u − g u Δ x ∂tv ) + Δω n + 0 | ∇ω n |q (26) L∞ 0 L
2 2−s
≤ ε g ( u1 ) − g ( u2 ) L1
+ C ε ∂ tv H
Let the assumptions in Equations (2) and (4) be
satisfied with θ = 2, and f t ) ≤ κ e −2 ρt . Then, the
Alternatively, by Young’s inequality, choosing local weak solution with attenuation ω(t) of Equa-
ε > 0 small enough and E(t) is bounded, we finally tions (1)–(3), which satisfies the additional regular-
deduce the following: ity, and exists constants M > 0, v > 0, such that:
g′′(t ) + E (t ) + a( + t )τ g(
g (t )2 +σ
∞ (t ) ≤ Me −3νt
≤ E( ) + β( + t )1− + C6 ∫ g (t ) dt
2
(27)
0
Choosing θ appropriately, one deduces from
G0′ (t ) + C3G (t ) C4 M1 (1 t )− ρ1 (28) Equations (12) the Caccioppoli inequality:
g (t ) ≤ Ci ( t) G ( ) (1 + t )− λ1
− pk
+ KG (29)
∫ ∫ v s − t ( ⋅ ) (u, s )dx
2
∇ + d
Qr ( x t ) Br ( x )
B
λρ s +t ≤ r 2
3
Using now Equations (20)–(22) together with cr -2 ∫ s ( s t )dtds
the interpolation inequality, we infer from Equa- Qs ( x t )
3 3
tions (25)–(30) that: ≤∫ s ]dxd
ddxdt ∫ ρ f dxdt (38)
Qs ( x t ) Qs ( x t )
g′′(t ) + C3 g (t ) ( ) ≤ C4 M1 ( + t ) − λ1
Cσ E (e − λσ t )
t
≤∫ C K
Ke 7
(C λ)
ds + ∫ δ 2 Δuk dx
d (35) 2Cε e −Cε t ≤ E (u t )
0 B ( x0 ,r )
546
The integral involving Equation (35) is under- Friedman, A. & Necas, J. (2014). Systems of nonlinear
stood as a principal value. Noting the energy wave equations with nonlinear viscosity. Pacific J.
solution of Equations (1)–(3) is unique and the Math., 135, 29–55.
Lipschitz continuity is in a weak space, there holds Friedman, A. & Necas, J. (2013). Systems of nonlinear
wave equations with nonlinear viscosity. Pacific J.
Equations (12)–(15). Hence, the theorem is com- Math., 135, 29–55.
pleted, and we come to the conclusions on the glo- Kalantarov, V. & Zelik, S. (2013). Finite-dimensional
bal large behaviour. attractors for the quasi-linear strongly-damped wave
equation. J. Differential Equations 1–36.
Kato, T. (1984). Strong LP-solutions of the Navier-
ACKNOWLEDGEMENTS Stokes equations in Rn, with applications to weak
solutions. Math. Z., 187, 471–480.
This work was supported by the Ph.D. Founda- Nakao, M. (2015). Energy decay for the quasilinear wave
tion of Henan University of Engineering (No. equation with viscosity. Math. Z., 219, 289–299.
Nakao, M. (2016). On the strong solution of some qua-
D2010012). silinear wave equations with viscosity. Advances in
Mathematical Sci. Appl., 6, 267–278.
Qin, Y., Liu, X., & Deng. S. (2015). Decay rate of qua-
REFERENCES silinear wave equation with viscosity. Acta Math App
Sinica, 17, 147–152.
Beirao da Veiga, H. (2014). Existence and asymptotic Qin. Y. (2013). Global existence of a classical solution
behavior for strong solutions of the N-S equations. to a nonlinear wave equation [J]. Acta Math. Sci., 17,
Indiana Univ. Math. J., 36, 149–166. 121–128.
Cheng, K.-S. & Ni, W.-M. (2012). On the structure of the
conformal scalar curvature equation on RN. Indiana
Univ. Math. J. 41(1), 261–278.
547
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: Aimed at the complexity of the GLONASS (Global Navigation Satellite System) almanac
algorithm, this paper presents a simple and fast almanac parameters user algorithm model. This algo-
rithm is reconstructed based on the GPS almanac parameters user algorithm and it considers the effects
of harmonic perturbation, orbital period and the change rate of satellite orbital period. Meanwhile, the
related calculation formula is derived and the calculation steps are given in detail. Finally, the algorithm
is proved to be simple, effective and highly accurate using the precise orbit data of IGS (International
GNSS Service, IGS). The results show that the algorithm can fully meet the user’s requirement for posi-
tion prediction precision.
Almanac parameters are an important part of tλAn An instant of a first ascending node within a day
the satellite navigation system, and plays a very
important role during navigation signal acquisi- λ nA Greenwich longitude of ascending node at instant
tion process (Wang & Huang, 2013). In the absence
of auxiliary information, the satellite receiver can ΔinA Correction to the mean value of inclination at
instant
estimate its compendium of position and veloc-
ity information according to almanac parameters. ΔTnA Correction to the mean value of draconian period
at instant
Thus the visible satellite can be reappeared and
search directly. At the same time, according to the ΔTnA Rate of change of orbital period
satellite velocity, the outline Doppler frequency ε nA Eccentricity of satellite orbit at instant
can be estimated, which can assist the navigation
receiver to search for the navigation signal quickly ω A
n
Argument of perigee of satellite orbit at instant
at the signal acquisition phase. It also greatly short-
ens the time to capture the satellite signals, so as to
shorten the first positioning time (Li & Zeng, 2016;
Wang & Zhang, 2015). Therefore, the simplicity orbit elements, satellite health information and so
and high efficiency of the almanac parameters user on. The satellite almanac parameters can predict
algorithm can directly affect satellite navigation sig- the satellite position and velocity to enhance rapid
nal tracking performance of receivers (Li & Wang, acquisition of the navigation signal for the naviga-
2014; Anyaegbu & Townsend, 2014). Aimed at the tion receiver. The GLONASS satellite almanac
complexity of the GLONASS (Global Navigation parameters are shown in Table 1 (GLONASS—
Satellite System) almanac parameter user algo- ICD, 2008).
rithm (GLONASS-ICD, 2008), this paper presents
a simple and fast GLONASS almanac parameters
user algorithm. The calculation steps and specific 3 GLONASS ALMANAC PARAMETERS
formula are given in detail. The availability and USER ALGORITHM
accuracy of the almanac parameters user algorithm
are proved to be high based on IGS (International According to the GLONASS interface control
GNSS Service, IGS) precise orbit data. document, the almanac parameters user algorithm
is very complicated. Based on the motion rule of
navigation satellite, a fast prediction algorithm
2 GLONASS ALMANAC PARAMETERS of satellite motion state is proposed. The specific
steps are summarised as follows (Tang & Chen,
The GLONASS satellite almanac parameters 2002; Wen, 2009; Jing & Wu, 2015; Xie & Song,
include the GLONASS time parameters, satellite 2015):
549
1. Calculate the normalisation time: ik ΔinA +0.35π (13)
tk t − tλAn (1)
10. Calculate the change rate of the mean anomaly
and the change rate of the eccentric anomaly:
2. Calculate the satellite orbit period:
M n k + 2 nk tk (14)
ΔTnA ⋅ tk
k
Tk ΔT + 43200 +
A
(2) M
ΔTnA + 43200
n
E k = k
(15)
1 − ε n cos E k
A
2
A k GM 1 3 n −k5 3 ⋅ nk (19)
⎛ 1 − ε nA ⎛ ω A ⎞⎞ 3
E0 k = 2 arctan ⎜ tan ⎜ − n ⎟ ⎟ (5)
⎝ 1+ εn A ⎝ 2 ⎠⎠
12. Calculate the satellite position and velocity in
M0 k E0 k − ε nA ⋅ sin E0 k (6) orbit coordinate system:
vzk ′ sin ik
vyk (32)
⎛ 1 + ε nA E ⎞
φ k = 2 arctan ta k + ω nA (11)
⎝ 1 − ε n
A
2 ⎠ where, μ is the gravitational constant in PZ-90, J2
rk Ak ( − A
n Ek ) (12) is the harmonic coefficients of gravity field, and Re
is the earth’s radius.
550
4 EXAMPLE AND ANALYSIS UTC (SU ) U C (USN
h = UTC U O ) lea
l ap seconds (33)
The availability and accuracy of the GLONASS
almanac parameters user algorithm mentioned Figure 1 shows the variation curve of satel-
above in this paper is verified using the precise orbit lite position accuracy which is predicted using
data of IGS (International GNSS Service, IGS) the almanac parameters user algorithm. From
and STK (Satellite Tool Kit, STK) based on the the Figure, within the validity period of almanac
corresponding GLONASS almanac parameters of parameters, three-axis position prediction error is
IGS respectively. The interval of precise orbit data less than 3 km. By analysing the data, the mean
generated by STK software is one minute. values of three-axis position prediction errors are
The satellite almanac parameters and correspond- 1,291.2 m, 1,482.5 m, 463.5, m and the absolute
ing ephemeris parameters of GLONASS satellite error is 739.8, m, 756.4, m, 270.1, m respectively.
number 17 in IGS are shown in Table 2 and Table 3. The simulation results show that the prediction
The almanac parameters are used to predict the sat- accuracy of the almanac parameters user algo-
ellite position, to compare with the precise orbit data rithm mentioned in this paper is high, and it can
of IGS and the precise orbit data generated based on fully meet the need of the satellite fast acquisi-
ephemeris parameters of IGS by STK. tion and forecasting satellite position (Li & Wang,
The verification method is to contrast the satel- 2014; Ma & Zhou, 2014).
lite orbit data predicted using the almanac parame- The satellite position and velocity are predicted
ters of IGS above based on the GLONASS almanac based on the almanac parameters of IGS, which
parameters user algorithm proposed in this paper, are used to compare with the STK precise orbit
with the satellite precise orbit data of IGS. The data. Figure 2 and Figure 3 are the satellite position
satellite orbit prediction interval is 15 min and its
prediction time length is one day which is the GLO-
NASS satellite orbit period. Since the reference time
UTC (SU) of almanac parameters is not the same
as the reference time UTC (USNO) of precise satel-
lite orbit data, it needs to consider the conversion
relationship between the two kinds of time:
A 11388.0937
λn
λ nA 0.2944613
Figure 1. Error curves for the position prediction data
ΔiinA 0.01045895 using the almanac parameters of IGS based on the alma-
nac parameters user algorithm is compared to IGS pre-
ΔT
TnA –2655.971 cise orbit data.
ΔTnA –0.0003051758
ε nA 0.001801491
ω nA 0.9805298
551
REFERENCES
552
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Shuxian Deng
Department of Basic Courses, Zhengzhou University of Industrial Technology, Zhengzhou, China
College of Science, Henan University of Engineering, Zhengzhou, China
Hongen Li
Department of Basic Courses, Zhengzhou University of Industrial Technology, Zhengzhou, China
ABSTRACT: This work presents some results regarding the stability of local solutions for the system
of equations. The method is based on damping in multi-dimensions and introduces a mixed Fourier pseu-
dospectral and Hermite finite difference scheme in space, and an efficient projection method to solve stress
velocity coupling. The local existence and pointwise estimates of the solutions are obtained. Furthermore,
the optimal stability and convergence rate of the solution when it is a perturbation of a constant state is
obtained. It is shown that for some compressible equations, the corresponding local stability result holds
and the properties of the analytic semi-group are employed to show the compactness for the semi-process
generated by Euler solutions. Provided that the compressible equations are strictly stabilised.
553
ytt σ yx + λ yxt (11) important, especially when the compressible infi-
nite-dimensional dynamics system is studied.
First, the local stability of weak solutions is
With different boundary conditions from (2).
focused upon in order to describe the manoeu-
Qin et al. proved the local existence of solutions
vrability; and local weak solution with decay for
to initial-boundary value problems, or periodic
(1)–(3) is defined:
boundary or Cauchy problems of the equation
If the initial data satisfies u0 u1 ∈H
H 2 H 04 ,
(1)–(3).
and the function ω is said to be a weak solution
For some positive a,p ∈[1/2,2) C > 0, and q > 0
of problem (1)–(3), if it satisfies the following
there is a weak solution, which fulfils additionally
conditions:
q
d a | x |p f x, t ) d ( ) ∀s ∈ 3
), (12) δi δ t (x
(x λ ) ο(
) (16)
d λ∇u
utt − div 2
Δut = f x t ) (13)
sup
up ( ) μ ( A) upζ (Ε )
sup (17)
meas ( Ω ) meas ( E )
Several techniques to prove the existence of
weak decay solutions with respect to the phase The measure μi can thus be defined equivalently
space are available; and in addition have suitable as
properties with energy inequality for almost all
times or solutions with weak decay properties for Ts θ x δθv vθ x2 (18)
t → ∞ (this has been studied recently by several
researchers, e.g. Qin, Ebihara, Xin Liu, etc.). In fact, for smooth solutions, (1)–(3) are equiva-
This represents an implementation of an axial lent to (16)–(18). In what follows, (16)–(18) will be
movement of the viscous material, and cause the considered with the initial data
form of above equations, in two, three-dimensional
case, they describe the viscoelastic solid of anti- γ t + di (γ u ) = 0 (19)
plane shear action. While n = 1 and f = 0, ST Li
prove the existence of weak periodic decay strong ( ) d ( ) ρ (δ )x α u j
(20)
solution on the periodicity condition, X.K Su and
k
J.L. Zhang proved the controllability of a smooth
solution.
f W p ∑∂
n=0
k
m f Lp
(21)
For some constants ρ0, M > 0, τ ∈ H 4 [ 0, +∞ )
satisfies: where
υ
x′′ (
d
θ θτ ( ) = θ xτ (
) +τ0 ( + )( + )
≤ y(t ) + τ 1 (1 + t )δ (14) )
Thus, a so-called energy perturbation method The following is the main result in this paper:
can be used to establish weak controllability of Theorem. Let
solutions in terms of energy norm for a class of
non-linear functions. μi ({ }) σ i ,θ ( ) 1
( ), θ (s) > 0 (22)
The controllability in a steady state will be
shown with the help of differential inequalities, And set
by estimating the relationship between energy
inequalities and the attenuating property of weak pi = mi ( x ) (v x+
x v x−
x ) (23)
solutions. Furthermore, a small positive number
will be determined and differential inequalities Then for any fixed f ∈ℜ 2 and for any
derived by using a perturbation of energy, from
which the following results are concluded.
Υ( ) Q (u(( )) + C0G (u(( ))
554
w2 d vd
G (u t ) g′′ ( ) ≤ ( + )
p +1
wt + ( ) = − ssgn( x ) (25) g (t ) ≤ ε ∂ tv (34)
λ x dt H2
np − γ C4
Here and hereafter ∂t L2
≤ Φ (35)
2
pv (v s ) pv ((vv x ) − p(v ) pυ (v ) (28) γ 1 d
ε2 2
∇x υ 2
L2
≤ M u (36)
2 4
Is a generic constant. If it is further assumed 2r
that a ∇u L2 r
≤ C2 E (t ) (37)
( )( ) |t 0 (v0 , u0 ,s
, s0 )( x ) On the other hand, by Young’s inequality,
choosing ε > 0 small enough and E(t) is bounded,
For some positive constants ζ1 and κ1, then there and finally the following deduced
exists a constant ρ1 = ρ1 (δ1 (τ )) > 0 such that
For any fixed β∈(0,β1], and any t ≥ τ ≥ 0, there is G0′ (t ) + C3G (t
(t ) C4 M1 (1 t )− ρ1 (38)
λρ 1
ut + ξ(v s )x = 0 g′′ ( ) + C4 (1 + t ) < C5 ( + ) −
(29) 2 1+γ g (t )β (39)
There are two families of expansion solutions Using now estimate (30)–(35) together with
for (29) which are the compressible Euler equa- the interpolation inequality, from (34)–(37) it is
tions with Riemann data. Here and hereafter, use inferred that
n
W 2
H m , ⋅ = ⋅ L2 and ⋅ m = ⋅ H m g′′ ( ) ≤ C6 g ( ) p( p+2 ) (40)
C0 g (t )
p + 2 −υ p+2 n
≤ C7 e K ( L − s ) ξu ( x ) L2
(41)
n
+C7 g (t ) p ( p
p+2 p 2 n
3 CONCLUSION ξu L 6 ξu ( x ) L2
) (42)
Without loss of generality, the initial-boundary Now fix k, m, c. Then, taking advantage of the
value problem for the following non-linear com- smoothing property together with the obviously
pressible equation is considered: bounded E(t)
utt − i {(a ∇u r+ )} − Δut g(x t ) (30) (t ) ≤ 2 (t ) ≤ 2 g (t ) (43)
2 C7 (0 ) G0 (t ) G (0 ) (1
2 KG t) −K
(44)
Δω n + m | ∇ | ≤ C ε ∂t + m0 | ∇vn | (31)
G0 (t ) ≤ G (0 ) (1
n H2
t) −K
≤ C8M3e λt
(45)
( g(u ),∂tv ) + Δω n ≤ ε | v |2 q + m0 | ∇vn | (32)
Ct
Multiplying both sides of (44)–(45) by e and
∂2
Consider a closed linear operator A = : integrating from 0 to t, will derive
∂x 2
H 2 (0 ) H 2 (0
(0 1) C6 ( s ) ≤ ∫ δ 2 f uk ) p( x )Δuk ddx (46)
B ( x0 , r )
∫ dx ≤ ∫
q
With the domain τ 2 g ( uk ) p( x ) ∇uk dx p( x )Δuk dx (47)
B ( x0 r ) B x0 , r )
D(A) w 2 p ( , ) ∩ w02, p ( , )
∫ B ( x0
τ ∇ ∫
B x0 , r )
δ 2 f (uk )dx
d (48)
Analogously, for some positive ε, υ, ρ, together
And finally obtain
with the Hölder and Young inequality and the
( )
Euler interpolation u1
∫
2 2
( (t ) H
(t ) δ H
(t ) − H
1+
v u0 (49)
C (1 + t ) g (t )υ ≤
−ρ 2 2
+ v(( ) − δ
2
Cg (t ) ∂ tv L2
(33) H
d c u( ) H2
555
( (t )
2
H
(t ) δ
2
H ∫u0
u1
(t ) − δ
2
H2
(50)
E (t ) = sup {
u u ( x,tt ) m + v ( x,t ) m } δ ( x, t ) 2
m
≤ σ 0 e λt
+ v(( ) − δ
2
)
)d c u( )
2 (59)
H H2
( ρt (t))
2
H ∫
u1
u0
( t) δ
(t)
2
H
ρt (t )
2
H ) ξ ( ρ (0) )
9 t
2
H2
By using Sobolev and Hölder inequality, it is
known that (41)–(44) implies
(51)
(52) v0 ( x ) + θ 0 (x
( x ) V (t x ) + Θ(t
(t x ) (61)
Moreover, if for δ ≤ 3/2, there exists a sufficiently For all (t, x)∈R+ × R and some positive con-
small constant α such that stants, the Cauchy problem admits a unique local
smooth solution (u, v, τ)(t, x) satisfying
θ pv ( θ )
>1 u { (u( x t ),v(t x ), τ (t x )) } = 0
lim sup (62)
qθ (v θ ) t →+∞ x R
constructed as above. 1
Given a suitably small but fixed constant β > 0, ∫ ∇ 2 p
≤ υ( () ) (64)
Ω 2
let u(t, x) be the unique local smooth solution to
the Cauchy problem. And notice that
st + sx = 0 1 ⎧ ∇u1
2
⎫
(53) E (u(t )) = ⎨ ∇ω1 (t ) + ∫ ∫0 σ ( ) ω (t ) d ξddx ⎬
q
2 ⎩ Ω ⎭
S (t x ) + λ1 (u(t, x ) s ) = s(t
(t x ) + ( ρ(t,x)
x) s) (54)
γ 1 p−2 ⎛ 1 ⎞ pn + 4
E (ξ u t ) + ⎜ G (ω ) ,
p 2
ω ∇ω
For n = 2 ω ∈L2 ∩ Lp , and v (t ) ≤ σ ( + t ) 3 q , p
t L2
⎝ q − 1⎠ p+4 n
L2
d 1 ( )
= μ ϕ ′ (∇ x u ) ∇ x u + β ( gg((u ), ω )
δ ′ ( ) + λ1 ( + )κ 2 δ ( )q p
κ (55) pn −1
∫u
n ⎛ 1 1⎞ 2
≤ ε( +
− ( p − r) λ+ ddx ≤ ω + σ ∇x u
) λ 2δ ( )
2
⎜ − ⎟
y( ) 2 ⎝ r 2⎠ H02 LP
C
≤ ε ζ( ) + λε γ
ω + δ E ξu (t )
where ε is a small positive number which will be β Lp
⎜ ϕ ′ (ξ ) + u L2 ⎟
n +1 2 p
α Lq
⎝ ⎟⎠ (65)
And notices that
− ϕ ′ (ξ ) + Cε u
p+2 p −1 λp
≤α 0 L p Lp Lp
utt λ Δu + γ ut R(v u ) (57)
By the properties of heat kernel, it can be
⎛ 1 ⎞ deduced that
Φ( y ) = div ⎜ ∇∂( y ) − ϑ 3 ⎟
⎝1+ x ⎠ (58) ⎡ pn − 2 n + 2 pα ⎤ pn
− div((δ y ( xy )t )) + ( ∑ u kv λ + ∑ u k divvδ ) ∂t ⎢
+ −
(∂tv,v )⎥ + 0 (∇ +∇ ) n−2
μ ,k μ ,k ⎣ p n ⎦
1
≤ C1ϕ ( ) p + C2 (1 t )− μτ v p + 2 (66)
Under a priori assumption, the following will be
estimated,
556
1 REFERENCES
κϕ ′ (∇ )
p+ μ p
ρ ∂t L p
+C L
≤ κϕ
2 (67) Beirao da Veiga, H. (2014). Existence and asymptotic
n⎛1 ⎞
≤ C( + )− pυ +C ε ( + )− 2 ⎜⎝ q −γ ⎟⎠ behavior of strong solutions of the N-S equations.
Indiana Univ. Math. J., 36, 149–166.
Friedman, A. and Necas, J. (2015). Systems of non-linear
It is well-known that (64)–(67) generates an wave equations with non-linear viscosity. Pacific J.
analytic
semi-group of bounded linear operators Math. 135, 29–55.
E (t ) on D = H2(0, 1) verifying Greenberg J.M., MacCamy R.C., and Misel V.J. (1968).
τ δ On the existence, uniqueness and stability of solutions
of the equation σ (ux) uxx + λuxtx = ρ0utt. Math.
( 1
)( ) ∫(
0
)u( )d + ∫ (ξ
τ
)v(ξ )d
) ξ (68)
Mech. 17, 707–728.
Kuttler, K. and Hicks, D. (1988). Initial-boundary value
E (t )W0 H2
Ke
K /3
W0τ H2
< +∞ (69) problems for the equation utt = (σ(ux))x+(α(ux)uxt)
x+f. Quart. Appl. Math. 46(3), 393–407.
Which together with the proposition (30)–(39) Liu, Y. and Liu, D. (1988). Initial boundary value prob-
implies that (65) (69) is the translation compact in lem, periodic boundary problem and initial value
problem of equation utt = uxxt+σ(ux)x. Chin. Ann.
E (t ). Furthermore, the conclusions (57)–(64) also
Math. 9 A, 459–470.
follow from propositions (44)–(50) respectively. Nakao, M. (2005). Energy decay for the quasilinear wave
Noting that the uniqueness of exponent solution equation with viscosity. Math. Z. 219, 289–299.
and the Cauchy conditions in a strong solution
space, there holds (68), (69). Thus, the conclusion
of local stability of the solutions can be drawn.
ACKNOWLEDGEMENTS
557
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Jue Xie
Southeast University-Monash University Joint Graduate School, Suzhou, China
ABSTRACT: Sentiment analysis has become an important research area with the rapid growth of Chi-
nese online reviews. This paper proposes a supervised machine learning method based on Maximum
Entropy for the classification of Chinese reviews. Maximum Entropy is a probability distribution estima-
tion algorithm which has been applied to a variety of Natural Language Processing tasks. Our experi-
mental results demonstrate that the classifier based on Maximum Entropy is ideal for the classification of
Chinese reviews, which can both raise accuracy and recall rate to considerable levels. Pre-processing of the
reviews for the purpose of training and testing is also introduced in this paper.
559
positive or negative category on the basis of the
average semantic orientation. Xiong et al. (2008)
propose the method which is semantic distance-
based to calculate sentence tendentiousness based
on the semantic similarity calculation of HowNet.
The semantic distance reflects the semantic rela-
tions between words in a sentence, which can
obtain the orientation of sentences. Wen et al.
(2010) raise another sentiment analysis approach
based on semantics where adverbs of degree and
negation words are investigated. Wan (2011) uses a
bilingual co-training approach for sentiment clas-
sification of Chinese product reviews utilising both
Figure 1. Model of maximum entropy classifier.
the English view and the Chinese view.
On the other hand, some studies have been con-
In this paper, we estimate the sentiment orienta-
centrating on training sentiment classifiers using
tion of Chinese reviews utilising the Maximum
machine learning techniques. Nakagawa, Inui and
Entropy classification algorithm.
Kurohashi (2010) introduce a dependency tree-
There is no difference from other learning tech-
based classification method using Conditional
nique; the outputs of machine learning technique
Random Fields with hidden variables. Zhou, Chen
rely on the given training data set of input. The
and Wang (2010) present a novel semi-supervised
first step of Maximum Entropy classification is to
learning algorithm called Active Deep Networks
get the constraints from a labelled training data set
(ADN) and then exploit it to tackle the semi-super-
for the model distribution.
vised sentiment classification problem. Xu Qun-
Figure 1 is the model of Maximum Entropy
ling (2011) proposes a new sentiment orientation
classifier for Chinese reviews classification, which
calculation model, which is based on the analysis
is made of a training and testing process. In a train-
of the characteristics of Chinese text. The model
ing process, we utilise a labelled training data set to
uses an improved point-by-point analysis method
derive a set of constrains for building the model that
SO-PMI to classify category sentiment orientation
characterises the class-specific expectations for the
using words. Li et al. (Li 2011) investigate a semi-
distribution. Finally, we use the General Iterative
supervised learning method for imbalanced senti-
Scaling (GIS) algorithm to find the probability
ment classification. In particular, it expresses the
distribution that is in keeping with the given con-
imbalanced class distribution problem via various
straints. In the process of classification, the testing
dynamically generated random subspaces.
data set is denoted in features, and then the review
As a machine learning algorithm, Maximum
classification is obtained by using the classifier.
Entropy is widely used for Natural Language
Processing tasks. Maximum Entropy combines
contextual features in a principled way and allows
4 DATA PRE-PROCESSING
unrestricted use of them. Moreover, Wang and
FOR SENTIMENT ANALYSIS
Acero (2007) propose that the Maximum Entropy
model can obtain global optimisation due to the
4.1 Segmentation
properties of the convex objective function. Based
on the above-mentioned factors, we train a Maxi- The section headings are in boldface capital and low-
mum Entropy classifier to analyse the sentiment ercase letters. Unlike European languages, Chinese
of Chinese reviews. Our experimental results show sentences are made up of strings of Chinese charac-
that Maximum Entropy as a text classification ters. Each Chinese character has a specific meaning,
algorithm warrants further investigation. but two or more characters can be combined into a
word that has a different meaning. For this reason,
segmentation plays a key role in Chinese sentiment
3 MAXIMUM ENTROPY CLASSIFICATION analysis, which belongs to the category which uti-
lises Natural Language Processing techniques.
Maximum Entropy is a probability distribution In this paper, Institute of Computing Technol-
estimation algorithm that is extensively used for ogy, Chinese Lexical Analysis System (ICTCLAS) is
Natural Language Processing tasks. The motiva- adopted for segmentation and Part-Of-Speech tag-
tion of Maximum Entropy classification is that ging (POS). The purpose of segmentation and POS
we should calculate the frequencies of individual tagging is to prepare for identifying what characters
joint-features without making any unfounded should be combined to label the POS. After that,
assumptions. That means the probability is uni- we select the words which have the specific part-of-
formly distributed when there is no pre-knowledge. speech, using a Chinese part-of-speech tagging set.
560
It is obvious that Chinese sentiment analysis feature selection method will largely determine the
cannot continue without a proper segmentation quality of the final classification results.
algorithm. The Chinese sentence must be decom- There is a huge quantity of words in data pro-
posed into words before any tasks can take place. cessing. The dimension of the feature space will
This is the first phase of pre-processing of Chinese be too large if all words are selected as the feature
sentiment analysis. items. It not only increases the amount of computa-
tion, but also affects the accuracy of classification.
Therefore, it is necessary to choose the appropriate
4.2 Conjunction rules
feature selection method to reduce the dimension.
Ordinarily a sentence only expresses one sentiment In feature selection, the features that are irrelevant
orientation if it does not contain some conjunction to the emotions and the weak category correlation
words such as BUT, ONLY, ALTHOUGH, HOW- need to be removed to eliminate unnecessary inter-
EVER, WHILE etc. These conjunction words will ference. In this paper, the method of sentiment lexi-
change the orientation of sentences. In this case, con is adopted. The Bilingual Knowledge Dictionary
we obtain the accurate meaning from a given sen- provided by HowNet and National Taiwan Univer-
tence using conjunction rules. sity School of Dentistry are applied to distinguish
For an example: the sentiment words from candidate feature words.
I have always trusted Jingdong because of its
well-service, but the computer is too slow, it is a very
bad shopping experience, really too disappointed. 5 EXPERIMENT
Under these circumstances, we will cut off the
phrase before ‘BUT’, and the rest of the sentence 5.1 The analysis data
will be retained to represent the sentiment orienta-
Our corpus is originated from the Jingdong shop-
tion of the whole sentence. Although some of the
ping site (www.jd.com), a leading online B to C
sentence information is lost, the accuracy for the
trading platform in China. The corpus contains
sentence sentiment analysis will be improved.
450,417 reviews: 80% of reviews are exploited as
Conjunction words will affect the sentiment
the training data, while 20% of reviews are used for
orientation of the sentence. Using conjunction
testing purposes.
rules can makes the sentence more explicit and
All reviews have been labelled by the starValue
comprehensible.
attribute that is rated by customers. The reviews
are then manually set to positive when starValue
4.3 Negations handling > = 3 and negative when starValue < 3.
Negation is a very common linguistic construc-
tion that widely appears in all languages. There- 5.2 Model evaluation
fore, negation should be taken into consideration in It is very important to evaluate the experiment
Chinese sentiment analysis. When negation words results. The balance of various factors is considered
such as ‘not’ and ‘hardly’ occur in the sentence, in the selection of evaluation indicators to make an
the sentiment orientation will be changed. Nega- objective and impartial evaluation. The evaluation
tion detection is used for distinguishing the factual indicators in the information retrieval field can be
and non-factual information that is extracted from utilised to evaluate the effectiveness of classification.
sentences. In this paper, five evaluation indicators are used to
A negation word such as ‘hardly’ will invert the evaluate the experiment results. They are precision,
orientation of the sentiment word. For example, recall, F-score, accuracy and specificity respectively.
‘hardly know’ means ‘unknown’. Das and Chen
(2001) raise a technique, which uses the tag ‘NOT_’
to replace the negation word and the first blank 5.3 Experiment 1
space following the negation word. After that, a One word may have opposite meaning in different
new corpus was achieved. In Chinese, we substi- contexts, such as “pride”.
tute ‘ _’ for ‘NO_’, and the list of the negative For example:
words contains ‘ ’, ‘ ’, ‘ ’, ‘ ’, ‘ ’, ‘ ’. They can look back on their endeavours with
pride.
Pride is the parent of all evils.
4.4 Feature selection
In the above example, “pride” has two opposite
Feature selection is an important stage in senti- meanings: In the first sentence “pride” has com-
ment analysis. Feature selection aims to select mendatory meaning while “pride” has derogatory
features which have the most representative and meaning in the second sentence.
excellent classification performance from original Thus, two scenarios are taken into consideration
feature information. Therefore, the appropriate in the phase of training. One situation is that some
561
Table 1. Result from Experiment 1.
of the extracted features are labelled as both posi- reviews, which can yield a high accuracy and
tive and negative. For instance, feature “pride” has recall.
both positive and negative sentiment polarities.
In this scenario, a high recall can be guaranteed. ACKNOWLEDGMENTS
The recall means that recognition of positive reviews
accounts for the proportion of the total positive This work is supported by National High-tech
reviews. However, the capacity of the classifier to R&D Program of China (863 Program) (Grant
recognise the negative reviews is lower, namely spec- No. 2015 AA015904) and the Open Project Pro-
ificity. The result is shown in Table 1 below. gram of the State Key Lab of CAD & CG (Grant
No. A1429), Zhejiang University.
5.4 Experiment 2
REFERENCES
Another scenario is that the labelled sentiment
words are either positive or negative. For instance, Das, S., & Chen, M. (2001). Yahoo! for Amazon: Extract-
feature “pride” is either of the positive or negative ing market sentiment from stock message boards.
Proceedings of the Asia Pacific Finance Association
category. Annual Conference, 35, 43.
In this situation, the capacity of the classifier to Li, S., Wang, Z., Zhou, G., Lee, S.Y.M. (2011). Semi-
recognize the negative reviews is improved, which has Supervised learning for imbalanced sentiment classi-
increased by approximately 40%. However, the indi- fication. Proceedings of International Joint Conference
cators of recall and accuracy are reduced by 15 per- on Artificial Intelligence (IJCAI-2011).
centage points. The result is shown in Table 2 below. Nakagawa, T., Inui, K. & Kurohashi, S. (2010). Depend-
From the experimental results, we can see that ency tree-based sentiment classification using CRFs
the performance of the classifier is better in the sec- with hidden variables. Proceedings of Human Lan-
ond scenario, where the capacity of the classifier to guage Technologies: The 2010 Annual Conference of
the North American Chapter of the ACL (HAACL-
recognise positive reviews and negative reviews is 2010) (pp. 786–794). Los Angeles, CA.
well matched. In summary, the indicators of preci- Turney, P.D. (2002). Thumbs up or thumbs down?
sion, accuracy, and F-score are considerable in both semantic orientation applied to unsupervised classifi-
scenarios. We can conclude that the classifier based cation of reviews. Proceedings of Annual Meeting of
on the Maximum Entropy can achive satisfying the Association for Computational Linguistics (ACL-
classification performance on the Chinese reviews. 2002) (pp. 417–424). Philadelphia, PA.
Wan, X. (2011). Bilingual co-training for sentiment clas-
sification of Chinese product reviews. Computational
Linguistics, 37(3), 587–616.
6 CONCLUSION Wang, Y.Y., & Acero, A. 2007. Maximum entropy model
parameterization with TF*IDF weighted ector space
Maximum Entropy is an algorithm that is widelyap- model. IEEE Automatic Speech Recognition and
plied in Natural Language Processing. Its over- Understanding Workshop, 213–218. Kyoto, Japan.
riding principle is that probability distributions Wen, B. et al. (2010). Text sentiment classification
should be estimated from the training data set. research based on semantic comprehension. Computer
In this paper, we investigate the approach for Science, 37(6), 261–264.
sentiment analysis of online product reviews in Chi- Xiong, D., Cheng, J. & Tian, S. (2008). The research of
nese based on Maximum Entropy. Our approach is sentence sentiment tendency based on HowNet. Com-
puter Engineering and Applications, 44(22), 143–145.
mainly developed in three aspects of pre-process- Xu, Q. (2011). A new model of Chinese text sentiment com-
ing, feature extraction and classification arithmetic puting. Computer Application Technology and Software, 6.
based on the Maximum Entropy model. Zhou, Shusen, Chen, Q. & Wang, W. (2010). Active deep
The experimental results demonstrate that the networks for semi-supervised sentiment classification.
classifier is ideal for the classification of Chinese Proceedings of Coling, Poster Volume (pp. 1515–1523).
562
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Hongyang Yu
College of Electronic Information and Optical Engineering, Nankai University, Tianjin, China
Fangwei Cui
College of Science, Purdue University-West Lafayette, West Lafayette, IN, USA
Yan Wang
College of Mathematics and Computer Science, Hunan Normal University, Changsha, China
ABSTRACT: Particle Swarm Optimization algorithm (PSO) is a kind of adaptive random optimization
algorithm based on search strategies. Because the algorithm is simple yet effective, it catches the interest
of many scholars. It has showed wide application in function optimization, neural network training, etc.
The PSO algorithm development was firstly proposed a decade ago, and is far from being mature neither
theoretically nor practically up to now. This paper focuses on improving the traditional particle swarm
algorithm and applying it in the wireless sensor network node spatial distribution and layout optimiza-
tion. Wireless Sensor Network (WSN) is a distributed sensor network which includes sheer numbers of
sensors that detects and monitors the outside world. In WSNs, the network settings and the equipment
locations can change at any time, can also vary with the Internet connection cable or wireless link. This
manuscript adapts the PSO algorithm into WSN design and provides a novel node spatial distribution and
layout optimization strategy for optimal network coverage.
Keywords: Node spatial distribution; Particle swarm algorithm; Wireless sensor network; Distance Vec-
tor-Hop; Novel Improved PSO & DVH (NIPD)
563
conventional Distance Vector-Hop (DV-Hop) cal- consequently no correspondence overhead and
culation is too expansive and the Particle Swarm equipment expenses are included.
Optimization (PSO) calculation easy to be trapped
in a neighborhood ideal. In order to solve this
issue, a combination calculation of enhanced mol- 3 ENHANCED PARTICLES SWARM
ecule swarm calculation and DV-Hop calculation OPTIMIZATION
is proposed in this paper and referred to as Novel
Improved PSO and DVH (NIPD). PSO calcula- 3.1 Standard particle swarm optimization
tion was enhanced from molecule speed, latency
PSO calculation is a global improvement calcula-
weight, learning methodology and variety, which
tion. Taking into account common populace look
improved the capability to hop out of neighbor-
procedure (L. Li and Y. Du, 2014), it has favora-
hood ideal of the calculation and expanded the
ble circumstances of less parameters, quick hunt
hunt rate of the calculation in later iterative stage.
speed, and so forth and is broadly utilized as a part
The hub limitation result was then advanced by
of logical exploration and viable designing. Mol-
utilizing the enhanced PSO calculation as a part of
ecule Swarm can be particularly portrayed as taken
the third phase of the DV-Hop calculation.
after: Suppose the quantity of the molecule popu-
lace is P, the measurement of inquiry space is S, the
i-th molecule position is yi = (yi1,yi2,…,yiS), speed
2 RELATED WORK
is u, ui = (ui1, ui2, …,uiS), best recorded position
of molecule i is bhpi = (Pi1,Pi2,…,PiS), global best
Liu et al proposed a hub self-situating with
verifiable position is gbhp = (Pg1,Pg2,…,PgS).
enhanced molecule swarm calculation in light of
Speed and position redesign recipes of molecule i
turmoil aggravation, which utilize the Tent guide
are as per the following:
tumultuous to hunt (Z. Liu, Z. Liu and X. Tang,
2012). It diminished the likelihood of falling into
ui(t+1) = ωui(t) + t1f1(bhpi-yi(t))+t2f2 (gbhp-yi(t))
neighborhood ideal and enhanced pursuit calcula-
(1)
tion exactness, yet at the same time indicated low
situating precision. Li et al (L. Li and Y. Du, 2014) yi(y+1) = yi(t)+ui(t+1) (2)
proposed a self-restriction strategy in view of
enhanced molecule swarm advancement, in which where i = 1,2,…,N, Inertia ω is the latency weight;
the idleness weight and learning element is set to t is the present cycle time; t1, t2 are learning vari-
direct decrease, and utilized the technique for seg- ables; f1, f2 are irregular numbers consistently dis-
ment variety to escape from nearby optima when persed in [0,1]. In conventional PSO, the particles
experiencing seek stagnation. Likewise this strat- tend to total to the global best position and the indi-
egy enhanced Positioning execution, yet not being vidual’s best position, then the populace will have
perfect and included a specific computational union impact and untimely merging, then pursuit
many-sided quality. Wang et al (Y. Wang and J. stagnates in later iterative stage. It is hard to escape
Yang, 2014) proposed hub confinement calculation from nearby ideal, causing low hunt precision of
in view of an enhanced molecule swarm streamlin- PSO calculation. To upgrade the execution of
ing. The chronicled global best position was trans- molecule swarm calculation, this paper separately
formed part by part when experiencing looking enhance 4 aspects: speed, idleness weight, learning
stagnation, and obscure hubs that has been situated methodology and variability, to enhance the accu-
was taken as the stay hub to do iterative inquiry. racy and security of the calculation.
Although the situating exactness was enhanced,
there is still opportunity for further improvement
3.2 Enhancement of speed
by including a specific correspondence overhead
and computational unpredictability. In prior iterative stage, the particles can be effec-
Different from the abovementioned methods, tively guided by the global best position to
the approach proposed in this paper, which is an untimely accumulation; Search speed turns out to
enhanced molecule swarm calculation and DV- be moderate in later iterative stage and the calcula-
Hop combination calculation, provides a viable tion can’t hop out of nearby ideal. To take care of
answer for the enormous minimum squares esti- this issue, this paper utilizes a great arrangement,
mation blunder issue in the third phase of DV- which is gainful to global inquiry of the underlying
Hop calculation. This calculation exhibits higher emphasis and nearby union of the later cycle, to
situating precision and better solidness; moreover, supplant the global best position, it can be depicted
this calculation just enhances number-crunching as the accompanying: haphazardly select k parti-
operations in the third phase of DV-Hop cal- cles from the molecule populace and think about
culation, and the first and second stage are the the best positions of k elements, then select the its
same with the traditional DV-Hop calculation, individual best position rather than the global best
564
position to manage the molecule movement. The enhance the precision of the ideal arrangement.
estimation of k increments directly with empha- Every measurement of the present position is not
sis: littler estimation of k exacerbates fantastic the best, so any measurement can be been trans-
arrangement, which wells to global pursuit and formed. Lévy appropriation has unlimited change
expansions the differences of the populace; the which comprises of regular little esteem and alea-
more prominent estimation of k improves high tory substantial quality, visit little esteem is helpful
caliber, which wells to neighborhood merging and for the last some portion of neighborhood improve-
enhance the joining rate. Enhanced pace overhaul ment, and aleatory expansive worth can escape from
equation is as per the following: nearby goals, so a Lévy circulation step is utilized to
transform the present best esteem, the transforma-
ui(t+1) = ωui(t) + t1f1(bhpi-yi(t))+t2f2 (gbhpn-yi(t)) tion equation is as per the following equation:
(3)
gbhpn = gbhpn +a.s (6)
Z = Zmin+(Zmax-Zmin)t/T (4)
where: n is an irregular number in 1∼D; D is the
where: pbestm is the best of the Z particles’ own
measurement of the pursuit space; an is the pro-
best history positions; t is the present emphasis
gression size element, whose worth is 0.1; s is step
time; T is the most extreme time of cycle; Zmax
that is liable to Lévy dissemination.
and Zmin are the greatest and least estimations of
Z, Zmax esteem takes populace of particles, Zmin
esteem takes 1.
4 ALGORITHMIC PROCESS
3.3 Inertia weight advances The steps in the algorithm process are:
In order to adjust global hunt and nearby advance- Step 1: Aimlessly send various sensor hubs in
ment capacities of Particle Swarm Optimization, the objective territory, then get the separation
idleness weight takes a bigger quality in beginning between obscure hub to the grapple hub by the
emphasis to advantage global pursuit, and it takes first and second phase of DV-Hop calculation.
a bigger worth in later iterative stage to advantage Step 2: Fix the limits. Counting the most extreme
neighborhood improvement, so Shi et al. proposed number of times of cycles Imax, learning ele-
a strategy for straightly diminishing dormancy ment t1, t2, greatest Zmax and least Zmin of
weight, The equations are computed as takes after: latency weight, the most extreme Wmax and
InertiaW = Wmax– (Wmax–Wmin) t/T (5) least Wmin number of particles.
Step 3: Initialize populace. The underlying posi-
where: t is the present emphasis time; T is the most tion of molecule ‘I’ is yi = (yi1,yi2…,yiS), veloc-
extreme time of emphases; Wmax and Wmin are ity is ui = (ui1,ui2,…,uiS), its own best position
the greatest and least of the latency weight w. Big- is gbhpni = yi, Evaluate swarm wellness estima-
ger idleness weight in the underlying cycle benefits tion of molecule as indicated by condition (3),
global inquiry, yet creates stun, builds correspond- the global best chronicled situation gbest is best
ence overhead and reductions seek proficiency; In starting position of molecule populace, so that
later iterative stage, smaller dormancy weight ben- t = 0.
efits neighborhood advancement, yet increases the Step 4: Fix t = t+1, redesign molecule position x
difficulty to escape from nearby ideal calculations and velocity v as per recipe (5) to (10), and do
and reduces the pursuit exactness. To take care of cross-outskirt treatment on y, u.
this issue, a directly diminishing stochastic unpre- Step 5: Implement learning techniques. Actualize
dictability system, whose instability diminishes with learning techniques for particles as per pseudo-
cycles, is proposed in NIPD: In the early emphasis, code in segment 2.4 and condition (11), (12).
exceptionally vary idleness weight enhances the Step 6: Apprise particles’ own particular best
seek effectiveness of the calculation; in later itera- position and the global finest situation.
tive stage, low change dormancy weight upgrades Step 7: Mutation. Change the ideal area gbhp as
the capacity to escape from neighborhood ideal. per condition (13), redesign gbhp if the trans-
formed position is better.
Step 8: Place the global Antiquity ideal arrange-
3.4 Mutation
ment if the emphasis end state is met, then skip
To solve the PSO calculation’s problems such as eas- to step 9; generally, come back to step 4 and
ily trapped into nearby ideals, low limits of neigh- proceed with the iterative streamlining.
borhood advancement and different inadequacies Step 9: Repeat the steps from step 3 to step 8 until
in the advanced stage, unsettling influences to exist- the evaluated area of all the obscure hubs are
ing situation can both speed up the meeting and put out.
565
5 SIMULATION AND INVESTIGATION In correlation, the normal situating precision of
the proposed strategy Novel Improved PSO and
Matlab simulation and investigation is performed DVH (NIPD) increments.
to exhibit the situating execution of the enhanced Correspondence Radius Effect on the Position-
molecule swarm calculation. Fix the limits of the ing Accuracy Randomly disperse 2s00 sensor hubs
calculation: Learning component t1 = t2 = 1, the in the 150 m × 150 m region, wherein the quan-
quantity of molecule populace was 50, the most tity of stay hubs is 30, with correspondence sweep
extreme number of cycles is 70 and the greatest of 15 m∼40 m, analyze the Location execution of
pace of the molecule is 10 m/s, then conform the four calculations by modifying the correspondence
proportion of stay hubs, all out number of hubs, span, as appeared in Figure 3. With the expansion
correspondence span separately to analyze the of correspondence sweep, system availability incre-
execution of four area calculations. Arbitrarily cir- ments and going mistake decreases, in this way the
culate 150 sensor hubs in the 200 m × 200 m square situating exactness of the calculation enhanced;
region, with correspondence sweep 25 m. when the correspondence range is more prominent
By conforming the proportion of grapple hubs, than 45 m, with the increment of correspondence
we compared the proposed calculation Novel span, the normal hop separation blunder and the
Improved PSO and DVH (NIPD) with the custom- separation mistake build, so the bend demonstrates
ary DV-Hop number, (Reformed PSO) RPSO1-DV- an upward pattern.
Hop calculation and RPSO2-DV-Hop calculation.
As appeared in Figure 1, with the expansion in
the extent of stay hubs, four calculations situating
blunder Deviations are abatement, and the pro-
posed calculation indicates greatest drop in situat-
ing mistakes. Contrasted and DV-Hop calculation,
RPSO1-DV-Hop calculation and RPSO2-DV-Hop
calculation, the situating precision of the proposed
Novel Improved PSO and DVH (NIPD) calcula-
tion averagely moves forward.
The effect of the Nodes in The Positioning
Accuracy is appeared in Figure 2. Haphazardly
convey 200 sensor hubs in the 150 m × 150 m
region, with correspondence range 30 m and the
stay hub proportion of 30%, by changing the
quantity of hubs, think about the situating execu-
tion of four calculations. The situating blunder
of the proposed Novel Improved PSO and DVH Figure 2. The effect of the nodes in the positioning
(NIPD) calculation is constantly not exactly the accuracy.
conventional DV-Hop calculation, RPSO1-DV-
Hop calculation and RPSO2-DV-Hop calculation.
566
Table 1. Stability in analysis. the time multifaceted nature is in the same request
of extent with the first calculation, in this manner
Algorithm Avereage Std Deviation the enhanced calculation has the calculation time
with customary DV-Hop calculation and does
DVHop Algorithm 0.38 0.038
not influence its uses in situation of wireless sen-
RPSO1-DVhop 0.28 0.028
RPSO2-DVhop2 0.2 0.02
sor network. The future studies will concentrate
Novel Improved PSO & 0.16 0.016
on diminishing the measure of count and vitality
DVH (NIPD) utilization.
REFERENCES
Haphazardly appropriate 200 sensor hubs in
the 150 m*150 m region, wherein the quantity of Bulusu, N., J. Heidemann and D. Estrin, “GPS-less low
grapple hubs is 25, with correspondence range of cost outdoor localization for very small devices”,
40 m. Separately execute 30 reproduction tests on IEEE Personal Communications Magazine, vol. 7, no.
conventional DV-Hop calculation, RPSO1-Hop 5, (2008), pp. 28–34.
calculation, RPSO2-DV-Hop calculation and the Costa, J.A., N. Patwari and A.O. Hero, III, “Distributed
weighted multidimensional scaling for node localiza-
proposed calculation Novel Improved PSO and
tion in sensor networks”, ACM Transactions on Sen-
DVH (NIPD), to get the mean and standard devia- sor Networks, vol. 2, no. 1, (2006), pp. 39–64.
tion of the normal situating contrast of 30 inves- Li, L. and Y. Du, “Application of Modified Particle
tigations, and the normal running time of finding Swarm Optimization in Node Locating of Wireless
every obscure hub, as appeared in Table 1. The Sensors Networks”, Computer Applications and Soft-
mean and standard deviation of the uniform con- ware, vol. 31, no. 4, (2014), pp. 69–72.
finement blunder of 30 examinations are appeared Li, X., Y. Xu and F. Ren, “Techniques for wireless sen-
in Table 1. sor network”, Beijing: Beijing Institute of Technology
As can be seen from Table 1, contrasted with the Press, (2007), pp. 191–192.
Liu, Y., X. LV and X. Wang, “Application of hybrid
customary DV-Hop calculation, RPSO1-DVHop
genetic algorithm in WSNs localization”, Transducer
calculation and RPSO2-DV-Hop calculation, this and Microsystem Technologies, vol. 33, no. 2, pp.
calculation dependably keeps up high-accuracy 150–153.
situating and better soundness. global pursuit and Liu, Z., Z. Liu and X. Tang, “Node self-localization
neighborhood improvement of molecule swarm algorithm based on modified particle swarm opti-
calculation hnve diverse proficiency to locate a mization”, Journal of Central South University
great answer for every emphasis, and area produc- (Science and Technology), vol. 43, no. 4, (2012), pp.
tivity and populace related particles and empha- 1371–1275.
sess, The effectiveness is identified with molecule Ma, Z., Y. Liu and B. Shen, “Distributed locating algo-
rithm for wireless sensor networks- MDS-MAP(D)”,
area and the quantity of cycles, yet it is not an
Journal on Communications, vol. 29, no. 6, (2008), pp.
entirely direct relationship, learning methodolo- 58–62.
gies choice in light of likelihood is to choose a Nagpal, R., H. Shrobe and J. Bachrach, “Organizing a
global inquiry or nearby advancement by the input global coordinate system from local information on
data before the ebb and flow emphasis, so the cal- an ad hoc sensor network”, The 2nd International
culation has more grounded versatile capacity, Workshop on Information Processing in Sensor Net-
therefore has higher hunt productivity and better works (IPSN ‘03)[C]. Palo Alto., (2003), pp. 1–16.
solidness. Niculescu, D. and B. Nath, “DV based positioning in ad
hoc networks”, Journal of Telecommunication Sys-
tems, vol. 22, no. 1–4, (2003), pp. 267–280.
Wang, S.-S., K.-P. Shih and C.-Y. Chang, “Distributed
6 CONCLUSION direction-based localization in wireless sensor net-
works”, Computer Communications, vol. 30, no. 6,
The manuscript proposes a combination calcula- (2007), pp. 1424–1439.
tion of enhanced molecule swarm calculation and Wang, Y., and J. Yang, “Localization in wireless sensor
DV-Hop. When considering equipment expenses network based on improved particle swarm optimiza-
and consistent correspondence overhead, it has tion algorithm”, Computer Engineering and Applica-
better situating precision and strength, to some tions, vol. 50, no. 18, (2014), pp. 99–102.
degree, the issue of unacceptable execution of Wen, J., X. Fan and X. Wu, “DV-Hop localization algo-
rithm based on the RSSI hop correction”, Chinese
PSO’s DV-Hop calculation Novel Improved PSO
Journal of Sensors and Actuators, vol. 27, no. 1,
and DVH (NIPD) is tackled. The enhanced calcu- (2014), pp. 113–117.
lation has enhanced pace, inactivity weight, learn- Yang, W., and W. Pan, “DV-Hop localization algorithm
ing methodologies and figure variety, despite the based on RSSI ratio correction in wireless sensor net-
fact that the computational burden builds a bit, work”, Transducer and Microsystem Technologies,
the process did not expand the quantity of series, vol. 32, no. 7, (2013), pp. 26–135.
567
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: With the promising development of Direct Current (DC) distribution networks, load con-
trol problems in DC networks need great attention. In this paper, we focus on the optimisation of energy
use in DC networks. We first model the Power Electronic Load (PEL) units as the controllable impedance,
and establish the voltage model of the distribution network. By applying this model, we formulate the
underlying load control problem as an optimisation problem that coordinates the bus voltage by minimis-
ing the system costs, consisting of the line losses costs and the deviation costs of PELs. Compared with
the traditional optimal power flow problems, our model involves one control variable only, i.e. voltage,
which makes it easier to solve. Nevertheless, as the resulting optimisation problem is non-convex, we use
a Particle Swarm Optimisation (PSO) algorithm to solve it, and the developed results are demonstrated
via a numerical example.
Keywords: DC distribution networks; Load control; Non-convex optimisation; The PSO algorithm
569
global search capability (Wu & Wang, 2016; Yang & As is widely applied in the literature, e.g.
Cheng, 2013). (Mohsenian-Rad & Davoudi, 2014; Weaver &
In this paper, we apply a PSO algorithm to solve Krein, 2009), we can affect the bus voltage level,
the underlying non-convex optimisation problem. line losses and power flow in the network by con-
Generally, the standard PSO algorithm is used to trolling the variable resistors of PEL units. In the
calculate the unconstrained optimisation problems rest of this section, we would like to establish the
(Sortomme & El- Sharkawi, 2009). In this paper, voltage model, which is a description of the distri-
an improved PSO algorithm is designed to solve bution network by using the voltages of PEL units.
this optimisation problem with constraints. Here Denoted by L, F and P are the set of load buses,
we introduce a check function into the algorithm FL buses and PEL buses respectively, and we have
to ensure that the variables can satisfy their con- L = F∪P. B denotes the set of all the non-load buses;
straints. To demonstrate our model, we apply an then N = L∪B. For each single bus i ∈ N, let Ni
IEEE test distribution system to verify our results. with N i N denote the set of all its neighbouring
The simulation results demonstrate the effective- buses. In addition, some buses are equipped with
ness of our proposed optimal model. power sources and the set of such buses is denoted
The rest of the paper is organised as follows. by S. A DC power source at bus i is modelled as
In Section 2, we develop a voltage model of PEL a voltage source with a fixed voltage level Vis, and
units in the DC distribution networks. Considering a fixed internal resistor Ris. If bus i does not have a
physical and operational constraints, we formu- power source, we assume Vis = 0 and Ris = ∞.
lated a constrained optimisation problem in Sec- Based on the above formulations, we can obtain
tion 3. In Section 4, we design an improved PSO the relationship between the bus voltage and load
method to solve the underlying load control prob- resistor by Kirchhoff’s current law, such that:
lem and give some simulation results. Conclusions
are given in Section 5. Vi Vi Vi s V Vk
+ + ∑ i = 0, ∀i ∈ L (1)
Ri Ris k ∈Ni Rik
2 FORMULATION OF DC DISTRIBUTION V j V js V j Vk
NETWORKS R s
+ ∑
k ∈N j R jk
= 0, ∀jj ∈ B (2)
j
By (1), we have:
⎛V V V Vi ⎞
Ri Vi / ⎜ i s i + ∑ k (5)
⎝ Ri k ∈Ni Rik ⎟⎠
Vi Vi Vi V Vk
= − ∑ i + ∑
Ri Ris k ∈Ni Rik k ∈Ni ∩ L Rik
1 ⎛ ⎞
+ ∑ ∑ α klVl + β k ⎟ (6)
k ∈Ni ∩ B Rik ⎝ l ∈L ⎠
Figure 1. A DC distribution network with 14 buses. In
this figure, we use hollow and solid triangles to represent = ∑ μikVk + ν i , ∀i ∈ L
k ∈L
the PEL and FL respectively.
570
As (6) holds for all i ∈ F, since the resistors of
FLs are constant, there are |F| equations. Collating ∑λ
k ∈P
fk k f f f Vf ηf f ∈F (14a)
the |F| equations, we can derive that:
∑a Vk ≥ V j
jk V js − b j
Pjmax R j /V j ∈B (14b)
∑λ
k ∈P
Vf ffk
k Vk + η f , ∀f ∈ F (7)
k ∈P
Furthermore, the following expressions are 3.2 Constraints and preferences of PEL units
obtained by (4), (6) and (7):
Suppose that Rpmin≤Rp≤Rpmax is satisfied for each
bus p ∈ P. Then by (9), the following inequalities
Vj ∑a
k ∈L
jkVk b j , ∀j ∈ B (8) hold for all p ∈ P:
Vp
= ∑ c pkVk + d p p ∈P (9) ∑ k ∈P
m pkVk ≥ Rp i d p (15a)
Rp k ∈P
∑ k ∈P
n pkVk ≤ Rp d p (15b)
In summary, (7)–(9) specify how to adjust the ⎧ 1 − c pk Rpmin (R
(Rp ), if k p
bus voltages by controlling the resistances of PELs. where m pk ( n pk ) = ⎨ .
By applying (9), we can obtain the relationship ⎩ − c pk R min
p (
(RR p ), otherwise
between the power and voltage of PEL p: In this paper we apply a form of deviation costs
considered in Li et al. (2012) to describe the prefer-
Vp2 ⎛ ⎞ ence of each PEL unit:
Pp =
Rp
= Vp ∑ c pkVk
⎝ k ∈P
d p ⎟ , ∀p ∈ P
⎠
(10)
Wp ( Pp ) = θ p (P
( Pp Pp )2 (16)
571
s.t. (13), (14) and (15) (20) • In each iteration, each particle will calculate its
position value according to its objective function
Problem 1 is a non-convex optimisation problem and adjust its position and velocity through its
under a convex set. By (13), (14) and (15), the con- best location and the swarms global best location.
strained set is convex as all the constraints are lin-
ear. However, J(V) is a (fourth-order) non-convex For the underlying optimal problem, the volt-
function due to the convexity of H(V) and the non- ages of the PEL units as the particles, the power
convexity of Wp(V), which can be verified by using flow is implemented to compute the line flows
their Hessian matrixes. Therefore, we will use a PSO and the system power transfers. However, since
algorithm to implement the global optimal solution. the standard PSO algorithm is used to solve the
unconstrained optimisation problem, a check
function is established to ensure the best strategy
4 THE PARTICLE SWARM OPTIMISATION to be feasible. Specifically, the improved PSO algo-
ALGORITHM AND CASE STUDY rithm is displayed in Algorithm 1.
572
Figure 2. The first 100 steps of the PSO iterative
process.
1 B&S 0.9532 – –
2 F&S 0.9442 0.8915
3 F&S 0.9685 0.9380
4 P 0.9237 0.5610 1.5209
5 F 0.9269 0.8592
6 P&S 0.9038 0.8916 0.9162 Figure 4. The results. (a) The actual power of PEL
7 B 0.9355 – – units near to the desired power; (b) The line losses and
8 B&S 0.9799 – – the source resistance losses little.
9 F 0.9070 0.8226
10 P 0.8880 1.2914 0.6106
11 F 0.8891 0.7905 5 CONCLUSION
12 F 0.8830 0.7798
13 P 0.8826 0.6557 1.1880 In this paper, we model the PELs as variable resis-
14 F 0.8828 0.7793 tors and formulate the relationship between the bus
voltage and PEL resistance in DC distribution net-
works. Based on these, we propose the optimisation
problems that determine an optimal voltage strat-
egy by regulating the PELs, to minimise losses of
lines and deviation costs of PELs. Compared with
the traditional OPF problems, the underlying opti-
misation problems have fewer variables, and can
more easily be solved. To complement our theoreti-
cal model, we apply the proposed optimal model to
an IEEE 14-bus distribution network system, and
obtain an optimal voltage strategy or a resistance
strategy of PELs by using a PSO algorithm.
573
Justo, J.J. et al. (2013). AC-microgrids versus dc-microgrids Sortomme, E., & El-Sharkawi, M.A. (2009). Optimal
with distributed energy resources: A review. Renewable power flow for a system of microgrids with control-
and Sustainable Energy Reviews, 24(10), 387–405. lable loads and battery storage, in 2009 Power Systems
Kirkpatrick, S. et al. (1983). Optimization by simulated Conference and Exposition: 1–5.
annealing. Science, 220(4598), 671–680. Trelea, I.C. (2003). The particle swarm optimization
Li, N. et al. (2012). An optimization-based demand response algorithm: convergence analysis and parameter selec-
in radial distribution networks, in IEEE Globecom tion. Information Processing Letters, 85(6), 317–325.
Workshops: 1474–1479, Anaheim, CA, 3–7 Dec. 2012. Wang, F. et al. (2008). AC vs. DC distribution for off-
Mohsenian-Rad, H., & Davoudi, A. (2014). Towards shore power delivery, in IEEE Industrial Electronics
building an optimal demand response framework Society: 2113–2118.
for DC distribution networks. IEEE Transactions on Weaver, W.W., & Krein, P.T. (2009). Game-theoretic con-
Smart Grid, 5(5), 2626–2634. trol of small-scale power systems. IEEE Transactions
Power systems test case archive, Available: http:// www. on Power Delivery, 24(3), 1560–1567.
ee.washington.edu/research/pstca/. Wu, B., & Wang, D. (2016). Traffic signal networks con-
Ramanathan, B., & Vittal, V. (2008). A framework for trol optimize with pso algorithm, in 12th International
evaluation of advanced direct load control with mini- Conference on Natural Computation: 230–234.
mum disruption. IEEE Transactions on Power Sys- Yang, B., & Cheng, L. (2013). Study of a new global optimi-
tems, 23(4), 1681–1688. zation algorithm based on the standard pso. Journal of
Shi, W. et al. (2014). Optimal residential demand response Optimization Theory and Applications, 158(3), 935–944.
in distribution networks. IEEE Journal on Selected Zhu, L. et al. (2015). Direct load control in microgrids
Areas in Communication, 32(7), 1441–1450. to enhance the performance of integrated resources
Song, Q. et al. (2013). An overview of research on smart planning. IEEE Transactions on Industry Applications,
DC distribution power network. Proceedings of the 51(5), 3553–3560.
CSEE, 33(25), 9–19.
574
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
1 INTRODUCTION decrypt the secret key and data in turn. Cloud com-
puting providers have no secret key, so it can only
Cloud computing is an important part in the store the data, and can’t decrypt it, thus ensuring
development of information technology. With the the data stored in the cloud security. Secondly, we
application of the cloud computing, the security prove that the proposed scheme is secure under the
problem has raised lots of concerns. Cloud com- assumption of (t, ε, l) – BDHE by the complexity
puting service providers claim that it can improve and security analysis.
the security of the data, while the users’ concerns
about the problem have never stopped. In a sense,
1.2 Related work
how to solve the security problem is the key to the
development of the cloud computing industry. As Since the concept of “attribute” was firstly put
an important part of the security of cloud comput- forwards in 2005 (Sahai A et al., 2005), the enti-
ing, access control restricts users to access or use ties that used to identify the identity in the tradi-
certain resources or functions in accordance with tional encryption system can be expressed through
the users’ identity and the sets of groups which are it. Two kinds of Attribute-Based Encryption were
predefined by the administrator. Because of the proposed in 2006 (Goyal V et al., 2006), one is
unique characteristics of the cloud computing, it is Key-Policy Attribute-Based Encryption; the other
necessary to make researches on the security meas- is Ciphertext-Policy Attribute-Based Encryp-
ures adapted to the cloud environment. In view of tion. There are a lot of access control schemes
the threats faced by the current cloud computing, it applying the ABE algorithm in recent years. The
is meaningful to strengthen the security of the data first official CP-ABE scheme was proposed in
by effective access control in the field of cloud. (Bethencourt J et al., 2007). The scheme is easy to
implement and can only be applied to the condi-
tion that the access control rules are not strict. In
1.1 Our contribution
order to overcome this shortcoming, Cheung et al.
Firstly, we propose an algorithm which is suitable (Cheung L et al, 2007) proposed a new CP-ABE
for the cloud computing environment. The main scheme that supported AND ND+*, − policy, and proved
idea is that AES algorithm is used to encrypt the the security of the scheme in the standard model.
data, and CP-ABE algorithm is used to encrypt However, the length of the ciphertext in most of
the secret key, which is used in the AES. The the CP-ABE schemes existed is very large, which
users whose attributes match the access policy can increases linearly with the increase of the complex-
575
ity of the access policy. Considering the practi- If there is no algorithm that has an advantage at
cal application scenarios with limited bandwidth least ε in solving the problem of (t, ε, l) – BDHE
resources, many scholars have studied the ABE within t, we claim that (t, ε, l) – BDHE assumption
scheme with constant-length ciphertext. Emura holds in G.
et al. (Emura K et al., 2009). proposed the first
CP-ABE scheme with constant-length ciphertext.
3 ACCESS POLICY
The access strategy AND+,− is that it only supports
positive and negative of the attributes, and it does
For a list of attributes L and an access policy
not support wildcards. Only if his attributes set
W, L|= W denotes that L matches W, and L|≠ W
is the same as the access strategy, he can decrypt
denotes that L doesn’t match W. In this paper, the
NDm* , where L [ L L Ln ]
the file encrypted. As a result, the scheme can’t
access policy is AND
and W [W W Wn ] = ∩ i ∈IW Wi . If Li = Wi or
be used in one-to-many systems. Similarly, the
schemes in (Rao Y S et al., 2013) supports ANDm
Wi = *, we sayy L|=| W, else L|≠ | W for 1 ≤ i ≤ n in
which IW {i ≤ i n Wi ≠ }. An example of
and in (Han J et al., 2012) supports AND+ also
have the same problem. Compared with AND ND+*, −
NDm* policy is shown in Table 1. On the assump-
AND
NDm* has higher efficiency. As a result,
strategy, AND
tion that there are n attributes in the system, attrib-
the CP-ABE scheme supports the AND NDm* , which
ute set is U = { n } , where each attribute
ensures a constant-length ciphertext is extremely
has more than one value. The th attribute ωi has ni
meaningful.
values, whose value set is Si {vi vi }
vi ni . In
Table 1, ANDNDm* policy is CP = v1, 4 ∩ v2,3 ∩ * ∩ v4,1.
2 PRELIMINARIES
4 SYSTEM SCHEME
2.1 Bilinear pairings
4.1 System model
On the assumption that G1, G2, GT are cyclic mul-
tiplicative groups of a large prime order p, bilinear As is shown in Fig. 1, there are five components
pairing eˆ : G1 G2 GT is a deterministic func- in system model. The root authority has the high-
tion. Input the elements of G1 and G2 respectively, est authority and is fully trusted. It is responsible
and the output is an element in GT. The rules of for generating the system parameters, including
bilinear pairing are as follows: the public key and the master key, and author-
1. Bilinear: eˆ ( x a , y b ) eˆ ( x, y) for all x ∈ G1, y ∈
ab
G2, a, b ∈ Zp.
2. Nondegenerate: eˆ ( g1, 2 ) 1 where g1 and g2
are generators of G1 and G2 respectively. Table 1. N m* policy.
An example of AND
3. Computable: It is easy to compute eˆ ( g1 g2 ). Attribute ω1 ω2 ω3 ω4
We call ê is an effective bilinear map if it is a
Name A B C D
map with the above attributes.
Value A1 B1 C1 D1
A2 B2 C2 D2
2.2 Complexity assumptions A3 B3 C3
A4
The security of the CP-ABE algorithm is based on CP A4 B3 * D1
a complexity assumption called (t, ε, l) – BDHE.
On the assumption that G is a cyclic multiplica-
tive group of a large prime order p, g and h are two
independent generators of G, and there is a bilinear
pairing eˆ : G G GT . For some unknown a ∈
Zp, denote yg l ( g ,gg gl gl g l ) ∈G 2 l −1,
i
where gi g ( ) . B is an algorithm that can solve the
problem of (t, ε, l) – BDHE and outputs μ ∈ {0, 1}.
We call B has advantage ε if formula (1) is workable.
− Pr ⎡⎣ ( g, h, y , ) = 1⎤⎦ ≥ ε
g , ,l
g,
(1)
Figure 1. System model.
576
izing the top-level domain authority the secret 3. Authorize for new domain authority/user:
key. The domain authorities authorize the secret SK DA , L ′ ) SK
Delegate(SK K DA /SK
Ku
keys to the subordinate authorities, data own- When a new domain authority/user whose list
ers and users in the jurisdiction of the domain. of attributes is L′′ = [ L1′, L2′ , , Ln′ ] requests to
Data owner is a provider of privacy data, and he join the system, where Li′ = vi ,ki , the top-level
will select a specific access structure to encrypt authority verify its legitimacy at first. If it is
the privacy data. At last, the encrypted data will legal, the top-level authority applies Delegate
be uploaded to the cloud server for storage. The algorithm to generate the private key. It chooses
ciphertext contains the access structure, there- r′ ∈ Zp. For 1 ≤ i n and 1 ≤ ki ni, then calculate
fore, only if the attributes set contained by the
h1 H1 (r ), h r ′ = h h1r d1 ′ ( h1r )H0 (x i ki ) and σ ir′ =
secret key that authorized by domain authority
matches the access structure, the user can decrypt d0 d1r ⋅ d1r ′ . The private key of the new member is
the data. Cloud service provider is responsible SKK DA /SKK u (r , h r ′ , { ir }1≤ii n,n,1≤kk n ).
i i
for the storage of the data that uploaded by the 4. Create a new file: Encrypt( PK , M ,W ) → CT TW
The access policy is W [W W Wn ], where
owner, and provides download service for users
who put forward the request to access the file. The
Wi vi , ki , and the message to be encrypted is M.
system model is a multi-level structure with root
For 1 ≤ i ≤ n and 1 ≤ ki ≤ ni, the owner calculates
authority and domain authority. Thus the calcu-
lation of the authorized key can be effectively dis- XW YW = ∏ i I X i ,kki , ∏ i I Yi , ki . It chooses
W W
persed and the burden of the root authority will s ∈ Zp, and calculates C0 MY YWs , C1 = gs and
be reduced. In addition, it makes the scheme more C2 XWs . The ciphertext is CT TW = (W C C C ).
scalable to cope with the huge growth of users in
cloud environment. The length of CTW is 2L0 + L1, where L0 is the bit-
length of an element in G and L1 is the bit-length
of an element in GT.
4.2 Detailed scheme Because of the complexity of CP-ABE algo-
rithm, it isn’t suitable to encrypt large files. To
The scheme mainly includes five algorithms: Setup, solve the problem, we use Symmetric Encryption
KeyGen, Delegate, Encrypt and Decrypt. Key (DEK) to encrypt data files to get cipher
1. Establish system: Setup u ( λ U ) → ( PK , MK ) data, and then use CP-ABE algorithm to encrypt
Suppose that G and GT are cyclic multiplica- the DEK to get cipher key. Users can get the data
tive groups of a large prime order p, and g is a files by decrypting the cipher key and cipher data
generator of G. Function eˆ : G1 G2 GT is a in proper order. Before the data file is uploaded to
bilinear pairing. There are n attributes in the sys- the cloud server, the owner should manipulate the
tem, attribute set is U = { 1,ω 2 ,,ω n }, where data file as follows:
each attribute has more than one value. The a. Select a unique ID for the data file.
ith attribute ωi has ni values, whose value set b. Select a DEK from keyspace randomly, the
is Si {vi ,1,vi , vi ,ni }. Define two hash func- DEK is used to encrypt the file.
tions: H 0 : Z p {0,1}log2 n × {0,1}log2 nm → Z p and c. Encrypt the DEK using Encrypt algorithm,
H1 : Z p → G where nm max in=1 ni . The root output is CTW. Regard cipher data and cipher
authority chooses x, y ∈ Zp. For 1 ≤ i ≤ n and key as a whole file, and upload it to the cloud
1 ≤ ki ≤ ni, then calculate X i , ki g − H0 (x i ki ) and service.
ˆ( , )H0 ( i k ) . The public key is PK =
Yi , ki ê(
( ,{X i , ki ,Yi , ki }1 i n,1≤ ki ni ), and the master key is Data files’ format in the cloud storage is as
MK = (x, y). shown in Fig. 2.
2. Authorize for top-level domain authority: 5. Access files: Decrypt ( PK ,SK
SK TW ) → M
K u CT
KeyGen ( PK , MK , L ) SK SK DA When cloud service provider receives a request
When a top-level domain authority whose attrib- to access the encrypted file that is stored in the
ute set is L [ L L Ln ] where Li vi , ki
requests to join the system, the root author-
ity verify its legitimacy at first. If it is legal, the
root authority applies KeyGen algorithm to gen-
erate the private key. It chooses r ∈ Zp. For 1
≤ i ≤ n and 1 ≤ ki ≤ ni, then calculate hr = H1(r),
d0 g H0 ( y||ii ki ) , d1 ( h r )H ( x||ii ki ) and σ ir = d0 d1r . The
private key of the top-level domain authority is
K DA = (r, h r , { ir }1≤ii n,1≤kk n ).
SK Figure 2. Data files’ format in the cloud storage.
i i
577
cloud server from a user, it sends the correspond- returns gi j g z where z ∈ Zp and Li j Wi j . Or else
ing ciphertext file to the user. At first, the user S chooses i j { n} and adds 〈 gi j g 〉 to L1
detects L and W. If L|≠ W, the algorithm returns and returns gi j g z where z ∈ Zp.
⊥. Otherwise, L|= W. When L|= W,, user calculates KeyGen Oracle OKeyGen(L): on assumption
σ W ∏ i I σ ir ′ and M = ê(ˆ ( W , 1 )0ˆ ( r′ , 2 ) , where
C
W
that A requests L to generate the private key,
M is the DEK. At last, the user uses the DEK to if L| ≠ W *, there must be i j IW * that makes
decrypt the encrypted file to access the data. Li j Wi j existed. Supposed Li j vi , kˆ
j i
and
j
Wi j vi j ,ki , S chooses r ∈ Zp and calculates
j
H0 ( || j || ˆi j ) 0( || || ˆ )
5 SECURITY ANALYSIS σ ij σ ˆ =g ( ) . For t ≠ ij,
j , ij j
Theorem 1: Assume that the adversary A requests choose z ∈ Zp and calculate as follows.
qH1 random oracle and qK key generation at most. Case 1. If t IW − {i j* }, on assumption that
If it is true that (t, ε, l) – BDHE holds in G, the pro- Lt vt ,kt , S calculates (2).
posed scheme is (T ′, ε, m) secure, where m is an upper
( )
H0 ( x t kt )
(X )
−z
bound of the total number of users in the system, σt σ t , kt = g H ( y t kt ) gi j gm t+ij t (2)
N = ∑ i =1 ni T ′ T + (qH1 + m qk N )T1 ο ( N ) T2
and T1, T2 represent the time complexity of modu-
lar exponent operation in group G, GT respectively. Case 2. If t i j* , on assumption that
Proof: Suppose that there is a t-time adversary Li vi * ,ki , S calculates (3).
j j j*
A so that Adv IND
N
d CP CP CPA
− ABE ( A) ≥ ε . We build a simu- ⎛ ⎞ ⎛ ⎞
lator S that has advantage ε in solving the decision
( )
H0 y i ki * ⎟ H0 x i ki * ⎟
⎝ j j ⎠
m–BDHE problem in G. S inputs a random deci- σi σ i * ,ki =g ⎝ j j ⎠
gi j
j j j*
sion
m–BDHE challenge ( , h, yg , ,m , Z ), where ⎛ ⎞
yg m ( g1, g2 gm ,ggm + 2 ,g
( )
−z
, g2 m ) and Z is either
×⎜ ∏ gm−1+1−− k + i j ⎟ X i * (3)
⎜ k ∈I − ⎟
⎝ W { }
ˆ( m +1, ) or a random element in GT. S plays the
ê( j
⎠
role of challenger in the IND–sCP–CPA game, and
it interacts with A as follows:
Init. A sends a challenge policy W * ∩ i I * Wi Case 3. If t ∉ IW * , on assumption that Lt vt , kt ,
S calculates (4).
to S, where IW * {i ,ii , , iw } (w ≤ n) represents all
W
∑ H ( x t kt ) ∑
1
( ij , i , j , i ) ( 1 j, ( , ) ). xW *
w
H 0 x i j ki j (5)
j j
t I * j =1
W
For i j* where Wi vi * ,ki . Calculate ( i * ,ki * ,
j j j* j j
( )
− H0 ( x ||i * ||ki * )
∏ g H ( y t kt )
H0 ( y||i * ||ki *)
Yi * ,ki ) = ( g ∑ ∑
j j w
j
m +1−t , eˆ( g, g ) j
yW H 0 y i j ki j (6)
{ }
j j* t I * j =1
W
t ∈I * − i *
W j
α m +1
eˆ ( g, g ) )
. XW * Xi ∏ t I * {i } X t
If i j ∉ IW * , for 1 ≤ ki j ≤ ni j , S calculates ( ij , ij , j W j*
⎛ ⎛
− H0 x i
⎞
⎞
, eˆ ( g, g )
ki * ⎟
∏
− H0 ( x ||i j || ki j ) H0 ( y ||i j || ki j )
Yi j , ki ) = ( g ). = ⎜g ⎝ j j ⎠
j
⎝
t I *− i*
W j { } gm 1 t ⎟⎠ (7)
The public key is PK = ( g,{X i ,kki ,Yi ki }1≤ii n,1≤ ki ni ),
and is sent to A. ∏ t ∈I
W
− { } g − H (x t kt ) gm−1+1−t =g W *
−x
{i } eˆ ( g, g ) e ( g, g ) W *
a ∈ Zp, add 〈⋅, a〉 to L0, and return a. ∏
y
578
y of the ciphertext and the computation of bilinear
lates C0* M bYWs * M b Z eˆ( g h ) * C1* h and
* −x * pairing to the constant value, and introduces hier-
C2 h W . The challenging ciphertext is
TW * = (W * ,C * ,C * ,C * ). If Z eˆ ( gm +1, h ) , CTW* is
archical authorization structure, reducing the bur-
CT
den and risk of a single authority.
an effective ciphertext. If Z is a random element in
GT, CTW is independent of b.
Phase 2. Phase 2 is the same as Phase 1.
REFERENCES
Guess: The output of A is b′ that is the spec-
ulation about b. If b = b′, it represents that
Z eˆ ( gm +1, h ) in the m – BDHE game. Or else it
Bethencourt J, Sahai A, Waters B. Ciphertext-policy
attribute-based encryption[C]//2007 IEEE sympo-
output 0, which represents that Z is a random ele- sium on security and privacy (SP’07). IEEE, 2007:
ment in GT. As a result, if Z eˆ ( gm +1, h ) ,CTW * is 321–334.
an effective ciphertext, where (9) is workable. Cheung L, Newport C. Provably secure ciphertext policy
ABE [C]//Proceedings of the 14th ACM conference
Pr ⎡⎣ (g, h, y
g, ,m
g, , ˆ ( gm 1 , h )1⎤⎦) on Computer and communications security. ACM,
2007: 456–465.
1 1
= + Adv IND sCP
Ad CP CP
ABE
CPA
( A) ≥ + ε (9)
Emura K, Miyaji A, Nomura A, et al. A ciphertext-
policy attribute-based encryption scheme with con-
2 2
stant ciphertext length[C]//International Conference
on Information Security Practice and Experience.
If Z is a random element in GT, Mb is completely
Springer Berlin Heidelberg, 2009: 13–23.
hidden from A, and Pr[ ( g, h, yg ,α , m , ) = 1] 2 . In
1
Goyal V, Pandey O, Sahai A, et al. Attribute-based
the process of solving the problem of determining encryption for fine-grained access control of
m – BDHE, the advantage of A is at least ε, where encrypted data[C] // Proceedings of the 13th ACM
conference on Computer and communications secu-
T ′ = T + ο (q
(qH1 + m ⋅ qK + N )T1 + ο ( N )T2 .
rity. Acm, 2006: 89–98.
Han J, Susilo W, Mu Y, et al. Attribute-based oblivi-
ous access control [J]. The Computer Journal, 2012,
6 SUMMARY 55(10): 1202–1215.
Rao Y.S, Dutta R. Recipient anonymous ciphertext-
In this paper, we propose an access control scheme policy attribute based encryption[C] //Interna-
for encrypted files based on cloud storage sys- tional Conference on Information Systems Security.
tem. It is a hierarchical based on the attribute Springer Berlin Heidelberg, 2013: 329–344.
and the length of the ciphertext is constant. And Sahai A, Waters B. Fuzzy identity-based encryption[C]//
it is proved that the new scheme is secure in the Annual International Conference on the Theory and
Applications of Cryptographic Techniques. Springer
random oracle model. The scheme supports the
Berlin Heidelberg, 2005: 457–473.
strategy that has a plurality of attributes and wild-
card ANDNDm* strategy. The scheme limits the length
579
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: Cloud computing is a new application model. It can significantly reduce the operating
costs and improve operational efficiency. With the continuous development of cloud computing tech-
nology, security and privacy have become the biggest obstacle to cloud computing applications. Access
control technology is an important measure and means to protect the access and data security of cloud
services in cloud computing environment. In the cloud computing environment, massive data grows with
each passing day, which makes the data of Internet more and more abundant. At the same time, it also
leads that the storage space of the third party cloud service provider has enormous challenges. Based
on the Hadoop cloud platform, a hierarchical Ciphertext-Policy Attribute-Based Encryption (CP-ABE)
access control model with constant-length decryption key is proposed and implemented in Hadoop cloud
environment. The model not only has the characteristics of constant-length decryption key, hierarchical
authorization structure, reduction of the computation quantity, but also is proved that the model can
realize the efficient access control of encrypted data in the cloud computing environment, and solve the
problem of limited cloud storage space.
Keywords: Constant-length decryption key; hierarchical access control; cloud computing; Hadoop
581
underlying details of the distributed system. So nodes. (3) High efficiency. Hadoop can guarantee
users can easily use Hadoop to organize computer the dynamic balance among the nodes. (4) Strong
resources, so as to build their own distributed com- fault tolerance. Hadoop automatically saves multi-
puting platform. ple copies of the data, and can automatically redis-
HDFS cluster adopts the Master-Slave struc- tribute of failed tasks.
ture, which is composed of a NameNode and a
number of DataNodes. NameNode is the main
2.2 Summary of CP-ABE algorithm
server, which manages the file system namespace
and the users to access to the file. DataNodes man- CP-ABE algorithm with constant-length decryp-
ages the data stored in the cluster. The architecture tion key consists of five polynomial time algo-
of HDFS is shown in Fig. 1. rithms: Setup, KeyGen, Delegate, Encrypt and
Hadoop mainly has the following advantages: Decrypt, achieving to establish the system, author-
(1) High reliability. Hadoop computing power is ize for the root authority, authorize for the domain
worthy of trust. (2) High extensibility. Hadoop authority/users, and create new files and access
clusters can be easily extended to thousands of files respectively.
u (1λ U ) → ( PK , MK ): The inputs are the
Setup
security parameter λ in the system and all the real
attributes set U, and output the system public key
PK and master key MK.
KeyGen ( PK , MK , L ) SK SK DA : The inputs are
the public key PK, the master key MK and the
attributes set of the domain authority L, and out-
put the private key of the domain authority SKDA.
Delegate (SK L1 ) SK
SK DA ,L K DA /SKK u : The inputs
are the private key of the domain authority SKDA
and the attributes set of the domain authority/
users L1, and output the private key of the domain
authority SK K DA′ or the decryption key of users SKu.
Encrypt ( PK , M ,W ) → CT TW : The inputs are the
public key PK, the data to be encrypted M and the
access structure W, and output the ciphertext CTW.
Decrypt ( PK ,SK
SK
K u CTTW ) → M : The inputs are
the public key PK, the decryption key SKu and
the ciphertext CTW, and output the data to be
Figure 1. The architecture of HDFS. encrypted M.
582
3 SYSTEM SCHEME Step 1: The top-level domain authority verifies
legitimacy of the new domain authority/user.
3.1 System model Step 2: The top-level domain authority chooses
r ′, r * ∈ Z p .
The system model is based on the Hadoop cloud
platform, which is shown in Fig. 2. Step 3: The top-level domain authority calcu-
The system mainly consists of five types of lates d1 ′ h1r )H0 ( x||i ||ki ) , σ ir ′ = d0 d1r ⋅ d1r ′ , D = ∏i I
L1
entities: the root authority, the domain author- [ i ′ 1 (r* )H ( || || ) ] and E H1 (r ) H1 (r′ ) H1 (r* )
ity, data owner, user and cloud service provid-
ers. The root authority has the highest authority, (1 ≤ i ≤ n , 1 ≤ ki ≤ ni ).
which is responsible for the generation of system Output: SK K u = ( D, E ).
K DA′ /SK
parameters, authentication domain authority and Algorithm 4: Encrypt ( PK , M ,W ) → CT TW
its authorization. The domain authority man- The access policy is W [v1,kk1 ,v ,k2 , ,vn,ni ] and
ages owners in the domain, and authorizes for the the data file to be encrypted is M.
general users. The hierarchical attribute author- Step 1: The owner calculates XW YW = ∏i IW
ity structure distributes the computation. At the X i , ki , ∏i IW Yi , ki (1 ≤ i ≤ n , 1 ≤ ki ≤ ni ).
same time, combined with the access authentica- Step 2: The owner chooses s Z p.
tion mechanism between Master node and Slave Step 3: The owner calculates C0 MY YWs , C1 g s
nodes in Hadoop, the burden and risk of the root and C2 XWs .
authority are reduced. The owner obtains cipher
Output: CT TW = (W C C C ).
keys and other related parameters, encrypts the file TW ) → M
Algorithm 5: Decrypt( PK , SK K u ,CT
to be shared, and then uploads it to the cloud serv-
A user requests to access the encrypted file that
ice provider. Because the cipher text contains the
is stored in the cloud server.
file access structure, only the users with the cor-
Step 1: The user obtains the corresponding
responding attributes can decrypt the file.
ciphertext file from the cloud server.
Step 2: The user detects L and W.
3.2 Detailed scheme Step 3: If L W , the user calculates M =
C0
Master node, which is the root authority of the ˆ( , 1 ) ˆ( , 2 )
ê(
.
authority structure in Hadoop, establishes the sys- Output: The data file M.
tem using Setup algorithm.
Algorithm 1: Setup u (1λ U ) → ( PK , MK )
G and GT are cyclic multiplicative groups of 4 EXPERIMENT AND ANALYSIS
a large prime order p, and g is a generator of G.
eˆ : G1 G2 GT is a bilinear pairing. The system 4.1 Experimental environment
attributes set is U = { n } , where the CPU: Inter(R) Core(TM) i7–4712MQ 2.3GHz
ith attribute ω i has ni values, whose value set is RAM: 16GB
Si { vi vi }
vi ni . Platform: VMware Workstation 12 Pro
Step 1: Define two n
hash functions: H 0 : Z p × Hadoop version: 2.5.1
{ ,1}l 0, }log2 (maxi 1 i ) → Z p and H1 : Z p → G .
{0, In the experiment, there are three machines of
Step 2: The root authority chooses x y ∈ Z p. the above configuration. Each machine invents
Step 3: The root authority calculates Xi,ki = two Ubuntu systems. The Hadoop cluster is the
g − H0 (x i ki ) and Yi ,ki ê( ˆ( , )H0 ( y||i ||ki ) (1 ≤ i ≤ n , 1 ≤ kι cloud service provider. Table 1 shows the configu-
≤ nι). Output: PK = ( g,{X i ,kki ,Yi ki }) ration of the experimental machines.
MK = ( x, y ).
Algorithm 2: KeyGen ( PK , MK , L ) SK SK DA
A domain authority requests to join the system, Table 1. The configuration of the experimental
whose attribute set is L [v1,kk1 ,v , k2 , ,vn, ni ]. machines.
Step 1: The root authority verifies legitimacy of
the domain authority. Name OS IP Indentity
Step 2: The root authority chooses r Z p . 1 CentOS 192.168.211.128 Master
Step 3: The root authority calculates h H1 (r ), 2 CentOS 192.168.211.129 Slave1
d0 g H0 ( y i ki ) , d1 ( h r )H0 ( x||i ||ki ) and σ ir = d0 d1r 3 CentOS 192.168.211.130 Slave2
(1 ≤ i ≤ n, 1 ≤ ki ≤ ni ). 4 CentOS 192.168.211.131 Slave3
Output: SK K DA = (r, h r ,{σ ir}) . 5 CentOS 192.168.211.132 Slave4
Algorithm 3: Delegate (SK SK DA ,LL1 ) SK K DA /SK
Ku 6 Ubuntu 192.168.211.133 Owner
A new domain authority/user requests to join the 7 Ubuntu 192.168.211.134 User
system, whose attribute set is L′′ = [v1,kk1 ′ ,,vn, ni ′ ].
583
4.2 Data analysis is nearly a constant value, which has nothing to do
with the number of attributes in the access structure.
As is shown in Fig. 3, the time that the system As is shown in Fig. 5, the execution time of the
establishes is proportional to the number of the decryption algorithm is nearly a constant value,
attributes in the access structure, and the time that which has nothing to do with the number of attrib-
the generation of the domain authority’s private utes in the access structure. Besides, the length
key is proportional to the number of the attributes of the decryption key is constant, which is not
in the access structure, too. affected by the number of attributes in the access
As is shown in Fig. 4, the time that the genera- structure and other factors.
tion of the user’s decryption key is proportional to The experimental results show that the scheme
the number of the attributes in the access structure, limits the length of the decryption key, the com-
and the execution time of the encryption algorithm putation of the encryption and the decryption to
584
Figure 5. Time of the Decrypt algorithm and the length of the decryption key.
585
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: In order to solve the problem of Bayesian network structure learning, this paper pro-
poses a Bayesian network structure learning problem to solve the problem of adjacency matrix. The
adjacency matrix and 1-step dependency coefficient are given, and the adjacency matrix is constructed.
The advantage of this method is that the local optimisation ability of the climbing algorithm is applied
to the genetic algorithm to fully release the global optimisation ability of the genetic algorithm to achieve
the fast convergence of the algorithm. The simulation results show that the algorithm has the effectiveness
of the optimisation algorithm.
587
Figure 1(b) is the corresponding adjacency
matrix A of (a), aij is the row i and column j of the
adjacency matrix, that is:
⎧1
aij = ⎨
( ) (1)
⎩0 ( )
Figure 2. Climbing algorithm search process.
n n
2.2 1-step dependence coefficient
max H (X ,α ) = ∑ ∑ cij aij (5)
Let χ denote the χ distribution with degrees of
2
ij k
2
i =1 j 1, j ≠ i
freedom df = ( ni )(n )( n j − )nk , ni is the number of
state n of the variable set X; χ df ,α means degrees
2
588
plexity of the work of genetically coding, it is often measured separately. At each evolution, the struc-
reduced to a binary-coded form in practice. After tural measure of the offspring is estimated accord-
the initial population is generated, according to ing to the expected network statistic.
the survival of the fittest and survival of the fittest
principle, generation by generation produces bet-
4.4 Genetic operators
ter and better approximation. In each generation,
the individuals are selected according to the fitness 1. Select the mode
of the individuals in the problem domain, and the For the genetic model to be selected to be arranged,
crosses and variants are generated by means of the according to the fitness value of each monomer
genetic operators of natural genetics to produce as a parent to determine the size of the possibil-
the population representing the new set. This pro- ity of a larger fitness value will become the next
cess will lead to the evolution of the population generation of population, Let Ir(j) denote the j th
as the natural evolution of the post-generation monomer of the population at time t, rank ⎡⎣ It ( j ) ⎤⎦
population is more adaptable to the environment denote its fitness function value arrangement, and
than the previous generation. The best individuals λ denote the size of the population. The probabil-
in the final population can be decoded as the prob- ity pj,t that the monomer can be selected as a parent
lem approximate optimal solution. during the genetic process is:
589
to cross and a certain probability of variation to Table 1. 1-step dependence coefficient calculation
improve individual environmental adaptability to result.
promote the continuous evolution of the popula-
tion. In the iterative process of genetic algorithm, X1 X2 X3 X4 X5 X6
the method of local climbing is introduced to X1 0 80 127 −18 32 −2.5
reduce the iteration step to improve the efficiency X2 80 0 −1.0 3.5 −12 −20
of searching. X3 127 −1 0 70 −30 140
1. Initialise each node in the network and its fit- X4 −18 3 70 0 8 −2
ness function; X5 32 −12 −30 8 0 80
2. According to the network structure, the initial X6 −2 −20 140 −2 80. 0
undirected graph is determined and its optimi-
sation objective function is constructed;
3. Randomly generate N chromosomes as the ini- 10–5, then stops the operation. Finally, the net-
tial population C0; work structure shown in Figure 1 (a) is obtained
4. The vector structure of the network coding; by the method proposed in this paper.
5. The second-generation population C1 is
obtained from the initial population with cross-
over probability pa;
6. A new population C2 is obtained from C1 with 7 CONCLUSION
mutation probability pb;
7. Calculate the fitness value and selection prob- In this paper, Bayesian network structure is
ability of each generation to eliminate the learned through improved hill-climbing algorithm
parent; and genetic algorithm, and the optimal results are
8. The population Ct of the generation t is obtained obtained by solving the interdependent coefficient
by local climbing algorithm; of 0–1 matrix. The experimental results show that
9. After the evolution of the n generation or after the proposed method is reasonable and effective,
the iterative generation of m-generation net- which provides a reliable foundation and broad
work structure is not changed after the termina- application prospect for Bayesian network struc-
tion of iteration, the resulting network structure ture learning in large-scale and complex systems in
will be the optimal algorithm to optimise the the future.
network.
REFERENCES
6 SIMULATION EXPERIMENT
AND ANALYSIS Campos, L.M., Gamez, J.A. & Moral S. (2002). Partial
abductive inference in Bayesian belief networks—an
In order to verify the effectiveness of the algorithm evolutionary computation approach by using prob-
lem-specific genetic operators. IEEE Transactions on
Figure 1(a) is an example of structural learning.
Evolutionary Computation, 6(2), 105–131.
First, the number and position of the nodes are Chai, Y. & Zhou, Y.Z. (2014). Improvement of climbing-
determined according to the observed training hill method by genetic. Journal of Liaoning Technical
samples and the relational data are generated. The University (Natural Science) 33(7), 997–999.
1-step dependency coefficient between nodes was Gao, X.G. & Xiao, Q.K. (2007). Non-stationary stochas-
calculated. The results are shown in Table 1. tic system dynamic Bayesian structure learning rela-
In this paper, we use Matlab to solve the ini- tion network. Acta Aeronautica et al., Astronautica
tial solution of the relationship between nodes. In Sinica, 28(6), 1408–1418.
the calculation, the parameters include the initial Wang, C.F.A. (2013). Bayesian network learning algo-
rithm based on unconstrained optimization and
population size, significance level, crossover prob-
genetic algorithm. Control and Decision, 28(4),
ability, mutation probability, and iteration algebra. 618–622.
The population size N = 100, significance level α = Wang, X.Y. & Wang, X.L. (1999). Improvement and
0.005, crossover probability pa = 0.98, and muta- implementation of heuristic search strategy. (1999).
tion probability pb = 0.01. The use of BIC scoring Journal of Shan Xi Normal University (Natural Sci-
function, when the iteration accuracy is less than ence Edition), 27(1), 58–60.
590
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: In recent years, people’s living standards have steadily improved. Thus, the demand for
electricity is growing. Besides, electric power system reform is constantly advancing, so the evaluation of
power construction projects is particularly important. In this paper, we establish an understanding of the
current situation and basic theory of power construction project evaluation. We then set up the compre-
hensive evaluation index system of a power construction project, establish a three-level index system, and
use the analytic hierarchy process to calculate the weight. The fuzzy comprehensive evaluation method is
used to evaluate the electric power construction project, and the evaluation results are obtained by using
first-level fuzzy evaluation and two grade fuzzy comprehensive evaluation.
Keywords: Electric power construction project; Analytic hierarchy process; Fuzzy comprehensive
evaluation
CI
CR = (3) 5. Comprehensive evaluation
RI
After finding out the weight set and evaluation
When CR<0.1, the consistency of the judgement matrix, the following is the comprehensive evalu-
matrix is acceptable, otherwise the corresponding ation. Evaluation model:
judgement matrix is properly modified.
⎛ r11 r12 r1m ⎞
2.2 Fuzzy comprehensive evaluation method ⎜r r22 r2 m ⎟
B (b b bm ) = AoR (a a an ) o ⎜ 21 ⎟
Fuzzy comprehensive evaluation method is an ⎜
⎟
application of fuzzy mathematics. By means of ⎜⎝ r rn 2 rnm ⎟⎠
n1
fuzzy mathematics, it can quantify the factors that
592
3 CASE STUDY 3.2.1 Determination of the weight of the first
class index
3.1 Establish the evaluation indexes According to experts’ opinions and scores, we
should structure a comparison judgement matrix,
Due to the establishment of a comprehensive eval-
and put the data into the AHP method in deter-
uation index system of a power enterprise project
mining weight formula. Then we calculate the
involving the consideration of a lot of factors, the
eigenvalues and the corresponding eigenvectors
uncertainty is serious and some factors are diffi-
and carry on the consistency check. Finally, we get
cult to describe quantitatively, making the problem
the weights of acceptable values. Detailed results
more difficult to solve. Therefore, according to the
are shown in Table 2.
principle of index selection, and the establishment
According to Formulas (2) and (3), we can
of a power enterprise project evaluation index sys-
calculate CI = 0.01612 and CR = 0.01. Because
tem from domestic and foreign research results, we
CR<0.1, the consistency of the judgement matrix
use an expert investigation method, through the
can be accepted through consistency checking.
investigation and discussion of the decomposi-
tion, all possible factors, and eliminate those weak 3.2.2 Determination of the weight
effect, small factors, summary of expert opinion of the secondary indexes
survey, concludes that comprehensive opinion, By using a similar method, the weight of each level
again to seek expert advice, after repeatedly, can two indexes is determined, and the comparison
form the same or close to the group of expert opin- judgement matrix is constructed. The results are
ion consistent. as follows:
In this paper, we set up the index system for the W1 = (0.6, 0.2, 0.2),
power supply reliability, power quality, safety and W2 = (0.4, 0.4, 0.2),
stability, development coordination, service social W3 = (0.26, 0.1, 0.64),
development and economy. Specifics are shown in W4 = (0.64, 0.26, 0.1),
Table 1.
Table 2. First level index weight.
3.2 Determination of index weight based O A1 A2 A3 A4 A5 A6 Weight
on Analytic Hierarchy Process
A1 1 2 1 3 3 1 0.24
AHP needs to build judgement matrix of deter-
A2 1/2 1 1/2 3 3 1 0.17
mining, the construction of judgment matrix is by
A3 1 2 1 3 3 1 0.24
invite relevant experts to rate the importance of A4 1/3 1/3 1/3 1 1 1/3 0.07
the various indicators, the indicators of the rela- A5 1/3 1/3 1/3 1 1 1/3 0.07
tive importance of evaluation. Finally, experts get A6 1 1 1 3 3 1 0.21
consistent results through negotiations.
Evaluation of electric Reliability index of power supply A1 Reliability rate of power supply A11
power construction Average user outage time A12
project Average interruption times of customer A13
Power quality index A2 Voltage deviation A21
Supply voltage qualification rate A22
Frequency deviation A23
Safety stability index A3 N-1 calibration qualified rate A31
Transformer load rate A32
Transformer capacity ratio A33
Development coordination index A4 One-Line and One-Transformer A41
Ratio of linear variable capacity A42
The ratio of the upper and lower variable A43
electric capacity
Service social development index A5 Provide direct employment A51
Environmental improvement A52
Economic index A6 Net Profit Margin A61
Internal rate of return A62
Line loss rate A63
Unit power supply cost A64
593
W5 = (0.75, 0.25), B4 = (0.436, 0.39, 0.148, 0.026),
W6 = (0.07, 0.15, 0.39, 0.39), B5 = (0.35, 0.375, 0.15, 0.125),
W = (0.24, 0.17, 0.24, 0.07, 0.07, 0.21). B6 = (0.532, 0.291, 0.117, 0.06).
After calculation, the above CR are less than
0.1. So the consistency of the judgement matrix 3.4 Second fuzzy comprehensive appraisement
can be accepted and can pass the consistency test.
According to the results of the first-level fuzzy
evaluation, the level two fuzzy evaluation will be
3.3 First level fuzzy comprehensive evaluation carried out. The first level index weight is:
According to the characteristics of electric power W = (0.24, 0.17, 0.24, 0.07, 0.07, 0.21)
construction projects and expert opinion, establish
remark set V = {v1, v2, v3, v4} = {excellent, good,
medium, poor}, correspondence to V = {1, 0.8, 0.6, ⎛ 0.58 0.36 0.06 0 ⎞
0.4}. Then select certain quantity experts who have ⎜ 0.42 0.38 0.12 0.08 ⎟
⎜ ⎟
appropriate qualifications to score each indicator. ⎜ 0.646 0.216 0.138 0 ⎟
Establish fuzzy judgement matrixes of R1, R2, R3, R=⎜
R4, R5, and R6. The relation matrix of power sup- ⎜ 0.436 0.39 0.148
1 0.026⎟⎟
ply reliability is as follows: ⎜ 0.35 0.375 0.15 0.125⎟
⎜ ⎟
⎝ 0.532 0.291 0.117 0.06 ⎠
⎛ 0.6 0.3 0.1 0⎞
R1 = ⎜ 0.5 0.5 0 0⎟ The final evaluation set can be obtained accord-
⎜ ⎟
⎝ 0.6 0.4 0 0⎠ ing to the formula “B = W×R”.
B = (0.5324, 0.3175, 0.1134, 0.0368).
Similarly, the relation matrix of power quality,
security stability, development harmony, devel- 3.5 Result analysis
opment of service society, and economic can be
concluded: In accordance with the principle of maximum
membership degree, the evaluation results of the
power construction project can be seen in the mem-
⎛ 0.4 0.3 0.2 0.1⎞ bership of the four grades, the maximum value of
R2 = ⎜ 0.5 0.4 0 0.1⎟ , 0.5324. Therefore, the comprehensive evaluation
⎜ ⎟
⎝ 0.3 0.5 0.2 0 ⎠ of the power construction project is 0.5324, and
the evaluation value is “excellent”, indicating that
⎛ 0.7 0.3 0 0⎞ the power construction project feasibility is higher.
R3 = ⎜ 0.8 0.1 0.1 0⎟ , But there is still 15.02% (11.34%+3.68%) showing
⎜ ⎟ that the project feasibility is not very high, so it
⎝ 0.6 0.2 0.2 0⎠ should be studied and analysed to further improve
the quality of all aspects, in order to achieve higher
⎛ 0.4 0.4 0.1 0.1⎞ requirements.
R4 = ⎜ 0.5 0.4 0 0.1⎟ ,
⎜ ⎟
⎝ 0.5 0.3 0.2 0 ⎠
4 CONCLUSION
⎛ 0.4 0.4 0.1 0.1⎞
R5 = ⎜ ,
⎝ 0.2 0.3 0.3 0.2⎟⎠ In this paper, the current evaluation situation has
carried out a simple introduction, focusing on
⎛ 0.4 0.3 0 0.3⎞ the analytic hierarchy process, and fuzzy compre-
⎜ 0.5 0.5 0 0⎟ hensive evaluation and index system construction
R6 = ⎜ ⎟. content were studied. According to the character-
⎜ 0.6 0.3 0.1 0 ⎟ istics of the electric power construction project, we
⎜ 0.5 0.2 0.2 0.1⎟⎠
⎝ adopt the fuzzy comprehensive evaluation method
for comprehensive evaluation. We set up the index
system for the power supply reliability, power qual-
According to the formula “B = W×R”, we can
ity, safety, stability, balanced development, service
get the final evaluation set of the project.
and social development and the economy from six
B1 = (0.58, 0.36, 0.06, 0), aspects, using AHP to calculate index weight, and
B2 = (0.42, 0.38, 0.12, 0.08), finally some conclusions. The evaluation results
B3 = (0.646, 0.216, 0.138, 0), can provide reference for the operation, planning,
594
and construction of electric power construction He, Y. (2011). Electric power comprehensive evaluation
projects, so as to ensure the scientific reliability of method and application. Beijing: China Electric Power
the decision. Press.
Liu, F. (2014). The comprehensive evaluation of Qin-
huangdao Changli 500 K substation construction pro-
ject. Beijing: North China Electric Power University.
ACKNOWLEDGEMENTS
Wang, X. (2012). The comprehensive evaluation of Inner
Mongolia Qixiaying power transmission project. Bei-
The authors acknowledge the support of the “Key jing: North China Electric Power University.
Technology and System Research of Company Wang, X. (2013). Comprehensive evaluation study on the
Project Plan Audit Analysis” project. expansion project of Beijing urban substation expan-
sion project. North China Electric Power University.
Zhong, Y. (2011). Electric power safety risk assessment
REFERENCES based on fuzzy analytic hierarchy process. Journal of
Chongqing Electric Power College.
Du, J. (2015). 220 kV intelligent substation construc-
tion project comprehensive evaluation and empirical
research. Beijing: North China Electric Power University.
595
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: Based on summarising the current situation of related theories at home and abroad, we
put forward the research content of this paper, that is, research on vehicle routing optimisation in the
period of natural disaster rescue emergency. The paper determines the objective function of the emergency
period and establishes a model based on the function. During the modelling process, we use dimensionless
method and multi-objective optimisation to transfer the multi-objective problem into a single-objective
problem. Finally, we get the total weights and put them into the emergency network, then we are able to
transfer the emergency vehicle routing problem into shortest road problem. And we can use Lingo to
solve this problem. In this paper, we also regard the rescue of Wenchuan earthquake is an example used
to illustrate and apply the method and make some recommendations.
598
In the above model, the objective function (1) Shifang City in the disaster area. This paper takes
indicates that the total weight value is minimum, into account the basic situation of the disaster,
that is, the total weight of the total travel time of the division of the affected area, the grade of the
the emergency rescue vehicle on the emergency road and highway between the affected points, the
road network and the emergency vehicle driving road damage degree between the affected points,
reliability is the least. the traffic volume between different regions, and
Equation (2) represents the total weight value on the distance between the affected points. Then the
the emergency road network, and the total weight fuzzy comprehensive evaluation method, based
value takes into account the reliability factor and on Analytic Hierarchy Process (AHP), is used to
the time factor of the emergency vehicle driving. evaluate the reliability of emergency rescue vehi-
Equation (3) shows the travel time of the emergency cles in an emergency road network. Twelve road
rescue vehicle on each section of the emergency sections can be selected in the road network, and
network. Equation (4) represents the constraint the fuzzy comprehensive evaluation value of each
factor of the speed of the emergency rescue vehicle line is obtained.
on a congested road network. Equations (5) and
(6) are dimensionless processing of the reliability
4.1 Count the ranking value rij of vehicle driving
and the time of the emergency vehicle. Constraints
reliability in road network
(7) indicate that more than one emergency res-
cue vehicle needs to be allocated for emergency Based on the fuzzy comprehensive evaluation
resource demand at the disaster demand point, value of each road segment, the driving reliability
and the emergency logistics distribution centre’s of each road section is sorted; the higher the rank
inventory is able to meet the demand. Constraints of the road, the higher the reliability of the vehicle
(8) indicate that the emergency rescue vehicles are and the more inclined to select the road. The rank-
moving in and out of the same disaster-affected ing value of each road is counted and the extreme
area to ensure that the sections of the emergency value method (13) is adopted to non-dimensional-
rescue vehicle are continuous with each other. ise rij, by which we can get r ′. As shown in Table 1.
ij
Constraints (9) indicate that the emergency rescue
vehicle only passes once at the same disaster site.
Constraints (10) indicate that the emergency res- rij′ =
{}
rij − min
(13)
cue vehicle must initially start from the emergency max {} {}
− min
logistics distribution centre. (11) is a 0–1 integer
variable constraint. (12) is a constraint on time and
distance in the real world. 4.2 Calculate the average travel time tij of the
vehicles in the emergency period
3.4 The solution of the model According to the traffic flow at this period, we
can determine ∂ij, combined with the formula
The solution of the model is as follows:
tij = dij / ∂ij v, we are able to get the vehicle driving
1. Count the ranking value rij of vehicle driving time and the length of each section and average
reliability in road network; running speed and average travel time of vehicles
2. Calculate the average travel time tij of the vehicle in different road sections. Non-dimensionalise tij
on each section when the road is congested; gets tij′ . As shown in Table 2.
3. Non-dimensionalise rij as well as tij, gets rij′ and
tij′ ;
4. Calculate the total weight value Sk ti′j + rij′; Table 1. Road vehicle reliability ranking.
5. Sk is expressed as the weight value in the net- rij′
Section B rij
work diagram, and the whole problem is trans-
formed into the problem of establishing the l12 0.885 2 0.125
shortest path in the network diagram; l13 0.894 1 0
6. Lingo programming solution. l14 0.887 2 0.125
l23 0.852 3 0.25
l34 0.85 3 0.25
4 VEHICLE ROUTING OPTIMISATION l25 0.845 4 0.375
IN THE EMERGENCY PERIOD OF l26 0.828 5 0.5
WENCHUAN EARTHQUAKE RESCUE l35 0.793 7 0.75
l36 0.778 8 0.875
In this paper the Wenchuan earthquake was cho- l45 0.818 6 0.625
sen as the research object, to analyse and solve l46 0.773 8 0.875
the problem of the disaster situation and emer- l56 0.768 9 1
gency rescue vehicle routing in a selected area of
599
Table 2. Road traffic conditions.
Section Sij
success of rescue operations. We should take into
l12 0.125 account the reliability of the emergency vehicles
l13 0.088 under the complex situation to avoid the occur-
l14 0.311 rence of secondary accidents. Research in this
l23 0.564 paper has the reference value for the relevant
l34 0.419 research in emergency logistics.
l25 0.830 Whether the vehicle path is reasonable or not
l26 1.063 directly affects the efficiency, cost and benefit
l35 1.561 of emergency logistics. Efficient solutions to the
l36 1.546 emergency logistics vehicle routing problem to
l45 1.625 reduce logistics costs and improve service stand-
l46 1.730 ards are of great significance. Natural disasters are
l56 1.120 inevitable, but through the corresponding study in
this paper, the loss caused by natural disasters can
be reduced, and in the meantime, help mankind to
4.3 Calculate the total weights Sk ti′j + rij′ better adapt to nature.
The total weights Sk ti′j + rij′ can be derived from
the results of the calculations in the above sections,
REFERENCES
as shown in Table 3.
The total weight value is marked in the emer- Alumur, S. and Kara, B.Y. (2007). A new model for the
gency road network to solve the shortest road hazardous waste location-routing problem. Comput-
network. As shown in Figure 1. Because Jiandi, ers & Operations Research. 34(5), 1406–1423.
Luoshui and Yinghua are hit the hardest, and the Mete, H.O. and Zabinsky, Z.B. (2010). Stochastic opti-
emergency rescue centre is placed in a suburb in misation of medical supply location and distribution
Yuanshi Town, the paper focuses on the shortest in disaster management. International Journal of Pro-
road from Yuanshi to these three towns. duction Economics. 76–84. Netherlands: Elsevier sci-
Using Lingo programming to solve the problem, ence bv.
output the optimal solution is A-B1-C2, which Murali, P., Ordóñez, F. and Dessouky, M.M. (2012).
Facility location under demand uncertainty: Response
is the shortest road between Yuanshi and Jiandi. to a large-scale bio-terror attack. Socio-Economic
Similarly, we can get the shortest road between Planning Sciences. 46(1), 78–87.
Yuanshi and Luoshui is A-B1-C1. Because only Nahleh, Y.A., Kumar, A. and Daver, F. (2013). Facility
by Luoshui can we get to Yinghua, so the shortest Location Problem in Emergency Logistic. Waset Org
road to Yinghua is the same as to Luoshui. 7(10), 1045–1050.
Thorleuchter, D., Schulze, J. and Poel, D.V.D. (2012).
Improved emergency management by a loosely cou-
5 SUMMARY AND PROSPECT pled logistic system. 5–8. Berlin, Heidelberg: Springer.
600
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Zhiyong He
College of Electrical Engineering, Nanjing Institute of Industry Technology, Nanjing, China
Jiangsu Wind Power Engineering Technology Center, Nanjing, China
ABSTRACT: The fault local route repair mechanism of AODVjr is after the link is broken in Zigbee
network, the lagging repair process causes the cache data packet loss and the data end-to-end delay. In this
paper, a Zigbee link availability prediction algorithm (APR-AODVjr) is proposed to predict the link avail-
ability of the AODVjr routing algorithm, which starts the route discovery process before the link breaks.
Simulation results show that the routing algorithm based on link availability prediction can effectively
reduce the network fault recovery response time, prolong the network lifetime and reduce the network
congestion and delay.
601
consider link break. The probability of data packet network will appear split phenomenon in advance.
loss is increased. As shown in Figure 1, the node 4 is in the middle
In this paper, we propose a Zigbee Link Avail- node of link {2, 4, 6} and {3, 4, 6}, the node energy
ability Prediction Routing Algorithm (APR- is exhausted and the link is interrupted. In AOD-
AODVjr) based on the node energy consumption Vjr local repair algorithm, the upstream node 3 of
threshold model and the remaining energy of the the faulty node restarts the route initiation process
next-hop node stored in the neighbor table of the and broadcasts the RREQ packets to perform the
routing node, which selects the energy-rich nodes route re-establishment process (Zhou Shao-qiong,
as the next-hop route, by calculating the energy et al., 2011). The new path {3, 5, 7} of the node 3
consumption of the entire link Cenergy value to to the destination node D is established. The AOD-
improve the local link repair time and reduce the Vjr routing algorithm restarts local repair only
loss of data packets. This paper is organized as fol- after node 4 energy is exhausted, which leads to the
lows: Section 2 analyzes AODVjr routing mecha- data packets lost in the network, having an impact
nism; Section 3 presents link availability prediction on network transmission efficiency and increasing
algorithm APR-AODVjr; Section 4 simulates and network latency.
analyzes the results; At last, Section 5 concludes
the paper.
3 LINK AVAILABILITY PREDICTION
ALGORITHM APR-AODVjr PROPOSED
2 AODVjr ROUTING MECHANISM
ANALYSIS The main idea of the APR-AODVjr link avail-
ability prediction algorithm proposed in this paper
AODVjr routing algorithm establishes the path is that when the node selects the next-hop route,
of the process as shown in Figure 1. The source the node can find out the remaining energy of
node S need send data packets to the destination the next-hop node stored in the neighbor table.
node D, S looks for their own routing table to find If the link energy consumption is lower than 2%
the path to the destination node firstly. If the node of the total link energy, the link between the node
routing table cannot find the destination node, and its upstream node is considered to be in dan-
then the source node S initiates the route discovery ger, and the upstream node initiates the rerouting
process to establish the route through the broad- discovery process.
cast RREQ packets. When the destination node
receives the RREQ broadcast message, it estab-
3.1 Energy consumption model
lishes the route in reverse direction {3, 4, 6}. AOD-
Vjr routing algorithm selects next-hop routing Ariticle (LI Gang, 2016) proposed a node energy
principle which node returns the RREP message consumption calculation model, the node sends
quickly, the routing algorithm does not consider and receives k bit data packet information. When
the node’s remaining energy, the link is interrupted the transmission distance is d, the energy required
because of the node energy is exhausted along with for data packet transmission is:
the network running time increasing. Especially
in high-level nodes in the network, data forwards Tt(k,d) ET elec (k) ET − amp m (k,d)
frequently and node energy loss is very fast, the ⎧ E k + E k × d 2
, d < d0
= ⎨ elec fs
(1)
E
⎩ elec × k E mp × k d 4
, d d0
602
Table 1. Node neighbor table format.
603
network and data end-to-end delay is increasing, REFERENCES
the APR-AODVjr routing algorithm proposed in
this paper calculates the energy of the link through AODV routing protocol with high energy and high signal
the energy consumption model, the routing dis- strength node priority [J]. Computer Engineering and
covery process is started in advance for the nodes Applications, 2014, 50 (17): 86–89.
to be death and the network load is balanced, the Bai Le-Qiang & Sun Jing-Jing. Improved routing algo-
rithm for ZigBee network tree based on neighbor table
number of active nodes in the network is increased [J]. Computer Engineering and Design, 2015, 36 (5):
and broken links is reduced. This avoids the loss of 1156–1160.
broken data packets and effectively shortening the Bai Le-Qiang & Zhang Shi-Hong. Optimized Broadcast-
data packet end-to-end time. ing Algorithm for ZigBee Network Node Selection [J].
Control Engineering, 2014, 21 (3): 403–408.
Baront P & Pillai P & Chook V W C. Wireless sensor
networks: A survey on the state of the art and the
5 SUMMARY 802.15.4 and ZigBee stand-stards [J]. Computer Com-
munications, 2007. 30(7): 1655–1695.
In Zigbee networks, the limited energy of a node Chakeres I D, Klein Berndt. AODVjr AODV Simplified
directly affects the performance and stability of [J]. Mobile Computing and Communication Review,
the network. In this paper, we propose a Zigbee 2002, 6 (3):100–101.
link availability prediction algorithm APR-AOD- LI Gang. Improved AODV protocol based on energy in
Vjr, by improving the traditional AODVjr in the Manet [J]. Journal Of Huaqiao University (Natural
route discovery process which does not consider Science), 2016, 37 (4): 503–506.
the remaining energy of the next hop, adding Ma Haichao. ZigBee network scalability and clustering
routing protocol research [D]. Xi’an: Xidian Univer-
neighbor table to store energy information for each sity, 2014.
node.The link energy consumption is calculated Ren Weil & Yeung D.Y. TCP performance evalua-
and the link availability is predicted by the total tion over AODV and DSDV in RW and SN mobil-
energy of the link. The route discovery process is ity models [J]. Journal of Zhejiang University, 2006,
started before the link breaks to reduce the loss 7(10):1683–1689.
of data packets. Simulation results show that the Ren Xiuli & Yu Haibin. Study on the Implementation of
routing algorithm based on link availability predic- ZigBee Wireless Communication Protocol [J]. Com-
tion effectively reduces the number of dead nodes puter Engineering and Applications, 2007, 43 (6):
in the network and prolongs the network lifetime. 143–145.
Xie Chuan. Study on AODVjr algorithm based on Zig-
Bee [J]. Computer Engineering, 2011, 37 (10): 87–89.
Zhang Fenghui & Zhou Huiling. A Routing Algorithm
ACKNOWLEDGMENTS for ZigBee Network Based on Dynamic Energy Con-
sumption Decisive Path: Proceedings of the 2009
This work is sponsored by Jiangsu Wind Power International Conference on Computational Intelli-
gence and Natural Computing, 2009 [C]. Washington,
Engineering Technology Center Open Fund Pro- IEEE Computer Society, 2009: 429–432.
ject (No: ZK16-03-13) and Nanjing Institute of Zhou Shao-qiong & Xu Yi & Jiang Li, et al. Application
Industrial Technology Research Fund Project (No: of ant colony optimization algorithm in Ad Hoc net-
ZK16-02-01). The author gratefully acknowledge work routing [J]. Journal of Computer Applications,
their supports. 2011, 31 (2): 332–334.
604
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Zhichao Ren, Qian Chen, Lipin Chen, Kaijiang Cao & Haiyan Wang
Research Institute of Economics and Technology of State Grid Sichuan Electric Power Company,
Chengdu, Sichuan, China
ABSTRACT: On the basis of fuzzy neural network load forecasting, the weights and thresholds of
fuzzy neural network and the number of neurons in hidden layer are optimized by ant colony algorithm.
A short-term load forecasting model of fuzzy neural network based on ant colony optimization is pro-
posed. Through case analysis, it shows that this algorithm can obtain high accuracy, and it is an effective
method for short-term load forecasting.
Keywords: Ant colony optimization algorithm; Fuzzy neural network; Short-term load forecasting;
Parameter optimization
605
composed of simple individuals show a very com- is modified by the addition of the new IE. It must
plex behavior. The ants are transmitted by means of be pointed out that there are some differences
the substance of the hormone, and ants are able to between the artificial ants and the real ants in the
guide their movement through the perception of the ACO algorithm, and the artificial ants are used as
substance. As a result, the more ants walk on a path, an optimal tool to operate, rather than the simula-
the higher the probability that an ant will choose tion of the actual ants in the natural world.
the path. The purpose of searching food is realized Thus, the main characteristics of the ACO algo-
through constant information exchange among the rithm are: positive feedback helps to quickly find
ants. Its mechanism is shown in Figure 1. a better solution; distributed computing can be
A is the nest, E stands for food sources, and there avoided in the iterative process of premature con-
are only two paths between A and E. The length of vergence; inspired makes the search process earlier
road ABDE and ABCDE are 6 and 8 respectively. found acceptable solution possible; heuristic con-
It’s supposed that each time unit there are 15 ants vergence makes it possible to find an acceptable
from A to B and there are 15 ants from E to D. The solution earlier in the search process.
amount of hormones (commonly known as Ele-
ment Information, IE) left behind after each ant
2.2 Fuzzy neural network
is set to L.
At the initial time of t0, because there is no pher- It is supposed that a fuzzy subset of the domain
omone on the three ways where ants can randomly X is A, and for ∀x ∈ X to specify a number
choose the path. From the point of view of statis- μA ( x ) ∈[ , ] corresponding to the x, it is called
tics, the three paths can be chosen with the same the degree of membership of the A on the x, map-
probability. After a time unit, the BCD is two times ping: X→[0, 1] is the membership function of A.
the length of the BD, therefore in the case that μA ( x ) reflects the degree of x to the fuzzy subset
individual sow is equivalent to IE, BD pheromone A, and it is more close to 1 which indicates that the
quantity is two times of BCD. As a result, in the T1 x is more dependent on the A. On the set of real
time, there will be 20 ants to select the path ABDE numbers, the distribution of membership func-
(EDBA), while there will be 10 ants to select the tions, such as triangle, rectangle, trapezoidal and
path ABCDE (EDCBA). With the passage of time, parabolic, can be used in the practical application,
there will be more and more probability that ants which can be selected according to the characteris-
choose the path ABDE (EDBA), and ultimately tics of the research object.
choose the path ABDE (EDBA), in order to find Fuzzy neural network gives the fuzzy input sig-
the shortest path from their nest to the food source. nal and fuzzy weight is for the conventional neural
ACO algorithm is a general purpose internal network (such as the forward feedback neural net-
heuristic algorithm, which can be used to solve work, Hopfield neural network, etc.), which usu-
large-scale combinatorial optimization problems. ally includes the following types: the fuzzy neural
In the ACO algorithm, a proxy agent is set up in network with real input signal and fuzzy weight; the
each set. The members of the agent are like mutual fuzzy neural network with fuzzy input signal and
cooperation artificial ants, which exchange infor- real weight; the fuzzy neural network with fuzzy
mation through the IE of the “search path” and input signal and fuzzy weight. Learning algorithm
finally realize the solution of the problem. When of the fuzzy neural network is usually the same as the
the artificial ants move, the solution of the prob- learning algorithm of conventional neural network
lem is set up, and the description of the problem or it is its promotion algorithm, mainly including:
BP learning algorithm; fuzzy BP learning algorithm;
the learning algorithm of alpha set based on BP; the
random search algorithm; genetic algorithm. Based
on the analysis of actual data, this paper adopts the
third kind of fuzzy neural network and BP algo-
rithm, which establishes the forecasting model with
the fuzzy input data and the fuzzy weight, in order
to get the accurate and stable prediction results.
3.1 Modeling
The number of parameters you need to train is
Figure 1. Schematic diagram of ants path searching. n, denoted as p1, p2, …, pn. For any of these
606
parameters which are represented by pi (1≤i≤N), and ments of the mth ant in this cycle left on the jth
it is set to L random non-zero so as to form a set of elements of the sey Ipi. Q is a constant which is
Ipi. S ants set out to look for food from the ant nest used to adjust the pheromone adjustment speed.
according to each element in the set of pheromone The maximum output error of each training sam-
path state and the following formula selection rules: ple is defined as the weight of the neural network,
which is used as the weight of the neural network,
τ j ( I pi ) which can be defined as the M. em indicates the
P( k
( I pi )) = (1)
j N maximum output error of each training sample
∑τj =1
j ( I pi ) when the elements that ant m chooses is taken as
the weight of the neural network, whose formula
One element is selected randomly and inde- is as follows:
pendently from each of the set Ipi. When the ant h
completes the selection of the element in all the e Ol − Oq (5)
l =1
collection, it reaches the food source, and there-
after, the pheromone of each element in the set is
adjusted according to the following formula: where Ol is the actual output of FNN and Oq is the
desired output.
τ j ( I pi )(t l ρττ j I pi )(t ) Δτ j ( I pi )
ρ (2) This process is repeated until the optimal solu-
tion is found. Optimal solution can be found when
m
the evolutionary trend is not obvious or the maxi-
Δτ j ( pi ) ∑ Δτ
m =1
m
j ( I pi ) (3)
mum number of iterations is reached.
Δτ mj ( I pi ) = { Q / em
0
(4) 3.2 Case study
In order to verify the feasibility and effectiveness of
where 0 ρ 1 expresses the persistence of phero- the fuzzy neural network model based on Ant Col-
mone, Δτ mj ( I pi ) expresses that the information ele- ony Optimization in this paper, the short-term load
607
4 CONCLUSION
forecasting of a substation in Sichuan province was The authors acknowledge the support of the “Key
calculated and analyzed. Load, weather data, and Technology and System Research of Company
holiday information of June to May 2016 are used Project Plan Audit Analysis” project.
to form a forecast model so that the value of 24
points in June 30th can be predicted. For the fuzzy
neural network, a supervised learning method is REFERENCES
adopted. Seven input samples correspond to one
output sample, a total of 24 groups, the number of Chen, Ke. 2015. Short term load forecasting of power
system based on Fuzzy Neural Network. Southeast
neurons in the hidden layer is determined by the
University.
ant colony optimization algorithm, the convergence Cui, Yanyan & Cheng, Yawei. 2014. Short term load fore-
factor is 0.02, the hidden layer activation function casting of power system based on fuzzy control for
and the output layer as a nonlinear function of Sig- RBF neural network. Journal of Jingchu University
moid. The number of neurons in the hidden layer of Technology, 02:32–35.
is determined by the ant colony optimization algo- Le, Huan. 2009. Study on the vacant area inference based
rithm. The error convergence factor is 0.02, and the method of spatial load forecasting for city distribution
implicit and output layer is the nonlinear Sigmoid network planning. Chongqing University.
function. The number of connection weights of the Li, Long. 2015. Load model prediction based on artifi-
cial neural network. Transactions of China Electro-
network is 58. Ant colony algorithm parameters
technical Society, 08:225–230.
are set as follows, S = 30, Q = 30, fuzzy neural net- Wang, Fangfang. 2011. The establishment of the load
work weights and thresholds are the random num- forecasting model and the load forecasting based on
ber between [−1, 1] and L takes 30. the regression analysis. China High-Tech Enterprises,
The predicted results are shown in Table 1 and 34:56–58.
Figure 2. Yin, Xin. 2011. Research on swarm intelligence algo-
It can be seen from Table 1 that the average error rithms and power load forecasting. Hunan University.
of the proposed ACO-FNN prediction model is Zhang, Chao. 2015. Research on the improved method
0.46% and the maximum error is −1.72%. The aver- of ultra-short term load forecasting based on time
series method. Liaoning University of Technology.
age relative error of the traditional BP algorithm
Zhang, Jian. 2014. A study of ant colony optimization
which uses the gradient descent training weight is for community detection in complex networks. Xidian
1.51%, and the maximum error is −2.68%. There- University.
fore, the proposed method can get higher accuracy
of load forecasting.
608
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: The emulsion matrix viscosity determines the quality of an emulsion explosive. However,
in the production process of the emulsion explosive, the emulsion matrix viscosity cannot be measured
directly. In order to solve this problem, a soft measuring method based on a BP neural network is pro-
posed in this paper. However, the simple BP neural network cannot accurately measure the viscosity
of the emulsion matrix. So, a Genetic Algorithm (GA) is used to optimise the network and then train
the network prediction model to get the optimal solution. The predicted results with the predictions of the
conventional BP neural network prediction model are compared. The BP neural network optimised by the
GA can obtain more accurate results in a shorter period of time.
609
more dispersed, resulting in the matrix viscosity the 3σ guidelines. This paper selects 100 sets of
increasing. In a certain range, under the higher processed data to model, each data set contain
emulsion speed, a greater viscosity of the emul- five auxiliary variables and a sample test value of
sion matrix is achieved. emulsion matrix viscosity. Taking into account the
4. Emulsifying time: Sufficient emulsifying time training of BP neural network may occur in the
to ensure the material sufficiently emulsified. case of over fitting, the sample data is cut into two
It obviously affects the emulsion matrix viscos- parts, respectively, to train and test the network. In
ity. The longer the emulsifying time, the more this paper, 90% of the data was used for training,
number of times the material being cut, the and 10% for testing the network.
greater emulsion matrix viscosity is made. Before training the neural network, the data
Through the above analysis, the water phase should be normalised. The effect of normalisation
flow, the oil phase flow, emulsifier speed, emulsi- is to sum up the statistical distribution of the sam-
fying temperature and emulsifying time were used ple. In the normalisation process all the input and
as auxiliary variables and a soft sensor model was output data are normalised to the range of [−1, 1].
used to measure emulsion matrix viscosity. MATLAB comes with a normalisation function
premnmx:
[ P,min
, i p,max p,T ,min t,max
, a t] ( P, );
3 BP NEURAL NETWORK
610
where P is the input variable, T is the target and mutation in the genetic process to obtain the
variable. optimal individual (Zhang yin et al., 2013). Its
The data after normalisation is used to train the structure is shown in Figure 3.
network, and greatly improves the accuracy of the First of all, the initial values of the network
model. parameters are generated randomly. The genetic
algorithm is used to calculate the initial value of
these network parameters. After several genera-
3.3 The neural network training of emulsion
tions of evolution to find the most suitable net-
matrix viscosity
work parameters of the BP network. Finally the
In this example, the BP network is trained using the network parameters are used to train the BP net-
momentum gradient method, using the traingdx work to achieve the required precision output.
function in the MATLAB neural network toolbox,
the hidden layer transfer function using the tan-
4.2 The realisation of the GA-BP neural network
sig function, and the output layer using the linear
transfer function purelin. The target error is set as The input layer nodes number is 5; the output layer
0.01; and the number of maximum iterations is nodes number is 1; the hidden layer nodes num-
500. ber is 5. The genetic algorithm optimisation neural
The training error variation is shown in network weights threshold are as shown in Table 1.
Figure 2. After 431 iterations, the network training The weights and thresholds are used by 10-bit
error reaches the desired level. binary number. The binary code lengths of the indi-
vidual are 360. Among them, the former 250 are
connected to the input layer and the hidden layer
4 GA-BP SOFT MEASUREMENT MODEL weights coding, 251 to 300 is the threshold of the
hidden layer coding, 301 to 350 is a hidden layer and
GA is a stochastic global search and optimisation output layer connection weights coding, 351 to 360
method that simulates the evolution mechanism of are the output layer threshold coding (Shi Feng et al.,
natural biological evolution. Its essence is an effi- 2013). The population size of the genetic algorithm
cient, parallel, global search optimisation method. is set to 30, and the genetic algebra is set to 100. The
fitness function is shown in the Equation (1).
4.1 Structure of GA-BP model
1
A genetic algorithm is a random search algorithm fitness = (1)
SSE
for global optimisation. Genetic operators simu-
late the phenomenon of reproduction, crossover where SSE (sum-squared errors) is the square of
the error, and its expression is as follows:
SSE = ∑ (Yd Y )
2
(2)
Connection Connection
weights weights of
of input Hidden hidden layer Output
layer and layer and output layer
hidden layer threshold layer threshold Total
25 5 5 1 36
Figure 3. GA-BP network model structure.
611
Figure 4. Sum-squared error evolution curves. Figure 6. GA-BP training error performance.
5 CONCLUSION
The initial weight and threshold which has Qiyuan Ning, Zude Liu. (2012). Prediction model of coal
been optimised by GA are applied to the BP neu- and gas outburst intensity based on BP neural net-
ral network training. The training error perfor- work. Coal Mining.
Shi Feng, Wang Hui, Yu Lei. (2013). MATLAB intelli-
mance variation diagram is obtained as shown in
gent algorithm. Beijing: Beihang University Press.
Figure 6. User’s Guide: Genetic algorithm and direct search tool-
From Figure 6, we can see that the network box for use with MATLAB. The Math Works, 49–56.
trains 178 steps to reach the desired level of error. Xvguang Wang. (2008). Emulsion matrix (Version 2).
And the network training stops. Beijing: Metallurgical Industry Press.
The convergence rate of the GA-BP neural net- Yang Yang, Yuesheng Wang. (2010). Study on control
work is faster than the simple BP neural network. optimization strategy of powdery emulsion explosive
Reducing the number of training steps is beneficial production process. Hang Zhou: Hangzhou Dianzi
to improve the generalisation ability of the net- University.
Yingjie Lei. (2005). MATLAB genetic algorithm toolbox
work. Over-training may achieve a higher match-
and its application. Xi’an: Xi’an Electronic and Sci-
ing effect on the training sample set, but for a new ence University Press.
input sample and the target may have a greater dif- Zhang Yin, Zhan Ran. (2013). Soft sensing method for
ference in output. A BP neural network optimised algae propagation condition based on genetic algo-
by GA can obtain more prediction accuracy in a rithm optimization neural network. Shanghai: Shang-
shorter period of time. hai Maritime University.
612
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: The optimal control design of Unmanned Aerial Vehicles (UAV) is an important technol-
ogy to ensure flight stability. UAV has sharp attitude variation and the airflow, causing flight stability is
not good. The dynamic feedback search on flight longitudinal plane can improve the stability. A stability
control algorithm for UAV is proposed based on dynamic feedback search. Firstly, a longitudinal motion
mathematical model is constructed of UAV. Then, the control objective function and control constraint
parameters are analysed, and an adaptive inversion pitch angle tracking method is used for integral sta-
bility functional analysis. The angular velocity is taken as the virtual control input. Adaptive dynamic
feedback error tracking and search is realized in greatly attitude change. A PID adaptive control law is
designed, to eliminate the effect of swinging inertia force and moment on the stability of the system. The
control algorithm optimisation design is created. Finally, the simulation test is performed. The simulation
results show that the stability of control is optimised, and that pose tracking and error compensation are
obtained effectively. It can improve the stability during the flight, and the attitude angle tracking error
can converge to zero rapidly.
Keywords: dynamic feedback; search; Unmanned Aerial Vehicle (UAV); control; self adaptation
613
design the controller, the angular velocity is used
mV = − mg sin θ − cx qSM + P
as the virtual control input, and the PID control mV θ = − mg cos θ + cαy qSM α + P (α + δ ϕ ) + mR lRδϕ
adaptive law is designed to eliminate the influence J ϕ = −cα qS ( x − x )α − qS m l 2ϕ / V
of swing inertia force and moment on the stability z1 y1 M g T M dz k
of the system. The simulation test is carried out, − P ( xR − xT )δ ϕ − mRW x1lRδ ϕ − mR lRδϕ ( xR − xT ) − J Rδϕ
and the effective conclusion is obtained. (1)
614
are analysed, and then the optimal control algo-
⎧ϕa b ϕ a b2ϕ a δ + ρ1
3 ϕ
rithm is designed. ⎪
⎨ψ a b ψ a b2ψ a 3δ ψ + ρ2 (8)
⎪γ
⎩ 3δ γ + ρ3
2.2 Mathematical model of longitudinal motion
where, ρ1 Δb1ϕ a − Δb2ϕ a δ + fd1 ρ2 = Δb1ψ a
3 ϕ
Ballistic unmanned aircraft is basically flying in the − Δbb2ψ a − Δb3δψ + fdd2 ρ3 = −Δdd3δ γ + fd3 are uncer-
plane of fire. The airframe rolling angle and angu-
tain items. According to the above-mentioned
lar velocity are smaller. There is larger coupling
model, the mathematical model of the aircraft’s
between the pitch and yaw motion.The attitude
longitudinal motion is built, and the stability con-
motion equation of UAV can be decomposed into
trol design of the aircraft is carried out.
longitudinal motion, lateral motion and roll motion
of three independent equations. Unmanned air-
craft in pitch plane motion is called longitudinal 3 IMPROVED DESIGN AND
motion; describing the longitudinal motion varia- IMPLEMENTATION OF CONTROL
bles are ϕ ϕ α θ δ ϕ , etc., which focus on the lon- ALGORITHM
gitudinal motion in the plane of the flight vehicle
stability control, under small perturbations. The 3.1 PID neural network controller
flight pitch motion equation is constructed in the
longitudinal motion. The motion equations of an On the basis of construction of longitudinal
unmanned aircraft for three separate channels are motion control mathematical model and param-
described as: eter constraints analysis, the control algorithm is
Pitch: designed. This paper proposes a dynamic feed-
back unmanned vehicle stability control algorithm
based on a PID neural network. A PID neural net-
⎧mV θ cos(σ ) = Fy work is used as the controller prototype. The basic
⎪
⎨J z z1 ( J y J x )ω x y1 M z1 (4) form of PID structure is shown in Figure 1.
⎪ϕ θ + α The control model of UAV is a multi-variable
⎩
controlled model of an m input n output, using an
Yaw: m PID output neuron sub-network cross parallel
constitute as a new neural network control model.
The input layer control model has 2n same input
⎧− mV σ = Fz
⎪ neurons. The neurons inputs are:
⎨J y y1 + ( J x − J z )ω z = M y1 (5)
{
x1
⎪⎩φ = σ + β nets k ) = rs ( k )
(9)
nets k ) = ys k )
Roll:
The state of neurons is:
J x x1 (Jz J y )ω y M x1 (6)
x z1
usi ( k ) = netsi ( k ) (10)
On the basis of this, perturbation linearisation The output of input layer neurons is:
processing is perforemed, and the three channel
model of unmanned aerial vehicle can be expressed ⎧1, usi ( k ) > 1
as: ⎪
xsi ( k ) = ⎨usi ( k ), usi ( k ) ≤ 1 (11)
⎪⎩−1, usi ( k ) < −1
⎧ϕa (b b )ϕ a − (b
( b2 b2 )ϕ a δ ϕ + fdd1
⎪ 3 3
⎨ψ a = −( b1 b1 )ψ a ( b b )ψ a − (b
( b3 b3 )δ ψ + fdd2
⎪⎩γ 3 3
δ γ + fdd3 (7)
615
Where, rs(k) is a given value of the longitudinal By using PID neural network control method,
motion and the lateral movement, ys(k) is system the adaptive dynamic feedback error tracking and
controlled quantity, s is pitch channel controlled searching are taken.
volume serial number (s = 1,2,…n); i is input layer
number of UAV body posture dynamic (i = 1,2). 3.2 Implementation of adaptive control law
The input value of the hidden layer of the neural for PID control
network is:
The integral stability of adaptive backstepping
2 tracking of pitch angle stability is used for func-
netsj ( k ) = ∑ wsiji xsi ( k ) (12) tional analysis, angular velocity is taken as the vir-
i =1 tual control input, network weights are adjusted
online, and learning step size is set as η. After n
The state of the PID neural network is propor- step training and learning, the iterative equation
tional to: of the pitch angle tracking of adaptive inversion
integral control is:
us′ k ) = netss1′ ( k ) (13)
∂E
W (n ) = W ( n) − η + ∂ΔW ( n ) (21)
The state of the PID neural network integral ele- ∂W
ment is:
Choosing appropriate step size and initial value,
us′ k ) = us′2 ( k − 1) + nets′2 ( k ) (14) the control system with error back propagation
constraint is obtained. The weight of the hidden
The state of the PID neural network is: layer to the output layer is changed into:
616
disturbance yaw motion can be used to adjust the 1
weights of the adaptive gradient algorithm for 0 < ηsiji < (29)
training. To get the weight controller hidden layer
ε si2ij
to output layer value adjustment algorithm:
where,
∂J
w′sjh w′′( n ) − ηs′jh
′j ( n + ) = w (25)
∂wsjh
′j n m l
∑ ∑ ∑δ
p =1 h =1 k =1
sjjh (k
k x si ( k )
Variable structure neural network control of ε siij = − n l
(30)
learning step size ηsjh must be satisfied: 2 l ∑ ∑ [ rp ( k y p ( k )]2
p =1 k =1
1
0 < ηsjhj < 2 (26)
ε sjjh Through the above processing, the PID con-
trol adaptive law is designed, the influence of the
Where, swing inertia force and torque on the stability of
the system is eliminated, and the control algorithm
n l is optimized.
∑ ∑ δ ′ ( k )x ′ ( k )
p =1 k =1
hp sj
ε sjjh = − n l
(27)
4 SIMULATION ANALYSIS
2 l ∑ ∑ [ rp ( k y p ( k )] 2
p =1 k =1
In order to test the performance of the control
algorithm in improving the stability control of an
In the rolling motion, according to the Lyapu-
unmanned aerial vehicle, the simulation experi-
nov function, the parameter self-tuning control
ment is carried out. The simulation platform is
method is used to train the appropriate weight,
based on MATLAB Simulink, which is shown in
and the weight of the input layer to the hidden
Figure 2.
layer is adjusted as:
The simulation platform consists of seven mod-
ules. 1) unmanned aircraft weight and centre of
∂J
wsiji ( n ( n0 ) − ηsiji
) = wsijj (n (28) gravity and moment of inertia weight parameter
∂wsiji by inertia moment input module; 2) aerodynamic
parameter module to establish the aerodynamic
At this point, the control system of UAV derivatives database; 3) the equation of six degrees
includes PID Neural Network Controller (PID- of freedom module is used to solve the equation
NNC) and PID neural network identifier, and ηsij of kinematics and dynamics; 4) control commands
of the weight of PID neural network identifier through the navigation control module based on
must be satisfied: the comparison of guidance the law and the actual
Figure 2. Unmanned aerial vehicle control simulation platform based on MATLAB Simulink.
617
trajectory of energy management is calculated;
5) flight height, distance closer to the earth and
the latitude and longitude information through the
geophysical model calculation module; 6) calcula-
tion of different height under atmospheric density,
pressure, temperature and speed through the gas
module; 7) the simulation system also includes the
interference of wind.
The pitch channel is taken as an example. The
initial pitch angle ϕ is assumed 0°, the value of the
angle tracking is 2.8° step signal; the flight height,
distance closer to the earth and the latitude and
longitude information are calculated. The pitch
angle simulation results with different control
methods is shown in Figure 3.
It can be seen from the diagram, using this
method for UAV control, pitch angle can fast track Figure 5. Rudder angle δϕ with traditional method.
the given reference value, and pitch angle tracking
error converges to zero. The control performance is
superior to traditional methods. Further, compari-
618
is shorter, it has smaller oscillation, and the dis- QNCX218) of 2015 Key Platforms and Research
tortion can be effectively suppressed, it has small Projects of Department of Education of Guang-
overshoot, with fast dynamic feedback searching dong Province and 2016 Undergraduate Scientific
of the flight parameters, and the fast and stable and Technological Innovation Project Fund of
control of UAV is achieved. Guangdong Province (pdjh2016b0940).
5 CONCLUSION REFERENCES
In order to improve the stability of the unmanned Dong, B., Liu, K. & Li, Y. (2016). Decentralized integral
aerial vehicle, a stability control algorithm for sliding mode control for time varying constrained
UAV is proposed based on dynamic feedback modular and reconfigurable robot based on harmonic
search. Firstly, a longitudinal motion mathemati- drive transmission. Control and Decision, 31(03),
441–447.
cal model is constructed of UAV. The control Ge, L. (2015). Visual simulation of UUV attack model
objective function and control constraint param- based on whole trajectory control analysis. Ship Elec-
eters are analysed, adaptive inversion pitch angle tronic Engineering, 35(3), 137–141.
tracking method is used for integral stability func- Li, T. & Zhang, J. (2010) Consensus conditions of multi-
tional analysis, the angular velocity is taken as the agent systems with time-varying topologies and sto-
virtual control input, adaptive dynamic feedback chastic communication noises. IEEE Transactions on
error tracking and search is realised in greater atti- Automatic Control, 55(9), 2043–2057.
tude change, PID adaptive control law is designed, Lu, X. & Chen P. (2015). Traffic prediction algorithm
eliminating the effect of swinging inertia force in buffer based on recurrence quantification union
entropy feature reconstruction. Computer Science,
and moment on the stability of the system, and the 42(4), 68–71.
control algorithm optimisation design is realised. Mahmoud, E. E. (2016). Complex complete synchroniza-
Finally, the simulation test is performed The simu- tion of two nonidentical hyperchaotic complex non-
lation results show that the stability of control is linear systems. Mathematical Methods in the Applied
optimised, and pose tracking and error compensa- Sciences, 37(3), 321–328.
tion are obtained effectively. It can improve the sta- Ming, P. & Liu, J. (2016). Consensus stability analysis of
bility during the flight, the attitude angle tracking stochastic multi-agent systems. Control and Decision,
error can converge to zero rapidly, and it has good 31(03), 385–393.
control performance and control quality. Palomares, I., Martinez, L. & Herrera, F. (2014). A con-
sensus model to detect and manage non-cooperative
behaviors in large scale group decision making. IEEE
Transactions on Fuzzy Systems, 22(3), 516–530.
ACKNOWLEDGMENTS Zhao, S., Guo, H. & Liu, Y. (2015). Fault tolerant control
for linear time-delay system based on trajectory track-
This project is supported by Foundation for Dis- ing. Information and Control, 44(4), 469–473.
tinguished Young Talents (Natural Science, 2015K
619
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: Using the method of mathematical modelling, this study takes authentic public securities
data as the basis to test the MA expert system and MACD expert system. By taking annual net profit
margin, rate of return and winning rate as the management goal, the two directional indexes are calculated
and analysed, thus obtaining the MA expert system and MACD expert system. Compared with the win-
ning rate of one-time buy-in of all funds, step-by-step buy-in with 30% funds can merely increase 1% and
6.31% respectively. However, the annual rate of return and net profit margin drop significantly to 26.36%
and 50.93%, and the number of annual transactions is reduced by 762.4 and 758.4 times. According to the
market implication of this calculation result, the method of funds management is meaningless for MA
expert system and MACD expert system.
622
Table 1. (Continued) Table 2. The second test result of MA expert system.
623
Table 3. (Continued)
624
Table 4. The second test result of MACD expert
system.
625
3 CONCLUSION reduction of 758.4 times in the number of annual
transactions (see Figures 7 to 10). According to
By taking the winning rate, annual rate of return the market implication of this calculation result,
and net profit rate, which most concern inves- step-by-step buy-in is also meaningless for the
tors as a management goal, this paper attempts MACD system.
to calculate and analyse the practicability of the
MA expert system and the MACD expert system
with a full sample size in the premise of funds REFERENCES
management. Regarding the MA expert system,
compared with the winning rate of one-time Cao Yubo. (2010). Application of MACD index in secu-
buy-in with all funds, that of step-by-step buy-in rities investment, Manager’ Journal (in Chinese), (4),
with 30% funds can merely increase 1%, but the 166–167.
annual rate of return and net profit margin will http://en.wikipedia.org/wiki/Moving_average
http://forex-indicators.net/macd
drop sharply to 26.36% with a reduction of 762.4 http://wiki.mbalib.com/wiki/%E5%B9%B3%E6%BB%9
times in the number of annual transactions (see 1%E5%BC%82%E5%90%8C%E7%A7%BB%E5%8
Figures 3 to 6). According to the market implica- A%A8%E5%B9%B3%E5%9D%87%E7%BA%BF
tion of this calculation result, step-by-step buy-in Liu, Y. Empirical study on senior managers and per-
is meaningless for the MA system. Regarding the formances in companies of high-tech based on SPSS
MACD expert system, compared with the win- software regression analysis. Journal of Software, 7(7),
ning rate of one-time buy-in with all funds, that 1569–1576.
of step-by-step buy-in with 30% funds can merely Wang, Y. (1998). Application of moving average in the
increase 6.31%, but its annual rate of return will stock market, Zhe Jiang Statistics (in Chinese), (2),
27–28.
see a significant decline to 50.93% with a sharp
decrease in net profit margin of 50.95% and a
626
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: Using mathematical modelling, this study takes authentic public securities data as the
basis to test the RSI expert system and the W%R expert system. By taking the annual net profit margin,
rate of return and winning rate as the management goal, the two reverse directional indexes are calculated
and analysed, thus obtaining the RSI expert system and the W%R expert system. Compared with the
winning rate of one-time purchase of all funds, that resulting from step-by-step purchase at 30% funds
can merely increase 9.29% and 6.31% respectively. However, the annual rate of return and net profit
margin drop significantly to 41.85% and 50.93%, and the number of annual transactions reduce by 84
and 758.4 times. According to the market implication of this calculation result, the method of funds
management is meaningless for the RSI and W%R expert systems.
627
LH 60 100 80
LC: = REF(CLOSE,1);
RSI:SMA(MAX(CLOSE-LC,0),N1,1)/
SMA(ABS(CLOSE-LC),N1,1)*100,
colorwhite;
ENTERLONG:CROSS(RSI,LL);
EXITLONG:CROSS(LH,RSI)
628
Table 1. The first test result of RSI expert system.
(Continued)
629
Table 2. (Continued) Table 3. (Continued)
630
Table 4. (Continued)
631
3 CONCLUSION in net profit margin of 50.95% and a reduction of
758.4 times in the number of annual transactions
By taking the winning rate, annual rate of return (see Figures 7–10). According to the market impli-
and net profit rate, which most concern investors cation of this calculation result, step-by-step buy-
as a management goal (Huang, 2013), this paper in is also meaningless for the W%R system.
attempts to calculate and analyse the practicabil-
ity of the RSI expert system and W%R expert
system with a full sample size in the premise of REFERENCES
funds management. Regarding the RSI expert
system, compared with the winning rate of one- http://en.wikipedia.org/wiki/Relative_strength_index
time buy-in with all funds, that of step-by-step http://en.wikipedia.org/wiki/Williams_%25R
buy-in with 30% funds can merely increase 9.29%, Huang, H-P. & Wang, P. (2013). Discussions on securi-
but the annual rate of return and net profit margin ties software expert system MA and RSI. Advanced
Materials Research, 798–799, 757–760.
will drop sharply to 41.85% with a reduction of 84 Li Yong-chun, & Cheng, H. (2013). Study on effective-
times in the number of annual transactions (see ness of William overbought/oversold in technical
Figures 3–6). According to the market implica- analysis. Commercial Times, 7, 70–71.
tion of this calculation result, step-by-step buy-in Wang, P. (2011). Empirical analysis of RSI transaction
is meaningless for the RSI system. Regarding the system based on historical data. Securities & Futures
W%R expert system, compared with the winning of China, 9.
rate of one-time buy-in with all funds, that of step- Wang, P. (2012). RSI investment decision-making based
by-step buy-in with 30% funds can merely increase on consolidation market. Journal of Quantitative Eco-
6.31%, but its annual rate of return will see a sig- nomics, 1.
nificant decline to 50.93% with a sharp decrease
632
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: With the development of science and technology, using ships as the main transportation
for the sea, route planning and weather routing become increasingly important. Ship weather routing
provides the optimal routing for the ship based on predicted weather information, the state of the sea,
and the ship’s condition. This research uses wave data to achieve weather routing based on a modified
genetic algorithm. Instead of using roulette wheel selection, the genetic algorithm uses a modified selec-
tion operator to achieve the goal of converging quickly and finding a better route. At the end, simulations
are made to illustrate the result that the meteorological navigation time obtained by using a modified
genetic algorithm is less than that using a traditional genetic algorithm.
633
3.1 Calculation of weight
The sea areas studied are divided into 1*1 degrees
latitude-longitude line and 2,806 points. The point-
to-point connection forms the route of the ship’s
voyage. The ship has eight sailing directions at
each point, which are the north angle of 0 degrees,
45 degrees, 90 degrees, 135 degrees, 180 degrees,
225 degrees, 270 degrees and 315 degrees.
The weights to be calculated are the time of the
point-to-point voyage (Panigrahi & Misra, 2010).
The weights are expressed as:
T = L/V. (1)
V V0 − ⎡⎣α 1 + α 2 * cos ( − )⎤⎦ * H (2) Figure 1. The flow chart of the genetic algorithm.
where the angle ‘α’ gives the ship’s course and ‘β’
is the wave direction. The V0 is the ship’s sailing right, creating a Cartesian coordinate system with
speed in still water and H is the wave height. The (0°N, 120°E) as the origin of the coordinate. Then,
ship parameters used in this paper are shown in the numbering each point by the formula as follows:
following table.
The α1 and α2 are constants and for the present N y + 46 * x (3)
ship type α1 and α2 are 0.30 and 0.15 respectively.
Using the formula (2), the speed of each point Here x is the value of the abscissa, y is the ordi-
in 8 directions according to each point of the wave nate and N is the real number that will be used.
height and wave direction can be calculated. Since In this study setting (20°N, 125°E) is the starting
the distance between each point and the adjacent point and (45°N, 148°E) is the end point. From the
eight points is constant, then the weight can be cal- starting point the ship has eight sailing directions
culated by formula (1). heading for the next point until it reaches the speci-
fied end of the voyage. By this means initialising
the chromosomes with a string of real strings.
3.2 Modified genetic algorithm
The flow chart of the genetic algorithm is shown 3.2.2 Fitness evaluation
below (Holland, J. H., 1975): The selection of the individual fitness func-
tion directly affects the convergence speed of the
3.2.1 Initialise the chromosome genetic algorithm. The fitness function is calcu-
In this study, 300 chromosomes are used for genetic lated as follows:
manipulation to find the optimal path and using
the real number coding to initialise the chromo- Fitness 1/ sum. (4)
somes. Firstly, 2,806 points are numbered in the
study area from bottom to top and from left to Sum is the sum of the weights of adjacent real
numbers in each chromosome.
Table 1. Ship parameters.
3.2.3 Modified selection operator
Type Tanker In the traditional genetic algorithm, most of the
selection operators are roulette selection method.
Loa 120 (m)
Although the use of roulette selection is simple
Dwt 1200 (ton)
and practical, it has some problems that should be
Speed 18 (knots)
solved. First of all, at the beginning of the genetic
634
algorithm, there may be a high degree of fitness algorithm for weather navigation. Setting (20°N,
of the individual, and then the probability that 125°E) as the starting point, and (45°N, 148°E)
this individual is selected will be very large. This as the end point. Drawing two optimal paths of
method will choose to copy a considerable number weather routing. The simulations are presented in
of individuals, which will result in the loss of diver- the following:
sity and hardly searching for a global optimal solu- The optimal route No. 1 is obtained by genetic
tion. At almost the end of the genetic algorithm algorithm with roulette selection operator and the
phase, the fitness of each individual is very similar, optimal route No. 2 is obtained by genetic algo-
causing the roulette selection to be useless. rithm with modified selection operator. Compar-
In this paper, the author proposes a modified ing Figure 3 with Figure 2, the path obtained by
selection as follows: firstly, all the individuals are genetic algorithm with modified selection operator
sorted by the bubble sorting method, and the indi- has fewer inflection points and more smooth ones.
viduals whose fitness ranked 1/6 after can then be Comparing Table 3 with Table 2, the modified
eliminated. After that, make two copies of the indi- genetic algorithm converges rapidly and evolutes
viduals whose fitness ranked before 1/6 and select a better path. It proves that using the modified
these individuals to enter the next generation. The
remaining 2/3 individuals are all inherited to the
next generation. When using this modified selec-
tion operator for genetic manipulation, there are
several advantages as follows: (1) The individuals
with very low fitness are directly eliminated, so
that these individuals do not have the opportu-
nity to enter the next generation and to improve
convergence speed. (2) The individuals with better
adaptability in the population can be increased
rapidly, which makes the algorithm more efficient
and practical. (3) Overcoming the shortcomings of
the local convergence of the algorithm, and achiev-
ing global search to find the optimal solution.
Figure 2. The optimal route No. 1.
3.2.4 Crossover operator
Selecting two parent individuals randomly and,
when the crossover probability satisfies the condi-
tion, checking whether there are intersecting points
between the two parental individuals. If there are
intersecting points between the two parental indi-
viduals, the path exchanges after the intersection
of two parent individual intersections.
635
Table 3. The total navigation time proposed by the author to achieve the goal of
by modified operator. weather routing based on modified genetic algo-
rithm and finding an optimal path. By using the
Total modified genetic algorithm, finding the optimal
Generation time (h)
route was quicker and more precise.
1 62.9771
10 61.0123
40 57.2522 REFERENCES
80 57.2522
120 57.2522 Chen, X. F. & Jiang, L, (2003). Research on Holland
150 57.2522 Schemata Theorem [J] Proceeding of the Third Inter-
national DCDIS Conference 247–251.
Gray, G.J. (1996). Nonlinear Model Structure Identifica-
tion Using Genetic Programming, 33–42.
Haltiner, G.J. &.Hamilton, H.D. (1962). Minimal-time
selection operator for genetic algorithm to find the ship routing. Journal of Applied Meteorology, 1(1).
optimal route is better than using the traditional Holland, J. H. (1975a). Genetic algorithms and the opti-
genetic algorithm. mal allocations of trials. SIAM Journal of Computing,
2(2), 88–105.
Holland, J. H. (1975b). Adaptation in Natural and Arti-
5 CONCLUSION ficial Systerm [M]. Ann Arbor: The University of
Michigan Press, 65–79.
Now days ship as the main shipping tool at sea, Michalewicz, Z. A. (1992). Modified genetic algorithm
for optimal control problems [J]. Computatiom Math
with the scientific progress, ship’s weather routing
Application, 23(12), 83–94.
becomes more and more important. Because the Panigrahi, J.K. & Misra, S.K. (2010). Application of
genetic algorithm has the advantages of strong oceansat-1 MSMR analysed winds to marine naviga-
robustness and good flexibility, using the genetic tion. International Journal of Remote Sensing, 31(10),
algorithm to achieve the goal of weather routing 2623–2627.
is available. This study used a modified selection
636
Technologies in electrical and electronic
control and automation
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Panpan Zhang, Peng Wang, Huaqun Meng, Siyuan Zhao & Fan Liu
Sichuan Institute of Solid-State Circuits, CETC, Chongqing, China
639
Figure 1. Structure of the LDO regulator in this paper.
Adc F ( S / Z1 )(1 + S / Z2 )
L( s ) =
⎛ S ⎞⎛ S ⎞ ⎡⎛ ⎛ 1 1 ⎞ S2 ⎞ ⎤
⎜⎝1 + P ⎟⎠ ⎜⎝1 + P ⎟⎠ ⎢⎜⎝1 + S ⎝ P + P ⎟⎠ + P P ⎟⎠ ⎥
0 1 ⎢⎣ 2 3 2 3 ⎥ ⎦
(1)
where in (1), all symbols are defined by (2)–(9) and
explained subsequently.
Rf 2
Figure 2. Schematic of transient-response-enhanced F= (2)
structure.
Rf Rf 2
Adc gm1gm 2 gmP / Ro Ro 2 RoL (3)
has been researched in numerous papers. Rf1 and P0 Ro1Ro 2 RoL / Cm gm 2 gmP (4)
Rf2 constitute feedback resistors, and CL, IL show gm 2
the load condition. P1 =
The circuit of transient-response-enhanced (C 2 )
C gd (RoL gmP ) + C gd ( gm 2 + gmf )R f C f
structure used in this paper is given in Figure 2,
(5)
consisting of MC1∼MC6. Vout and Vf are connected
to the output of the LDO regulator and the gate of P2 =
Mp, respectively. This technology adopts push-pull ( )
gmP ⎡⎣ C2 + C gd (RoL gmP ) C gdd + ( gm + gmf )R f C f ⎤⎦
movement to increase driving capability at the gate
of Mp. A schematic of the proposed LDO with this (C 2 )
C gd CL
technology is shown in Figure 5. (6)
P3 =
2.2 Stability analysis ( )
gmP ⎡⎣ C2 + C gd (RoL gmP ) C gdd + ( gm + gmf )R f C f ⎤⎦
Fig. 3 gives the topology of proposed LDO in this
paper, and Fig. 4 gives the small-signal model of
(C 2 )
C gd RoL R f C f
this new structure. RO1-OL is the output resistance, (7)
640
Figure 4. Small-signal modelling of proposed LDO.
Z2 1 / Rf C f (8) compose the first stage amplifier, and MB1 and MB4
conform the second stage. This paper adopts pull-
Z1 gm 3 / C gd (9) push architecture in the second stage to enhance
the load transient response. Mp is a power tran-
F is the feedback factor. Adc is the low-frequency sistor. MC1∼MC6 constitute the pull-pushed tran-
gain. P0-3 represent poles of the system, and Z1-2 sient-response-enhanced architecture. Rf1 and Rf2
represent zeros. Since the trans-conductance gmp constitute the feedback network. Cm is the Miller
and the output resistance rop of the power PMOS- capacitor which is good for the LDO’s stability.
FET change with an increase or decrease in the
load current, the stability of the proposed LDO 3.2 Transient-response-enhanced circuit
will be studied at different load conditions. The The circuit of the new transient-response-
stability of this circuit has been proved (Peng and enhanced structure is shown in Figure 5. For good
Sansen, 2005; Leung and Mok, 2001). driving capability, a push-pull structure is adopted
(Man, Mok, and Chan, 2007). MC1∼MC3 comprise
the first channel to the gate of Mp, while MC4∼MC6
3 CIRCUIT DESIGN AND TRANSIENT- compose the second channel. Once the voltage in
RESPONSE-ENHANCED CIRCUIT the gates of MC1 and MC4 varies, the voltage in the
DISCUSSION drain of MC3 and MC6 changes in the same ten-
dency because of the push-pull circuit channels.
3.1 The whole circuit Changes in the load current will lead to large
The whole circuit of the full on-chip LDO regula- output variations. Then, the voltage Vout is
tor in this paper is shown in Figure 5. MA1∼MA4 detected by Cf to pull the voltage in the gates of
641
MC1 and MC4 up (or down). When analysing the 4 SIMULATION RESULTS
first circuit channel, the up (or down) voltage trend
in gate MC1 causes the voltage in the drains of MC1 The proposed circuit is implemented in the
and MC2 to go down (or up). And then, transis- HHNEC BCD_350 process, the quiescent cur-
tor MC3 is turned on to charge (or discharge) the rent of this new structure is only 10.5 uA, while
gate capacitance of the power transistor. Similarly, the maximum load current is 100 mA. In order
When analysing the second circuit channel, the up to make a fair comparison on the transient per-
(or down) voltage trend in the gate of MC4 also formance, results with and without the transient
leads transistor MC6 to charge (or discharge) the response structure will be shown.
gate capacitance of the power transistor. Finally, The simulation results of loop stability are
the voltage of gate Mp is increased (or decreased), shown in Figure 6. The comparison between struc-
and then Vout will be decreased (or increased). tures with and without the transient-response-
According to the analysis, transient response enhancement block is shown in Figures 7 and 8.
time is enhanced effectively by the dynamic push- Table 1 provides the performance summary of the
pull scheme. proposed LDO regulator.
Figure 7. Comparison of load transient response of two LDOs with and without transient-response-enhanced
technology.
642
Figure 8. Comparison of line transient response of two LDOs with and without transient-response-enhanced
technology.
Table 1. Performance summary of the Furthermore, this novel technology makes non-
proposed LDO. dominant poles locating at higher frequencies.
Thus, the small compensation capacitor and full on-
VIN (V) 5 chip architecture lead to small-area LDO regulator.
VOUT (V) 2.4
IQ (uA) 10.5
ILOAD (mA) 0–100
REFERENCES
Load Reg. (mV/mA) 0.16
Line Reg. (mV/V) 3.7
Leung, K. N. and Mok, P. K. T. (2001, Sep). Analysis of
PSRR (dB) 53 multistage amplifier-Frequency compensation. IEEE
ΔVOUT (mV) 125 Trans. Circuits Syst. I: Fund. Theory Appl. 48(9),
1041–1056.
Lau, S.K., Mok, P.K.T. and Leung, K.N. (2007). A Low-
5 CONCLUSION Dropout Regulator for SoC with Q-Reduction. IEEE
J. Solid-state Circuits 42, 658.
In this paper, a full on-chip LDO regulator with Man, T.Y., Mok, P.K.T. and Chan, M. (2007). A high
a novel transient-response-enhanced circuit slew-rate push-pull output amplifier for low-quies-
cent current low-dropout regulators with transient
implemented in 0.35 um has been introduced. response improvement. IEEE Trans, Circuits Syst. II,
From the simulation results it can be seen that Exp. Briefs. 54(9), 755–759.
the proposed architecture improves the transient Peng, X. and Sansen, W. (2005). Trans conductance with
response greatly. Both undershoot and overshoot capacitances feed-back compensation for multistage
are greatly improved compared with the structure amplifiers. IEEE J. Solid-State Circuits. 40, 1515.
without transient-response-enhanced architecture.
643
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Lingxi Lu
School of Mathematical Sciences, Peking University, Beijing, China
ABSTRACT: In the field of automotive engineering, the estimation of ego-motion plays an important
role in robot control. In this review, we showed a general roadmap of camera ego-motion estimation,
introduced the methods of optical flow estimation from image sequences, and compared three methods
of ego-motion estimation from estimated optical flow in detail. We discussed the specialties of the
mentioned methods and analyzed the error sources. We concluded that the optical flow-based ego-
motion estimation methods can be used for velocity estimation but are not suitable for position or pose
estimation. We encouraged researchers to focus on finding approaches to error elimination and finding
less complicated methods.
645
where gins and Prazdny proposed the motion field model
(Longuethiggins 1980), researchers have carried
⎛ 1 cot θ ⎞ out camera ego-motion estimation methods based
− 0
⎜ dx dx ⎟ on optical flow, in which the 3-D coordinates of
⎛f 0 x0 0⎞ ⎜ ⎟ the points are not required.
1
⎜0 y0 0⎟ , D = ⎜ 0 0⎟ , Assume that a fixed point Pi (X i Yi Zi ) in
T
K0 f
⎜ ⎟ ⎜ sin θ ddy ⎟ the world coordinate and let v (vx , vy , vz )T and
⎝0 0 1 0⎠ ⎜ ⎟
⎜ 0 0 1⎟ ω (ω x , ω y , ω z )T be the transitional velocity and
⎝ ⎠ the angular velocity of the camera respectively.
The velocity of Pi relative to the camera satisfies (2).
⎛ R T⎞
and M = ⎜ .
⎝ 0 1 ⎟⎠ Pi (X Yi Z i )
T
= −v ω Pi (2)
i
646
I ( x, y t ) = I ( x + x y + y t + t ) (4)
(Zˆ , vˆ, ˆ )
i argmin
ag i
Zi ,v ,ω
1 m
∑ ri
m i =1 2
2
(9)
Assume that the movement is small. Use the
Taylor series and we get (5). The optimization problem could be solved by the
Gauss-Newton update procedure, which determines
I (x + x y + y t + t ) = a descent step at every iteration through lineariza-
∂I ∂I ∂I tion by Taylor series. m linear equations are formed:
I (x y t ) + δ x + δ y + δ t + H.O.T (5)
∂x ∂y ∂t k k
⎛ 1⎞ ⎛ 1⎞
Combining (4) and (5), we get ⎜⎝ Z ⎟⎠ Ai v + A
k
Av
i
k
Δ ⎜ ⎟ + Bi Δω k ri k (10)
i ⎝ Zi ⎠
∂I δ x ∂I δ y ∂I δ t
with additional constraint (t k ) Δt k = 0, where k is
T
+ + =0 (6)
∂x δ t ∂y δ t ∂t δ t the iteration number.
The algorithm could be improved by observ-
or ing that optimization parameter is separable as
(v, (ω , Zi )). After v is solved, ω can be computed by
I x x + I y y = − It (7) solving a linear problem, and finally Zi can be com-
puted by the result of v and ω. Thus, the accuracy
where ( x y ) is the optical flow of ( x y,t ) . of the optimization problem could be improved by
Note that there are two unknowns in the equa- first computing Δv through Gauss-Newton method,
tion, additional conditions are needed to esti- and then calculate ω and Zi respectively.
mate the flow, which draws various differential Note that a generalization of the optimization
methods of optical flow estimation. The most problem could be
well-known methods are Lucas-Kanade method
(Lucas & Kanade, 1981) and Horn-Schunck
method (Horn & Schunck, 1981). Other meth- (Zˆ , vˆ, ωˆ )
i argmin
i
Zi ,v ,ω
1 m
∑ f (ri )
m i =1
(11)
ods include Buxton-Buxton method (Wagemans,
1989), Black-Jepson method (Beauchemin & where f(ri) could be ri p
p
or some more general loss
Barron, 1995), etc. There are also other methods functions.
estimating the optical flow without using the dif-
ferential constraint. 3.2.2 Method of Zhuang et al
The method (Zhuang et al., 1988) assumes that not
3.2 Ego-motion estimation from optical flows only optical flow of image points p i* , but also their
Once we acquired optical flows from an image relative depth Zi are given. In this case, depth
sequence, we can use them for camera ego- information does not involve derivatives, and the
motion estimation. The existed methods can be optimization problem (Least Square Estimation)
summarized as optical procedures. In this section, has only 6 unknowns:
we mainly introduce three methods, while other m
1 1
methods vary with constraints and optimization (v,ˆ, ˆ ) ∑ ( ,ω)
2
arg
a g min i 2 arg min 2
(12)
techniques. For simplicity, we set the focal length v,,ω m i =1 v ,ω m
f = 1.
To get the minimal, we obtain the partial
3.2.1 The method of Zhang and Tomasi derivatives:
According to (3), we cannot determine the absolute
values of Zi and v respectively as they only appear ∂ε 2 ∂ε 2
in the form Zvi . We add the constraint v2 = 1, with- = 0, = 0, j = x, y z (13)
∂ω j ∂v j
out loss of generality.
Defining the residual as (8), Zhang and Tomasi
regard the ego-motion estimation problem as Rearrange the functions we get the homogene-
to minimize the residual (Tong & Tomasi, 1999; ous linear equations
Zhang & Tomasi, 2002). They develop an algo-
( )
T
rithm for the least square case as shown in (9). W ωx , ω z vx , vy vz =b (14)
y
647
Do the diagonalization to W we get the decompo- method has small variance and bias, and loss func-
sition W = UTDU, where U is orthonormal and D tions using $p$-norm will increase the robotness.
is diagonal. The solution of the Least Square esti- Gauss-Newton method converges quickly so the
mation problem is given by calculation cost is also relatively small.
The method of Zhuang et al is a linearized
(ω )
T
ω y , ω z , vx , vy , vz U T D 1U
Ub (15) method which transferred the nonlinear constraint
x
into a linear minimization problem. The method
requires less optical flow image point-depth pairs
3.2.3 Method of Raudies and Neumann to do the estimation. Information from three,
In this method (Raudies & Neumann, 2009), the instead of eight points, are needed, so the method
constraint in (3) could be transformed into may be effective when eliable optical flow informa-
tion are only provided in specific points.
0 = v( − ) (16) Florian and Heiko’s method has its superiority
⎛ fxi* ⎞ in its efficiency. The method has a very low com-
⎜ putation complexity, so it has a faster performance
where M i = − fxi* ⎟ , and
⎜ ⎟ than other optical flow estimation method. The
⎝ yi x i* − xi yi* ⎠ method also shows numerical stability under noisy
conditions.
⎛ −( f yi ) xi yi fxi ⎞ These optical flow-based methods can be used
Hi = ⎜ xi yi −( f xi ) fyi ⎟ for ego-motion parameters estimation, for exam-
⎜ ⎟
⎜⎝ fxi fyi − ( xi + yi )⎟⎠ ple, the estimation of a quadrocopter’s velocity.
However, as errors occur in all the steps of the ego-
Let EiT ( f + yi ) xi yi fx
f i ( f + xi ) fy
f i, motion estimation, these methods are not fit for
− ( + )⎤⎦ , and KT = [vxωx, vxωy + vyωx, vxωz + position or pose estimation at present. The errors
vzωx, vyωy, vyωz + vzωz,vzωz]. Regard K as K(v), we can be classified as the following three aspects.
get the linear optimization problem with respect to First, errors occur in the estimation of optical flow
E and K: because the assumption of the intensity temporal
constancy is not true in all situations. This kind of
m error is often caused by moving light sources or an
(v,KK (v )) i ∑ (vT M i
a g min
arg
v , K (v )
K T Ei )
2
(17) additive Gaussian noise. Second, errors occur in
i =1
estimation of ego-motion from optical flow due to
additional sources besides ego-motion contributing
Take partial derivatives of the optimization to the optical flow. These additional sources, e.g.
function with respect to K and v. Reform the equa- an independent moving object in sight, are usually
tions and we obtain the homogeneous linear sys- called outlier noise. Third, in the integration from
tem of equations: ego-motion to position or pose, the errors cumu-
late with time.
vTC = 0 (18)
where 5 CONCLUSION
m
c jk ∑L L
i =1
ij kj , Ego-motion estimation is an important technology
in automotive engineering. In this paper, we first
n give a general roadmap of the camera ego-motion
M ij − ( Di Ei ) ∑E M
T
Lij l lj , estimation and summarize the estimation meth-
l =1 ods as various optimization procedures. Then, we
n introduce the methods of optical flow estimation
Di ∑E E l l
T
∈ R6 × 6 , from image sequences and methods of ego-motion
l =1 estimation from estimated optical flow. Three
ego-motion estimation methods are introduced in
Mij is the j-th component of Mi. The solution is detail. After that, we show the differences of the
given by the eigenvector corresponds to the small- three mentioned methods, and discuss the error
est eigenvalue of matrix C. sources of these optical flow-based methods.
Our review shows that the optical flow-based
methods can be used for ego-motion parameters
4 DISCUSSIONS estimation but are not suitable for position or pose
estimation as errors cumulate in all the steps. In
The method of Zhang and Tomas minimized the addition, the complexity of the optical flow-based
standard residue by iteration. This minimization methods is high, and may have side effects on the
648
robustness and real-time property. In the future, Longuethiggins, H. C. & Prazdny, K. 1980. The interpre-
researchers need to focus on finding approaches to tation of a moving retinal image. Proceedings of the
error elimination and less complicated methods to Royal Society of London, 208(1173):385–97.
achieve camera ego-motion estimation. Lucas, B. D. & Kanade, T. 1981. An iterative image regis-
tration technique with an application to stereo vision.
In International Joint Conference on Artificial Intel-
ligence, pages 285–289.
REFERENCES Raudies, F. & Neumann, H. 2009. An efficient linear
method for the estimation of ego-motion from optical
Armangué, X., Araújo, H., & Salvi, J. 2003. A review on flow. In Dagm Symposium on Pattern Recognition,
egomotion by means of differential epipolar geometry pages 21–28.
applied to the movement of a mobile robot. Pattern Tong, Z. & Tomasi, C. 1999. Fast, robust, and consistent
Recognition, 36(12):2927–2944. camera motion estimation. In IEEE Conference on
Beauchemin, S. S. & Barron, J. L. 1995. The compu- Computer Vision and Pattern Recognition, page 1164.
tation of optical flow. Acm Computing Surveys, Wagemans, J. 1989. Visual cognition—computational,
27(3):433–466. experimental, and neuropsychological perspectives—
Burger, W. & Bhanu, B. 1990. Estimating 3d egomotion humphreys,gw, bruce,v. Physical Review, 82(1):98–99.
from perspective image sequence. Pattern Analy- Zhang, T. & Tomasi, C. 2002. On the consistency of
sis & Machine Intelligence IEEE Transactions on, instantaneous rigid motion estimation. International
12(11):1040–1058. Journal of Computer Vision, 46(1):51–79.
Gibson, J. J. 1950. The perception of visual surfaces. Zhuang, X., Haralick, R. M., & Zhao, Y. 1988. From
American Journal of Psychology, 63(3):367–84. depth and optical flow to rigid body motion. In Com-
Horn, B. K. P. & Schunck, B. G. 1981. Determining puter Vision and Pattern Recognition, 1988. Proceed-
optical flow. International Society for Optics and ings CVPR ’88., Computer Society Conference on,
Photonics. pages 393–397.
649
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Dahong Wang
The Smartech Institute, Shenzhen, China
ABSTRACT: For the high-voltage electric vehicle’s arm-lifting position and pose problem in the process
of operation in the power system, we put forward a prediction calculation method. On the basis of
existing work of the high-voltage electric vehicle, a matrix method is used to construct the model of part
of the lifting mechanism’s position and pose of the high-voltage electric vehicle. Through calculation and
analysis of the model, the prediction of the lifting mechanism’s motion and position information is made,
and this in turn make a reference to the unmanned remote operation control factors.
651
control module, polar axis length control module
and the end of the attitude control modules. Kin-
ematics modelling is applied to each module, and
solves a full positive and inverse kinematics model
manipulation.
Figure 4 shows angle control module movement
mechanism and Figure 5 shows the physical proto-
type. As the figures show, the coordinates O0X0Y0Z0
are fixed on the body, and the origin is located in
the rotation centre of insulation arm mechanism.
Insulation O0Y0 axis points to the upper part, and
Figure 1. The structure diagram. O0Z0 goes along the normal position of the insula-
tion arm plane. The coordinate and other axial the
rotation angles follow the right-hand rule.
Three steering gears were respectively numbered
1–3 and located in ϕLf = 0°, 120°, 240°. Single for
steering gear rotating centre is CLi. Steering gear
and tilting device junction is zero ALi. Steering gear
lever long respectively is PL. Steering gear lever
variation is dLi, i = (1∼3). Coordinates OaXaYaZa,
ObXbYbZb, OcXcYcZc, OdXdYdZd are located in 1 #
and 2 # hydraulic cylinder rotation centre.
According to robot kinematics, assume
Figure 2. Insulation arms control process. λ1 = A-Pi, Coordinate system O0X0Y0Z0 to
OaXaYaZa, ObXbYbZb, OcXcYcZc and OdXdYdZd.
For the transformation of the matrix:
⎢
0 0 1 0⎥⎥ ( 3 6 D bd
⎢⎣ − L1 L2 0 0 ⎥⎦
Base λ1 α − π / 6, can calculate its angle
⎡ 1 0 0 0⎤ control value and cylinder inverse kinematics rela-
⎢ ⎥ tionship between the scales.
⎢ 0 1 0 0⎥
C0b =⎢ Figure 6 shows polar axis length control module
⎢
0 0 1 0⎥⎥ movement mechanism and the prototype diagram
⎢ − L3 L4 0 0 ⎥ shows that the location of the relationship between
⎣ ⎦ OdXdYdZd coordinate and OeXeYeZe coordinate sys-
⎡ 1 0 0 0⎤ tem. Suppose λ2 = L7 + Δd3, where L7 is for preset values.
⎢ ⎥
⎢ 0 1 0 0⎥
=⎢ ⎡ 1 0 0 0⎤ ⎡1 0 0 0⎤
0⎥⎥ ⎢ 0 ⎥ ⎢0 0 ⎥⎥
⎢
0 0 1
⎢ 1 0 0⎥ 1 0
⎢ −L λ1 − L5 sin λ1 0 0⎥⎦ Cd ⇒ C de = ⎢
⎣ L5 ⎢ 0 0 1 0⎥ ⎢0 0 1 0⎥
⎡cos λ1 − sin sin λ1 0 0⎤ ⎢ ⎥ ⎢ ⎥
⎢ ⎥ ⎣ − λ2 − 8 0 1⎦ ⎣λ2 L8 0 1⎦
⎢ sin λ1 cos λ1 0 0⎥
⋅⎢
⎢ 0 0 1 0⎥⎥ We can obtain,
⎢⎣ 0 0 0 1⎥⎦
d T
[ ]
e [ λ 2 , L8 , 0,1]T
⎡ 1 0 0 0⎤
⎢ ⎥ According to C 0d , can launch
0 1 0 0⎥
C d
= ⎢⎢ ⎡ λ2 λ1 − L8 i λ1 + λ1 ⎤
0⎥⎥
0
⎢
0 0 1 6
⎢λ λ1 + L8 λ1 + λ1 ⎥⎥ (2)
⎢ − L6 λ1 − L6 sin λ1 0 0⎥⎦ re0 = ⎢ 2 6
⎣
⎢ 0 ⎥
⎡cos λ1 − sin λ1 0 0 ⎤ ⎢ ⎥
⎢ ⎥ ⎣ 1 ⎦
⎢ sin λ1 cos λ1 0 0⎥
⋅⎢
⎢ 0 0 1 0⎥⎥ Comprehensive description above can introduce
⎢⎣ 0 key points e spatial location.
0 0 1⎥⎦ According to the plane geometry relationship
⎡1 0 0 0⎤ shown in Figure 7, if the input is 0, 4# cylinder is
⎢ ⎥ at the end of the attitude angle β:
⎢0 1 0 0⎥
=[ 0] = ⎢
−1
SoC0
⎢
0 0 1 0⎥⎥ β=
π
+ λ1
1
π +α
⎢⎣ L1 L2 0 0⎥⎦ 2 3
Assuming Dac + ΔDac is distance between a point Figure 6. Polar axis length control module movement
and point c. Dbd + ΔDbd is b and d, launch formula is: mechanism.
653
Figure 8 shows coordinate diagram established. Thus, the coordinates of the position can be
For #4 cylinder coordinate system fixed end estab- launched about h point relative to e point,
lishes f. Its coordinate direction remains the same
T
as the e coordinate. G coordinate system, is set up rhe ⎡ ⎡ r g ⎤T cge ⎤
to keep the end profile vertical upward; g is the ⎣⎣ h ⎦ ⎦
T
coordinate system coordinates for a fixed direc- ⎡ ⎡ 1 0 0 0⎤ ⎤
⎢ ⎢ ⎥
0 ⎥⎥ ⎥
tion. The origin position is as shown in Figure 7.
0 1 0
OgYg is pointing vertically upward, and OgYg insu- = ⎢( − L ) ⎢
lation arm is along the plane of the normal posi- ⎢ ⎢ 0 0 1 0⎥ ⎥
⎢ ⎢ ⎥⎥
tion. Coordinate other axial and corner also follow ⎢⎣ L
⎣ 11 cos ( ) L 11 n ( λ3 )
s
si 0 1 ⎦ ⎥⎦
the right-hand rule. According to the Figure 8, the
1 cos ( λ3 ) s n ( λ3 ) 0 1⎤⎦
T
H point #4 cylinder activity, g point corresponds to = ⎡⎣ L11 − L112 + L111 si
the coordinate position for (0, −L12, 0)T, e point cor-
(3)
responds to the coordinateT system of coordinates
for (L11 cos( λ3 ) L11 i λ3 , 0 ) , and f points corre-
11 sin( According to the distance formula, it can be
sponds to the coordinate system of coordinates for calculated,
the (−L9, −L10, 0)T. Therefore, it can be calculated:
ΔD
D fh D fh =
⎡ 1 0 0 0⎤
(L ( ) ) + (L ( ))
2 2
⎢ 0 1 0 0 ⎥⎥
L L L
Ceg = ⎢
⎢ 0 0 1 0⎥
⎢ ⎥ To sum up, using λ3 λ1 can ensure to keep ver-
−
⎣ 11L cos ( ) L11 sin ( ) 0 1⎦ tical upwards at the end, the manipulation of 4 # cyl-
inder volume. Or according to ΔDfh calculate λ3 then,
According to the above methods, it can be deduced: λ1 + λ3 can be obtained after the end of the execution.
⎡ 1 0 0 0⎤
⎢ 0 1 0 0 ⎥⎥
3 CONCLUSION
Cg [Ceg ]−1 = ⎢⎢ 0 0 1 0⎥
;
As part of the lifting mechanism as a sample, this
⎢ ⎥
⎣ L11 cos ( ) L11 sin ( ) 0 1⎦ paper is committed to research on its kinematics
model. First of all, its work mechanism is analysed,
and we explain the control mode. And according
to the movement mechanism we divide the control
system into several modules. Secondly, combining
movement mechanism, kinematics analysis was car-
ried out on each module, its positive and inverse
kinematics solution. (1) and (2) by simultaneous,
can launch its spatial position and 1 #, 2 # and 3 #
cylinder of the relationship between the output.
Through simultaneous, (1) and (3) can be launched
4 # cylinder output and at the end of the relation-
ship between the space position. After acquiring
Figure 7. Insulation arm operation plane geometry this relationship, we can accurately control the insu-
relationship. lation work bucket at the end of the position and
posture, providing better service for the staff.
REFERENCES
654
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Yanru Chen
Verakin High School of Chongqing, Chongqing, China
ABSTRACT: This paper presents an analytical approach for static impedance abnormity of the
semiconductor integrated circuit. The design details and manufacturing process have been briefly
described. The Emission Microscope (EMMI) is adopted in the analytical approach in order to locate the
position that causes static impedance to be abnormally low. Combined with process analysis, the cause of
static impedance abnormity will be precisely found.
1 INTRODUCTION
655
adopt the chrome silicon thin film resistor fabrica-
tion and have an insulating layer of silicon dioxide
below them. Thus the resistors will not produce
a leakage channel. Therefore, only the transistors
have the leakage current channel, leading to the
low static impedance of the device.
3 EMMI TEST
656
as point defects, line defects, planar defects and 4.2.2 Lithography processing defects lead to CE
bulk. If PN junction is produced at lattice defect junction leakage current
region by doping, there will be an accumulation In the process of forming the transistor, if a process
of impurities and result in electric field localised parameter such as temperature is unstable, it will
in PN junction section to cause leakage current. cause the base width of the transistor to become
Because the above-mentioned defects are random, very thin, thus cause the soft breakdown of the
and when the transistor area size becomes larger, transistor and CE junction leakage current of the
the probability of the corresponding degree of the transistor. Because the defects will be detected by
PN junction leakage current caused by the lattice the PCM process in wafer processing and the PCM
defect is greater. test results of this batch of sample devices meet
If the transistor CB junction and EB junc- the requirements of the technical specifications,
tion have some lattice defects, the transistor will therefore, the possibility that the process param-
exhibit the electrical characteristics of degenera- eter leads to the transistor base width being thin
tion and CE leakage phenomenon. In the PIN and causing a leakage current of the CE junction
switch driver circuit, if the defect falls on the out- and low static impedance can be excluded.
put of the transistor, this will cause a phenom- In the process of forming the transistor, if the
enon of low static impedance of the supply ports residual photo-resist or the adsorption of dust par-
between VCC and VEE. ticles exists in the lithography process, it will not be
If the CS junction of substrate in the silicon possible to inject the impurity into the base area
wafer has some defects as above-mentioned, it will or cause the impurity density deficiency. The base
directly lead to the P type substrate between the width will become very thin, as shown in Figure 5.
NPN transistor V1 and V2 of the circuit of the The above-mentioned defects will lead to CE junc-
PIN switch driver leaking current and causing the tion leakage current of the transistor and low static
phenomenon of low static impedance. impedance of the supply ports between VCC and
Therefore, we cannot exclude the possibility of VEE.
the material lattice defects causing the leakage cur- Although the process is carried out in an ultra-
rent of the CE junction of the output transistor clean environment, dust particles in the air cannot
and the CS junction of the substrate, and resulting be completely avoided. There will be a probability
in a low value of static impedance between supply of a random attachment to the surface of the sili-
ports VCC and VEE. con wafer. According to the layout of the circuit
of the PIN switch driver, if residual photo-resist
or dust particles attach to the region of the output
transistor, it will cause low static impedance of the
supply ports between VCC and VEE.
5 VALIDATION
657
transistor are resistive, which means that the PN
junction leakage exists. Thus it can be determined
that the reasons why the static impedance between
the VCC and VEE power supply ports in the abnor-
mal circuit is low are the lattice defects in the silicon
semiconductor, which lead to PN junction leakage
(CE leakage and CS leakage), and CE transistor
leakage caused by process defects.
6 CONCLUSION
ACKNOWLEDGEMENTS
REFERENCES
658
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Bin Hu
Shanghai Fire Research Institute of Ministry of Public Security, Shanghai, China
Jinpeng Xing
Department of Mechanical and Electronic Engineering, Dongchang College of Liaocheng University,
Shandong Liaocheng, China
ABSTRACT: With the rapid development of social economy and the expansion of the function of the
fire brigade, firefighting and rescue operations of the public security forces are facing huge risks and chal-
lenges, especially in the face of complex and changeable large-scale fire scenes. The problem of how to
access fire information accurately and in a timely manner, and the rapid and efficient implementation of a
disaster relief strategy have become an urgent priority. In this paper, the research status of the Unmanned
Aerial Vehicle (UAV), its specific application to fire rescue and the future development trend of the UAV
will be examined.
Keywords: Firefighting; Firefighting and rescue; Large fire; Unmanned Aerial Vehicle
659
into the following subsystems: ground command 4. Safe and reliable. Whether in the face of heavy
and control system, UAV flight platform, aerial rain, high temperature, typhoon, debris flow
video surveillance platform, wireless real-time and other severe weather conditions or fire,
image transmission system of microwave, GPS explosions, collapse, toxic and other serious
navigation and automatic driving system, high accident disaster sites, UAV technology can
efficiency and high-capacity lithium polymer effectively avoid traditional fire rescue opera-
power supply unit, 3G transmission relay link etc. tions in the presence of short board, which can
(Newaz et al., 2016; Jung et al., 2014; Lyu et al., ensure the safety of the fire brigade.
2016; Ortiz et al., 2013; Qian et al., 2013). Figure 1
shows the work principle diagram of UAV fire res-
cue (Yuan et al., 2015). 3 POSSIBLE APPLICATIONS OF
UNMANNED AERIAL VEHICLE IN
2 TECHNICAL ADVANTAGES OF UAV FIRE FIGHTING FORCE
Thanks to the advanced flight control platform Combined with the actual needs of the fire fighting
and background video monitor system, with the force, the use of UAV can solve the following four
perfect flight and ground support system, UAV problems (Zeng et al., 2010):
can be implemented as a comprehensive long-term
1. Disaster investigation. When a disaster occurs,
air monitoring for the ground. In order to achieve
the use of UAV can ignore the disaster investi-
a lower overall cost of traditional means cannot
gation, terrain and environment, and flexibility
be involved in the region for real-time monitoring
to carry out the investigation, especially some
and auxiliary rescue, the intelligence and advanced
of the difficult and perilous disaster site, the
nature of UAV is reflected in such aspects as patrol
investigation team to carry out investigation of
path planning, intelligent analysis, fixed-point
the case, the UAV can expand the investigation
continuous monitoring, fire alarm, etc., and makes
quickly. The use of UAV detection can improve
full use of technology in formulating contingency
the efficiency of investigation effectively, and
plans, establishing a rapid response mechanism,
identify the key factors of disaster accidents in
on-site fire archiving and forensics prevention
a timely manner, so that commanders can make
means an important role (Marina et al., 2012;
the right decision, and can effectively avoid
Namin et al., 2012). The UAV’s technical advan-
casualties, both to protect people from toxic,
tages mainly comprise the following aspects:
flammable, explosive and other dangerous envi-
1. Flexible. A small UAV is generally less than 100 ronments, but also to make a comprehensive
kg, relying on flight control can be manipulated, and detailed analysis of the situation on the
only 1–2 people can complete such operations. ground.
In the case of poor roads, traffic disruption, the 2. Monitoring tracking. The role of UAV is not
foot can be carried to the scene of disaster acci- limited to disaster detection. In the process of
dents, and take-off conditions is very simple, no handling the disaster, real-time monitoring and
requirements on the terrain, with unmanned tracking by the UAV can provide an accurate
aerial vehicles easy to carry, so the UAV has view of the disaster. It is convenient for the
strong flexibility. headquarters at all levels to grasp the dynamic
2. Vision comprehensive. The UAV uses broad- disaster situation in time, so as to make fast and
band, data link technology can achieve over the accurate countermeasures to minimise disaster
horizon control, which has a very comprehen- losses.
sive view, according to the needs of the field, 3. Assisted rescue. The use of unmanned aerial
can be from different angles, different distances vehicle integration, or the flexibility to carry key
in different light conditions to work. The UAV equipment, can provide assistance in a variety
can be realised at high altitude on the target of of situations. First, the use of integrated voice,
overall shooting. The distance and angle can amplification module to convey instructions.
also be adjusted, according to the decision- The use of unmanned aerial vehicles to convey
making needs. instructions to the ground propaganda or direc-
3. Easy to operate. From a technical level, remote tive more effective, especially for high-altitude,
video transmission and control system of UAV high-level projects such as rescue, the UAV as
and ground station access by the network inter- the carrier, which can convey the key instruc-
face, the operators of optical access network. tions effectively. The second is to open up a res-
Therefore, using only remote cameras and aux- cue channel.
iliary equipment (camera, PTZ etc.), you can 4. Auxiliary supervision. The use of aerial pho-
watch real-time video camera of the UAV directly. tography for high-rise buildings to achieve full
660
real-time monitoring, timely detection of fire expansion functions, which must have good
hazards, fire scene real-time control, building integration and compatibility. Therefore, in full
fire inspection or on-site fire image storage, air weight, consider the daily training and manoeu-
surveillance video access to other security or ver requires the use of unmanned reconnais-
fire monitoring systems to support large-capac- sance aircraft equipped with the required
ity long-term image storage and retrieval access portable or car arrived at the scene near the
to support by the intelligent terminal remote individual into the mobile deployment site,
view and control some functions. emergency equipment development.
5. Rigour. If equipped with UAV, there is an inevi-
table need for quality training of the operators,
4 TECHNICAL REQUIREMENTS OF so we must form a set of training evaluation
APPLICATION OF UNMANNED mechanisms, the formation of non-daily man-
AERIAL VEHICLE IN FIRE RESCUE agement and use machine mechanisms and the
operator will need training in these.
In order for the fire forces to face the scene of the
actual situation of disaster accidents, UAVs in the
5 DOMESTIC RESEARCH STATUS OF UAV
use of fire forces should also meet certain technical
requirements.
Shenzhen City Corbett Aviation Technology Co.
1. Reliability. All kinds of fire forces facing a dis- Ltd. is committed to the application of expertise in
aster site, especially a fire scene, in which the the UAV industry and research and development,
application environment is more complex, need specialising in multi-rotor UAV systems and their
to consider the wind, smoke, temperature, water production, sales and service, with a number of
and other environmental factors. Therefore, the UAV technology patents.
UAV must be able to meet the harsh environ- An example of a fire rescue UAV product is
ment conditions. shown in Figure 2.
2. Handling performance. The average speed of The F6 UAV is a fire and rescue six-rotor UAV,
UAV cruise is 18 km/h, which can be visited mainly used for city fire emergency rescue, forest
in the range of 2 km radius, the endurance fire prevention and routine inspections of various
required to achieve single battery average more natural disasters and secondary disasters, on-site
than 30 minutes, the route inspection require- detection, search and rescue personnel, delivery
ments to achieve the continuous monitoring, of rescue supplies and other emergency rescue
and two inspections for clearance less than 15 work.
minutes. In addition, the flight altitude, accord- The F6 fire UAV is mainly used for city fire
ing to research, most of the disaster accident emergency rescue work, and can be equipped
flight altitude of 200 metres below, taking into with equipment to monitor the implementation
account the maximum height of the building, of the fire, to find out the high temperature fire
reaching 300 to 500 metres altitude should point, conduct a fire hazard survey, and look for
be able to meet the daily needs of the scene survivors as part of the emergency rescue work, to
investigation. reduce the loss of life and property.
3. Stability. The UAV image transmission should Beichen Aerospace Science and Technology
be clear and continuous, and the image of the Co. Ltd. is a industry user UAV and application
wireless transceiver should have higher require- service providers, products used in police anti-
ments. Wireless transmission can easily receive terrorism, fire rescue, fire aerial surveillance, aerial
intereference; therefore, it is necessary to have video, agricultural plant protection, wiring and
some anti-interference ability, so as to achieve land resources survey in areas such as traction and
the image in the process of use. power line.
4. Integrated compatibility. The application of a BCA-Y4 is a vertical take-off and landing of four
UAV in the fire force should achieve a lot of unmanned aerial rescue system for the fire depart-
661
in fixed-wing UAV autopilots. IEEE Transactions on
Vehicular Technology, 65(11), 8832–8840.
Jung, Y.S., You, J.Y., & Kwon, O.J. (2014). Numerical
investigation of prop-rotor and tail-wing aerody-
namic interference for a tilt-rotor UAV configuration.
Journal of Mechanical Science and Technology, 28(7),
2609–2617.
KemperKoji, F.P., SuzukiJames, A.O., & Morrison, R.
(2011). UAV consumable replenishment: Design con-
cepts for automated service stations. Journal of Intel-
ligent & Robotic Systems, 61(1), 369–397.
Lyu, Y., Pan, Q., Zhao, C., Zhang, Y., & Hu, J.W. (2016).
Vision-based UAV collision avoidance with 2D
dynamic safety envelope. IEEE Aerospace and Elec-
tronic Systems Magazine, 31(7), 16–26.
Figure 3. BCA-Y4 fire monitoring and rescue UAV Marina, H.G.D., Pereda, F.J., Sierra, J.M.G., & Espinosa,
system. F. (2012). UAV attitude estimation using unscented
Kalman filter and TRIAD. IEEE Transactions on
Industrial Electronics, 59(11), 4465–4474.
ment to perform accident investigation, search and Namin, F., Petko, J.S., & Douglas, H. (2012). Analysis
rescue, and other tasks, and can be carried out in and design optimization of robust aperiodic micro-
light of the amount of rescue equipment. UAV swarm-based antenna arrays. IEEE Transactions
on Antennas and Propagation, 60(5), 2295–2308.
Newaz, A.A.R, Jeong, S., & Lee, H. (2016). Hyejeong
6 SUMMARY AND PROSPECT Ryu, Nak Young Chong. UAV-based multiple source
localization and contour mapping of radiation fields.
Based on the investigation of UAV use in fire, mon- Robotics and Autonomous Systems, 85, 12–25.
itoring and rescue functions, the UAV has shown Nijsure, Y.A., Georges, K., Nazih, K.M., Gagnon, G., &
obvious advantages in a large space, large areas of Gagnon, F. (2016). Cognitive chaotic UWB-MIMO
fire disaster reduction, based on its machine vision detect-avoid radar for autonomous UAV navigation.
system and intelligent sensing system. With the IEEE Transactions on Intelligent Transportation Sys-
tems, 17(11), 3121–3131.
continuous development of the social economy, Ortiz, A., Kingston, D., & Langbort, C. (2013). Multi-
the UAV will show increasing future advantages in UAV velocity and trajectory scheduling strategies for
fire fighting and fire protection in city buildings, target classification by a single human operator. Jour-
public places, and rescue of forest parks. nal of Intelligent & Robotic Systems, 70(1), 255–274.
Qian, M., Jiang, B., & Xu, D. (2012). Fault tolerant
tracking control scheme for UAV using dynamic sur-
ACKNOWLEDGEMENTS face control technique. Circuits, Systems, and Signal
Processing, 31(5), 1713–1729.
This work was supported by Shanghai Science Yuan, C., Zhang, Y., & Liu, Z.X. (2015). A survey on
and Technology Commission (grant number technologies for automatic forest fire monitoring,
14dz12068 0 2). detection, and fighting using unmanned aerial vehi-
cles and remote sensing techniques. Canadian Journal
of Forest Research, 45, 783–792.
REFERENCES Zeng, J., Yang, X.K., Yang, L.Y., & Shen, G.Z. (2010).
Modeling for UAV resource scheduling under mission
Eduard, B., & Alex, S.C. (2016). On the tradeoff between synchronization. Journal of Systems Engineering and
electrical power consumption and flight performance Electronics, 21(5), 821–826.
662
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: This paper studies the attitude tracking control problem of the Quadrotor UAV.
Considering that the quadrotor usually suffers external disturbances during practical missions, an
Extended State Observer (ESO) is introduced to improve the accuracy and robustness of the attitude
controller. And the stability analysis shows that the estimation error is convergent. Then the non-linear
MIMO system was transformed into linear SISO system by the dynamic feedback. Finally, the effective-
ness and the better characteristics of the strategy are illustrated by the simulation results, which lay a solid
base for the engineering application.
663
3 THE CONTROL SCHEME DESIGN
⎪ y
I
θ = ( I − I ) φ − J Ω +U + I d
φ
z x T
TPP y τθ
⎪I = ( I − I ) φ θ + U + I d
⎩ z x y 4 z τψ
664
1 2 1 2 As long as there is a reasonable choice of observer
V (z1, 2 ) z1 + z2 (8) parameters, the state observer can guarantee a
2 2 real-time observation.
V (z1, z 2 ) ( 4 x 6a1 + x 4a1 Ω + b1U 2 )
z 2 (x
− z 2 ( x1d c1 ((z 2 + c1z1 )) z1 z2 − c1z12 (9) ⎧ a1
⎪ z1 z2 − ε ( z1 x1 )
where V (z1, z 2 ) , there is: ⎪⎪ a2
⎨ z2 z3 − 2 ( z1 − x1 ) + bu (15)
⎪ ε
U2 1 4 6 1 4 2 1 ( 2 1 1 2 2 b1 ⎪ z3 = − a3 ( z1 x1 )
(10) ⎪⎩ ε3
Using the same method, the control input U3 where z1 x1 is the observation error and zi is the
and U4 is obtained as follows: observation state, then the observer error conver-
gence is proved as below:
U3 3 2 6 3 2 4 3 ( 4 3 3 4 2 b2 Firstly, the observation error is defined
η [η η η ] ,
T
(11) as where η1 = z1 − x1,
U4 ( b3 (12)
η2 2 2 η3 = z3 − x3 . Then we have,
5 4 2 5 5 6 5 5 6 2
⎧ a1η1
3.2 ESO design ⎪η1 = − ε + η2
⎪⎪ a2η1
In this sub-section, the design of the Extended ⎨η2 = − 2 + η3 (16)
⎪ ε
State Observation (ESO), which is desired to com-
pensate the external disturbances of the system, ⎪η3 = − a3η1 + η (t )
is considered. Use the roll angle as an example to ⎪⎩ ε3
illustrate the structure of the ESO (WEI Qingtong,
2016). That is η Aη + Bn( t ), in the formula A =
T
⎡ − aε1 1 0; − a22 0 1; − a33 0 0 ⎤ , B = [ ]T .
⎣ ε ε ⎦
⎧x1 = φ 3
⎨x φ
⎩ 2 { y z
TP + 2 }/I x + n(t)
(13)
Make λ 1λ + a2 λ
2
3 ∏i =1
( λ + λi ) = 0, for
matrix A, there are Vandermonde matrix Q
contents:
where n(t) is the disturbance and uncertainties, it
can be written as:
⎧ λ λ λ ⎫
A Qdiag ⎨ − 1 , − 2 , − 3 ⎬ Q −1 (17)
{ x1
x 2
x2
f ( 1, 2 ) + g(x1, x 2 )u + n(t)
(14)
⎩ ε
Define λ min
ε ε⎭
⎧ ⎛ λ1 ⎞ ⎛ λ ⎞ ⎛ λ3 ⎞ ⎫ −1
t
⎛ λ i ⎞ ⎛ λ min
min (t − τ ) ⎞
t
≤ Q Q e p −
1
(0) + Q Q L ∫ e p −
1
dτ B
⎝ ε ⎠ ⎝ ε ⎠
0
⎛ λ ⎞ ε⎛ ⎛ λ t⎞⎞
≤ Q Q 1
exp − i (0) + L 1 − exp − min ⎟ B
⎝ ε ⎠ λ ⎝ ⎝ ε ⎠⎠
665
where B = 1, thus lim+ η ( ) = 0. If appropriate dϕ = 0.02 * sin(0.8 + 50 ) dθ = 0.1 * cos(0.5 + 30 ),
ε →0
parameters ε , a1, a2 , a3 are selected, the ESO states dψ = 0.01 * sin(0.2 + 50 ). To illustrate the
converge to system state and total disturbance in manoeuvring ability of the attitude, the command
finite time. Thus, the control law u (v − z3 ) / b chosen is:
is reached, the v means the pseudo-control signal
(Yang Li-ben, 2015). [ϕ d θ d ψ d ] = [0.2 * sin(0.5t ) , 0.3 * cos(0.5t ),
− 0.2 * sin(0.5 )] rad.
Parameter Value
In this section, the effectiveness and the improved
characteristics of the strategy are illustrated by the Mass (m) 1 kg
simulation results. The parameters of the quadro- Distance (l) 0.225 m
tor used in the simulation are shown in Table 1. X-axis Inertias (Ix) 8.1 × 10−3 Nm ⋅ s2/rad
To verify the effectiveness of the new strategy Y-axis Inertias (Iy) 8.1 × 10−3 Nm ⋅ s2/rad
in the attitude controller, different types of exter- Z-axis inertias (Iz) 1.42 × 10−2 Nm ⋅ s2/rad
nal disturbances are added to the three chan- JTP 1.04 × 10−4 Nm ⋅ s2/rad
nels respectively. The disturbances are chosen as
666
Figure 5. Estimate errors of disturbance observers.
As is shown in Figure 3, the external disturbances micro quadrotor. Robotics and Automation. 2005
will largely reduce the tracking performances of Proceedings. (pp. 2247–2252).
the attitude control system. The simulation results Han Jingqing. (2008). Active Disturbance Rejection Con-
with ESO compensations are given in Figure 4, trol Technique. Beijing: National Defence Industry
Press.
which indicate that the backstepping attitude con- Raffo, G.V., Ortega, M.G. and Rubio, F.R. (2010). An
troller has better characteristics and strong robust- integral predictive non-linear control structure for a
ness. In Figure 5, the estimate errors of ESO are Quadrotor helicopter, automatic, 46(1), 29–39.
shown, proving that the introduced ESO has good Bouabdallah, S., Noth, A. and Siegwart, R. (2004). PID
disturbance observation. vs LQ control techniques applied to an indoor micro
quadrotor in Proceedings of 2004 IEEE/RSJ Interna-
tional Conference, 3, 2451–2456.
5 CONCLUSION Wang Lu, Su Jian-bo. (2013). Attitude tracking of air-
craft based on disturbance rejection control. Control
Theory & Applications. 30(12).
In this paper, a backstepping control strategy with Wang, Y.Q., Wu, Q.H. and Wang, Y. (2014). Distributed
ESO compensations was proposed for the quad- cooperative control for multiple quadrotor systems
rotor UAV, which aims to improve the quality of via dynamics surface control. Non-linear Dynamics.
performance in the presence of external distur- 75(3), pp. 513–527.
bances. The ESO is designed to compensate for the Wei Qingtong. Etc (2016). Backstepping-Based Attitude
dynamic system. The simulation results have dem- Control for a Quadrotor UAV Using Non-linear Dis-
onstrated that the introduced strategy has good turbance Observer. Proceedings of the 34th Chinese
performance and strong robustness in exist of the Control Conference, pp. 771–776.
external disturbances. Yang Li-ben, Zhang Wei-guo, Huang De-gang. (2015).
Robust trajectory tracking control for underactuated
quadrotor UAV based on ESO. Systems Engineering
and Electronics, 37 (9).
REFERENCES Yebin Liu, Xiangyang Xu. (2016). The Anti-interference
Maneuver Control based on Extended Observer for
Bouabdallah, S., Siegwart, R. (2005). Backstepping Quadrotor UAV. Intelligent Human-Machine Systems
and sliding-mode techniques applied to an indoor and Cybernetics Proceedings, pp. 305–309.
667
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Zhuo Li, Suge Yue, Yantu Mo, Jia Wang & Fei Chu
Beijing Microelectronics Technology Institute, Beijing, China
ABSTRACT: A high performance triple-mode oscillator based on 0.25 um BCD process is presented
in this paper. The conventional ring structure with mode control modules is adopted to produce a ramp
signal and square wave. As the simulation results show, under the temperatures of −55°C–125°C, the
output frequency varies from 485.9 KHz to 512 KHz in the master mode, with a maximum change
rate of 2.82%. In the resistance adjustment mode, the adjustable range is 13.4 KHz–2.78 MHz. In the
synchronisation mode, the synchronous frequency covers from 15 KHz to 4.2 MHz. An oscillator with
great performance has thus been successfully applied in a DC-DC converter circuit.
669
Figure 1. Framework of the oscillator.
670
Figure 3. Circuit of synchronisation signal detection.
dU (V2 V1 )
I on C× = ⋅ C1 (2)
dt Ton
(V2 V1 )
Ton = ⋅ C1 (3)
I in
Figure 4. Circuit of mode control.
671
Figure 5. Main oscillator.
672
Figure 8. Wave in resistance adjustment mode.
673
Figure 10. Wave of synchronisation mode.
674
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Wei Liu
Logistics Group, Beijing Institute of Technology, Beijing, China
Xindi Zheng
School of Information and Electronics, Beijing Institute of Technology, Beijing, China
Zenan Lin
International School, Beijing University of Posts and Telecommunications, Beijing, China
Jian Xu
School of Automation, Beijing Institute of Technology, Beijing, China
ABSTRACT: With the rapid development of electronic technology, there is a need for higher
requirements in electromagnetic compatibility of power supply systems in industrial control systems.
This paper first puts forward the whole design of a high-frequency switching power supply system based
on a Digital Signal Processor (DSP), and then designs the main controller, sampling circuit and drive
circuit of the power system. It selects the important parameters of a high-frequency transformer and
provides an improved design for an ElectroMagnetic Interference (EMI) filter circuit to filter out power
electromagnetic interference. Simulation results show that the proposed DSP-based high-frequency
switching power supply system in this paper can better filter out power electromagnetic interference and
improve the effectiveness and reliability of high-frequency switching power supply systems.
Figure 1. Block diagram of the basic power supply 2.1.2 Sampling circuit
system. In this paper, the switching power supply circuit uses
control on the voltage and current at the same time.
The voltage sampling circuit diagram and current
sampling circuit are shown in Figure 3 and Figure 4.
In the voltage sampling circuit, the linear opto-
coupler can be used to isolate the photo-electricity in
order to prevent disturbance and guarantee the stable
work of the system. Linear optocoupler HCNR201
takes an optical receiver circuit into the single-shot
mode, and eliminates the nonlinear DC circuit to lin-
ear isolation by the nonlinear feedback circuit.
A current sampling circuit uses CHF-300E Hall
sensor. The advantage of using Hall sensors is that
the Hall sensors do not need to be connected in
series in the process of current sampling. This non-
contact test characteristic can isolate the high and
low voltage circuits naturally. CHF-300E Hall sen-
sor has great linearity, measurement accuracy and
Figure 2. DSP control circuit basic structure. anti-interference ability.
676
Figure 4. Current sampling circuit.
677
the transformer flux density and f is the operating
frequency of the transformer.
678
Figure 9. Traditional EMI filter circuit simulation
Figure 8. Improved EMI filter circuit. model.
3 SIMULATION
679
increase of the differential-mode capacitance Cx, responding to the maximum insertion loss. That is, in
the insertion loss of the improved EMI filter circuit the high-frequency region, the insertion loss of the
is increased and the performance is lowered. improved EMI filter increases with the increase of
Figure 13 shows the effect of the common-mode the inductance L0 and the performance decreases.
capacitor Cy on the performance of the EMI filter
circuit. Simulation selects three differential-mode
capacitor values of 2,200 pF, 3,300 pF and 4,700 4 CONCLUSION
pF. As can be seen from the Figure, 4,700 pF corre-
sponding to the minimum resonant frequency, 3,300 This paper has the overall design to DSP-based
pF as the second, 2,200 pF corresponding to the high-frequency switching power supply system.
maximum resonant frequency. That is, with the com- It uses TMS320 LF2407 as the main control circuit
mon-mode capacitor Cy increasing, improved EMI controller, uses linear optocoupler HCNR201 to
filter circuit resonant frequency decreases. In addi- design voltage acquisition circuit and uses CHF-
tion, in the high-frequency region, 2,200 pF corre- 300E to design current acquisition circuit. High-
sponding to the minimum insertion loss, 3,300 pF as frequency transformer important parameters are
the second, 4,700 pF corresponding to the maximum selected. To improve the design of EMI filter circuit,
insertion loss. That is, in the high-frequency region, inductance is added to the upper and lower parts in
with the common-mode capacitance Cy increases, the differential-mode capacitor and the common-
the insertion loss of the improved EMI filter circuit mode capacitor connection part, while adding
is increased and the performance is decreased. inductance to the output of the upper and lower
Figure 14 shows the effect of the inductance L0 parts of common-mode capacitor, making the loss
on the performance of the EMI filter circuit. In the of electromagnetic interference of EMI filter circuit
simulation, three differential capacitance values of performance is greatly improved, thereby improving
0.03 mH, 0.36 mH and 0.72 mH are selected. As the effectiveness and reliability of the DSP-based
can be seen from the Figure, 0.72 mH correspond- high-frequency switching power supply system.
ing to the minimum resonant frequency, 0.36 mH
followed, and 0.03 mH corresponding to the maxi-
mum resonant frequency. That is, with the inductance REFERENCES
L0 increasing, improved EMI filter circuit resonant
frequency decreases. In addition, in the high-fre- Brown, M., Xu D. et al. (2004). Switching power supply
quency part, 0.03 mH corresponds to the minimum design guide (original version). Mechanical Industry
insertion loss, 0.36 mH followed, and 0.72 mH cor- Press.
Chen, Q., Zhang, Y., Lin, S. et al. (2014). Modeling and
simulation of conducted EMI for front-end power
supply. International Power Electronics and Application
Conference and Exposition, IEEE, (pp. 1358–1362).
Li, M., Qiu, Z., Wang, X., et al. (2012). EMC simulation
analysis of switching power supply for vehicle charg-
ing system. Electronic Science and Technology, 25 (7),
125–129.
Li, Min, Qiu, Zijing, Wang Xiaoming, etc. (2012). EMC
Simulation Analysis of Switching Power Supply for
Vehicle Charging System [J]. Electronic Science and
Technology, 25 (7): 125–129.
Salem, M., Hamouda, M. & Slama, J.B.H. (2014). Per-
Figure 13. The impact of common-mode capacitor Cy formance assessment of conventional modulation
on EMI filter circuit performance. schemes in terms of conducted EMI generated by
PWM inverters. First International Conference on
Green Energy ICGE, IEEE, (pp. 207–212).
Wu, T.L., Buesink, F. & Canavero, F. (2013). Overview of
signal integrity and EMC design technologies on PCB:
Fundamentals and latest progress. IEEE Transactions
on Electromagnetic Compatibility, 55(4), 624–638.
Yang, C.Y., Liu, Y.C., Tseng, P.J. et al. (2015). DSP-Based
interleaved buck power factor corrector with adaptive
slope compensation. IEEE Transactions on Industrial
Electronics, 62(8), 4665–4677.
Yang, Y. (2013). High frequency switching power supply elec-
tromagnetic compatibility. Electronic Quality, (5): 72–74.
Zhou, C., Li, C., Zhu, F. et al. (2004). Study on electro-
Figure 14. Effect of inductor L0 EMI filter circuit magnetic compatibility of switching power supply.
performance. Communications Power Technology, 21(2), 16–19.
680
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: This article highlights the function of MAC layer which works in the Endpoint mode, in
the Physical Layer based on the PCIe 2.0 protocol. After the study of the protocol, the forward design
and verification is adopted. Simulation was performed using NC which is the Cadence’s simulation tool,
to communicate with the peer device in the 500 MHz. Two channels are used for data transmission in the
design. The transmission rate is 5.0 G/second/lane/direction. In the end, we use SMIC 65 ns to synthesis.
According to the simulation results, it is confirmed that the design works properly and meets the protocol
requirements.
The bus is a path through where data is trans- PCIe enables interconnected devices to realize
ferred between different components of the com- high-speed, high-performance and point-to-point
puter. Using bus transmission can simplify the data transmission between devices. PCIe 2.0 pro-
system structure and facilitate the modular design tocol provides a single link single-channel data
between the systems. The bus technology can transmission rate of 5.0 GB/s (PCI-SIG P C I.
greatly enhance the performance of the computer. 2006), using package for data transmission. PCIe
With the development of computer hardware, 2.0 protocol uses a layered architecture, which is
bus technology has become the main bottleneck divided into Transaction Layer, Data Link Layer
restricting the improvement of computer perfor- and Physical Layer from top to bottom. The struc-
mance. According to the transmission mode, bus ture diagram is shown in Fig. 1.
technology can be divided into parallel transmis- The transaction layer is mainly used for generat-
sion and serial transmission. Parallel bus technol- ing outbound TLPs and receiving inbound TLPs.
ogy, which has the defects of ElectroMagnetic The primary function of the data link layer is to
Interference (EMI), large number of pins and
some others, is unable to meet the needs of high-
speed data transmission. So serial transmission has
gradually replaced the parallel transmission. High-
speed serial transmission uses differential mode for
data transmission, and it has a strong anti-interfer-
ence ability. Compared with the parallel transmis-
sion mode, the serial transmission uses less signal
lines. At present, the typical high-speed data bus
includes PCI Express, USB, and SATA and so on.
PCI Express is the third generation of high-
performance I/O bus, which is used to interconnect
peripherals such as computing and communica-
tions platforms. It is primarily used for intercon-
nection of peripheral I/O devices such as mobile
devices, desktops, workstations, servers, embedded
computing and communication platforms. PCIe
bus has inherited powerful functions of the second
generation, utilizing the new features of the com-
puter architecture (Budruk R, 2004). Figure 1. Layer of PCIe device.
681
ensure the integrity of the packets on the link. 2.1 LTSSM
The transmitter of physical layer is responsible
After the reset, the MAC establishes the link
for receiving data packets from the Data Link
through the Link Training And Status State
Layer and then transmitting to the link, while the
Machine (LTSSM). The LTSSM consists of
receiver is responsible for receiving packets from
11states and they can be divided into the fol-
the link and transmitting the packets to the Data
lowing five sections: Link training states, Link
Link Layer. The Physical Layer mainly completes
retraining states, power management states, active
the link establishment, scrambling/descrambling,
power management and other status. The states of
8b/10bencoding/decoding and serial/parallel con-
LTSSM are shown in Fig. 3 (Wang Qi. 2011).
version. Two sub layers, namely logic Physical Layer
The LTSSM is mainly responsible for the train-
and electrical Physical Layer, make up the Physical
ing and initialization of the link, working just after
Layer. In order to promote and regulate the devel-
the reset. The normal state of transmitting packet
opment of chips, the Intel specifically proposes the
is the L0 state. This process does not require soft-
PHY Interface for the PCI Express Architecture for
ware to participate in, as it is automatically initi-
IC designers. The PIPE standard provides a uni-
ated after reset. In the process of link training and
form reference for circuit interfaces of PCI Express
initialization, the following tasks are performed:
Physical Layer (Intel Corporation, 2008).
As is shown in Fig. 2, the PIPE standard fur- 1. Creating and setting the link width. The PCI
ther divides the Physical Layer into Media Access Express device supports up to 32 channels of
Layer (MAC), Physical Coding Sub layer (PCS), data transmission. The number of channels
and Physical Media Attachment sub layer (PMA). supported by the devices at both ends of the
The MAC is mainly used to initialize the link, byte link may be different. Therefore, the link chan-
striping/un-striping and byte scrambling/descram- nel negotiation needs to be performed. The
bling. 8b/10b encoding and decoding, elastic minimum link width is adopted to ensure that
buffer and receiver detection are included in PCS both ends of the device can transfer data.
module. PMA is mainly used for parallel to serial, 2. Channel inversion is performed in multi-chan-
clock recovery and PLL. PCS and PMA are digi- nel devices, if polarity inversion is required. So
tal analog hybrid circuits, usually called PHY. This that signal crossing can be avoided at the time
article focuses on the functions and the verification of connection.
implementation of the MAC layer. 3. Negotiating the data link rate. The transmission
In the whole architecture, the MAC connects the rate of the device is 2.5 GB/s at the beginning.
Data Link Layer and the PHY. It converts If higher data rates are available, they are adver-
the upper control signal into the control signal of tised during this process and, when the train-
the PHY, so as to establish the link and transmit the ing is completed, devices will automatically go
data. The MAC mainly implements the functions through a quick re-training to change to the
of link establishment, frame header add/delete, highest commonly supported rate.
byte striping/un-striping and data scrambling/ 4. Bit lock. When link training begins, the receiver’s
descrambling (Wilen A, 2003). clock is not synchronized with transmit clock of
Figure 2. Partitioning PHY layer for PCIe. Figure 3. The states of LTSSM.
682
incoming signal, and the receiver uses its CDR 4. When starting the transmission of a packet,
to recreate the clock by using the incoming the STP and SDP characters must be placed on
bit steam as a clock reference, this is called bit channel 0.
lock.
5. Symbol lock. The receiver doesn’t know where
2.3 Byte scrambling
the boundaries of the 10-bit symbol are, hence,
it searches for the COM Symbol to recognize The implementation of byte scrambling structure
the boundary of the symbol. is shown in Fig. 5. Byte scrambling is achieved by
a 16-bit Linear Feedback Shift Register (LFSR).
As is shown in Fig. 4, after the link is estab-
PCIe 2.0 agreement generates a random sequence
lished, the MAC can receive the TLP/DLLP pack-
LFSR. The polynomial used for LFSR calculation
ets transmitted from the Data Link Layer. It adds
has a coefficient expressed as 100 Bh.
STP or SDP to the frame header and adds END/
EDB to the frame trailer. It also sends ordered
sets to the multiplexer for transmission to the byte
3 MAC DESIGN
stripping. After scrambling, the packets will be sent
to the 8b/10b encoder through the PIPE interface.
This paper is based on PCIe 2.0 protocol endpoint
All packets are serial-to-parallel. After the serial to
model to design the MAC layer, using Verilog lan-
parallel conversion, the packets will be transmitted
guage (Thomas D, 2008) for forward design. Two
to the link. The process of receiving data packets is
channels are used for data transmission between
the reverse process of sending data packets.
the devices, and the transmission rate is5.0 G/sec-
ond/lane/direction of raw bandwidth. According
2.2 Byte stripping to the above functional description, MAC overall
design diagram is shown in Fig. 5:
The fundamental PCIe 2.0 agreement provides the
Os_build: Generating the data packets used in
rules of byte stripping. When there are multiple
the link training and initialization. The channel
channels in the link, packets need to be split. The
designed by this module is two channels, and each
multiplexer selects the packets to be transmitted
channel is initialized separately. The data bit width
and then passes them to the byte striping. After
of each channel is 8 bits, so the output bit width is
the byte stripping, they will be transmitted to the
16 bits. The link number and lane number of TS1
scrambler for scrambling. Byte stripping rules in
and TS2 packets sent from this module are set to
the protocol are as follows:
PAD, while Rate ID byte is set to 00 h (2.5 Gbps).
1. The total packet length of each packet (includ- If required, the processing is performed when the
ing the start and end characters) must be a mul- byte is split.
tiple of 4 characters. Os_div: In the link training and initialization
2. The TLP starts with STP and ends with the phase, 8 bits of data transmitted by the os_build
END/EDB character. module simultaneously transfer to both channels.
3. DLLP starts with SDP and ends with the END This module completes byte stripping of physi-
character. cal layer packet, and sets the corresponding data
packet transmission completion signal back to
LTSSM.
Timer_cnt: It is counting module, which starts
counting the time at the beginning of data transmis-
sion, to see if there is a timeout. If time is out, this
683
module will return the timeout signal to LTSSM to Idle_infer: The module is used for electrical
carry out the corresponding processing. idle inference. If the corresponding ordered set is
Dldata_div: This module strips the received not detected for a certain period of time, it can
TLP/DLLP. During byte stripping, it adds STP be deduced that the link has entered the electrical
and END/EDB if the received packet is TLP. It idle state. This module sets the corresponding sig-
also adds SDP and END if the packet is DLLP. nal to the LTSSM module for the corresponding
Byte_select: The module selects the packets to operation.
be sent based on the machine’s state. Pkg: This module is used to merge the TLP/
Scramble/descramble: This module scrambles/ DLLP packets from two channels. If the packet
descrambles the packets according to the polyno- is TLP, STP and END/EDB are removed. If the
mials required by the protocol. packet is DLLP, SDP and END are removed. All
Os_detect: This module mainly judges the type packets will be transmitted to Data Link Layer.
of the received ordered set, and sets the correspond-
ing flag to the os_analysis module. The module and
os_analysis module work together to determine 4 SIMULATION WAVEFORM
whether the received data meets the requirements.
This module only needs to determine whether the After completing the code, we use Cadence’s
received data packet is an ordered set or not. If it is simulation tools (Cadence Design Systems, 2008)
an ordered set, it also needs to determine the type for function testing to check whether it meets the
of the ordered set. design requirements. The test results are as follows:
Os_analysis: The module is used to analyze the After the reset, Fig. 6 shows that the peer device
received TS1, TS2 ordered sets. It analyzes 1–5 is detected. Besides, the timing waveform of the veri-
bytes in all 16 bytes, and determines the link num- fication structure is shown meeting the requirements
ber and lane number. In this module, MAC negoti- of the PIPE protocol. Fig. 7 is a partial screenshot
ates the transmission speed. of TS1 packets sent during link establishment.
684
Fig. 8 shows the process of sending TLP packets. SMIC 65 ns technology library to synthesis. The
After receiving packets from the Data Link Layer, design can work normally under the 500 MHz
the packet is split into two channels, and STP char- clock, and furthermore achieves the goal that is
acters on channel 0 and END/EDB characters on expected.
channel 1 are added respectively. In this example, the
Data Link Layer indicates that the packet is right, so
the END character is added to the end of the packet REFERENCES
in channel 1. From the verification results, the design
meets the protocol requirements. Budruk R, Anderson D, Shanley T. PCI express system
architecture [M]. Addison-Wesley Professional, 2004.
Cadence Design Systems, Inc., “NC-Verilog Simulation
5 CONCLUSION Help,” Product Version 8.2, Nov. 2008.
Intel Corporation. PHY Interface for the PCI Express
This paper introduces the design and implementa- Architecture, America: Intel Corporation, August, 2008.
tion of MAC sub layer in PCIe2.0 endpoint mode. PCI-SIG P C I. Express Base Specification Revision 2.0
Based on the design, the function simulation is car- [J]. 2006.
ried out. Two channels are used for data transmis- Thomas D, Moorby P. The Verilog® Hardware Descrip-
tion Language [M]. Springer Science & Business
sion in the design. The transmission rate is 5.0 G/ Media, 2008.
second/lane/direction. In this design, we use two Wilen A, Thornburg R, Schade J P. Introduction to PCI
channels to transmit packets, and the data width Express [M]. Intel, 2003. [5] Wang Qi. PCI Express
of single channel is 8 bits. Therefore, the clock architecture guide [M], 1st. Beijing: China machine
frequency is 500 MHz in our design. We also use press, 2011.
685
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
687
frequency tuning. For example, part of the loop For miniaturization of open-loop resonator,
perimeter may be left free. As shown in Fig. 1(d), we may define the following objective function to
part of loop perimeter is separated from fragment restrict open loop size
loading by a slot of width d, which can be left to
tune the resonant frequency by adjusting length l. f1 x ) = max ( L Lmax , 0 ) , (3)
688
5 EFFECTS OF FRAGMENT-LOADING loading with fragment density around 40% will
ON OPEN-LOOP RESONANT yield miniaturization of the open loop. It is also
PERFORMANCE noted that Q value approaches to that of stepped
impedance resonator for loading density larger
Fragment-type loading may affect the open-loop than 80%.
resonator in different ways. To demonstrate the
loading effects, we study the loading of an open
loop of a × b = 6.4 mm × 3.4 mm on 1.27 mm-thick 6 CONCLUSION
Arlon AD600 PCB of relative dielectric constant
of 6.15 and loss tangent of 0.003. Suppose the Loading with fragments provides great flexibility
loop has w = 0.2 mm and d = 0.1 mm in Fig. 1(d), and possibility to find the best performance of
design space within the open loop can be discre- open-loop resonator. With optimization search-
tized into 20 × 15 cells so that fragment cell has ing using MOEA/D-GO, open-loop resonator
dimensions of 0.3 mm × 0.2 mm. can be miniaturized by fragment-type loading.
When loaded by fragment distribution of dif- Other design concerns about parasitic reso-
ferent fragment densities, the open-loop resonator nant modes, quality factor, and loading density
will have different lowest resonant frequencies. may also be considered in the multi-objective
The lowest resonant frequencies for different optimization.
loading densities can be acquired by implement-
ing MOEA/D-GO optimization searching with
objective function f2(x) with f0 = 0 and objective ACKNOWLEDGMENTS
function f4(x) with several representative loading
densities. This work was supported in part by National Nat-
For each MOEA/D-GO searching, several ural Science Foundation of China under Grant
optimized fragment-loaded open-loop resonators 61272471 and 61671421.
can be obtained. Since MOEA/D-GO belongs
to stochastic optimization algorithm, it usually
yields several optimized solutions approaching REFERENCES
to Pareto-optimal set (D. W. Ding and G. Wang,
2013). By averaging the resonant frequencies for Ding, D. W. and G. Wang, MOEA/D-GO for fragmented
each density, we may obtain a characteristic reso- antenna design, Progr. Electromagn. Res. M, vol. 33,
nant frequency. pp. 1–15, 2013.
Fig. 2 shows the distribution of resonant fre- Ghatak, R., M. Pal, P. Sarkar and D. R. Poddar, Dual-
quencies and corresponding quality factors for band bandpass filter using integrated open loop resona-
open loop with optimized loading of different tors with embedded ground slots, Microw. Opt. Tech.
Lett., vol. 54, no. 9, pp. 2049–2052, Sept. 2012.
densities. Fitting curves to the distributed resonant Gorur, A. A novel dual-mode bandpass filter with wide
frequencies and Q values are also depicted. We find stopband using the properties of microstrip open-
that the lowest resonant frequency can be achieved loop resonator, IEEE Microw. Wireless Compon. Lett.
with loading density around 40%. In other words, vol. 12, no. 10, pp. 386–388, Oct. 2002.
Gorur, A., C. Karpuz, M. Akpinar, A reduced-size dual-
mode bandpass filter with capacitively loaded open-
loop arms, IEEE Microw. Wireless Compon. Lett.
vol. 13, no. 9, pp. 385–387, Sept. 2003.
Huang, X. G., Q. Y. Feng, Q. Y. Xiang, D. H. Jia, Constant
absolute bandwidth tunable filter using varactor-loaded
open-loop resonators, Microw. Opt. Tech. Lett., vol. 56,
no. 5, pp. 1178–1181, May. 2014.
Konpang, J., A compact diplexer using square open loop
with stepped impedance resonators, in IEEE Radio
Wireless Symp. Dig., Jan. 2009, pp. 91–94.
Konpang, J., L. Thongnoi, A compact four-poles cross-
coupled square open loop resonator diplexer, in Proc.
German Microw. Conf. (GeMIC), Mar. 2011, pp.1–4.
Kelly, J. R., P. S. Hall, and P. Gardner, Band-notched
UWB antenna incorporating a microstrip open-loop
resonator, IEEE Trans. Antennas Propag., vol. 59, no. 8,
pp. 3045–3048, Aug. 2011.
Figure 2. Frequency and Q change with density of Li, T., H. Q. Zhai, L. Li, C. H. Liang, and Y. F. Han,
optimized fragment loading. Compact UWB antenna with tunable band-notched
689
characteristic based on microstrip open-loop resona- Zhang, X. Y., J. X. Chen, Q. Xue, Compact bandpass fil-
tor, IEEE Antennas Wireless Propag, Lett., vol. 11, ter using open-loop resonators with capacitive loading,
pp. 1584–1587, 2012. Microw. Opt. Tech. Lett., vol. 49, no. 1, pp. 83–84, Jan.
Ma, X. B., H. X. Zheng, Compact wideband bandpass fil- 2007.
ter using two open loop resonators, Wiley Microw. Opt. Zhu, L. and B. C. Tan, Miniaturized dual-mode bandpass
Tech. Lett., vol 55, no. 4, pp. 915–917, Apr. 2013. filter using inductively loaded cross-slotted patch reso-
Maharjan, R. K. and N. Y. Kim, Miniature stubs-loaded nator, IEEE Microw. Wireless Compon. Lett. vol.15,
square open-loop bandpass filter with asymmetri- no.1, pp.22–24, Jan. 2005.
cal feeders, Microw. Opt. Tech. Lett., vol. 55, no. 2, Zhao, Q., G. Wang, D. Ding, Compact microstrip band-
pp. 329–332, Feb. 2013. pass filter with fragment-loaded resonators, Microw.
Mondal, P. and M. K. Mandal, Design of dual-band Opt. Tech. Lett. vol. 56, no. 12, pp. 2896–2899, Dec.
bandpass filters using stub-loaded open-loop resona- 2014.
tors, IEEE Trans. Microw. Theory Tech., vol. 56, no. 1,
pp. 150–155, 2008.
690
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: Typical power electronics has become a fundamental technology of power transformation
in modern engineering. Researches on topology of power converter and related analogue circuit controlling
strategy are difficult to be novel. On the other hand, research into new power semiconductor devices
thrives and demand for higher power density leads to integrated circuits, which means controlling circuits
and power device modules are integrated on the same semiconductor chip, and inventions on new circuit
topology for higher-frequency switches. For converter controller parts, the core part of a main circuit, digi-
tal controlling platform and technology tends to replace the traditional analogous control model. This arti-
cle introduces a real-time embedded system and applies into a boost circuit to realise DC-DC conversion.
691
dispatch, synchronisation and communication. k (VOUT
V − VIN
I ) 2
There are four main threads in DSP/BIOS ker- D= = k (2)
nel: IDL, TSK, SWI, HWI. Application starts VIN
I 3
from default point_c_int00 and runs in the flows
below: 2×L
K= (3)
R Ts
1. System initialisation, defined by term system in
BIOS configuration, including register set and
PLL double frequency clock. k D1 + D2
D D2 (4)
2. Call user’s main () function. VOUT = 1 × VIN
I
3. Call BIOS_start, execute HWI, SWI, and tasks D2
in priority.
4. If there is no thread executed (no HWI or SWI), D D1
the application goes into IDL_F_loop to exe- (VOUT − VIN
I )
cute IDL thread. = × (D
( D1 D2 )
5. If HWI comes, cpu deals with it immediately. VIN
I
k (VOUT
V − VIN
I )
When it finishes, if there is no SWI or tasks, cpu = (5)
returns to IDL. VIN
I
692
tonRead () to checks whether the button is on. If
yes, it sends signal & StartButtonAction_SEM,
which will start StartButton Action_TSK ().
12. Task StartButtonAction_TSK () checks the
button again. If it is still closed, it enables
EPWM module to drive TLP250.
693
6 CONCLUSION
REFERENCES
Figure 8. VOUT = 15 V.
694
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Jiayun Xu
School of Electrical Engineering, Zhengzhou University, Zhengzhou, China
Xiaoming Wang
State Grid Zhejiang Haining Power Company, Haining, China
Kewen Wang
School of Electrical Engineering, Zhengzhou University, Zhengzhou, China
Congmei Zha
School of Electronic and Information Engineering, Zhongyuan University of Technology, Zhengzhou, China
Keywords: Particle swarm optimisation; Reactive power optimisation; Power system; Small-signal
stability; Parameters optimisation
695
the eigenvalues of system are calculated in (Sun optimisation. ξ0 is the minimum damping ratio
Yuanzhang, 2005), and the minimum damping of electromechanical mode. When the electro-
ratio of system electromechanical oscillation mode mechanical oscillation mode eigenvalue satisfies
is used as the small-signal stability index which is the following formulas, it indicates that small-sig-
linearized in optimisation. The objective function nal stability is enhanced.
obtained by the above methods is the minimum
cost of total power generation, which satisfies α ≤ α0 d ξ ξ0 (3)
the optimal power flow with small-signal stability
constraints.
In this paper, small-signal stability optimisa- where α is the maximum real part of the electro-
tion in systems is considered in optimising reactive mechanical mode eigenvalue after reactive power
power. The objective function of optimisation is optimisation; ξ is the minimum damping ratio of
composed of the network loss index and small- electromechanical mode.
signal stability index. At the same time, the
small-signal stability constraints are added to the
constraint conditions to ensure the small-signal 3 REACTIVE POWER OPTIMISATION
stability of the optimised system. The participa- MODEL WITH SMALL-SIGNAL
tion degree of small-signal stability in the objective STABILITY
can be adjusted by altering the weight coefficient
in objective function. Examples show that the The goal of this paper is to minimise active power
improved PSO algorithm can effectively solve the loss. Variable constraints for bus voltages and
optimisation problem, and the reactive power opti- reactive powers are given in penalty function
misation method can provide safe, economical, form. Equation constraints are nodal power bal-
and stabile system operation condition. ance equations, and the controlled variables are
composed of the adjustable transformers taps,
compensating capacitor and generator terminal
2 SMALL-SIGNAL STABILITY voltages. The objective functions and relevant vari-
ANALYSIS METHOD able constraints are listed as:
eliminated, the following state space equations of s.t.PGi PLi − U i ∑ U j (Gij c θ ij Bij sin
sii iij )=0
system are obtained: j Ni
where A is state matrix. All the eigenvalue are given QGi ,min QGGi ≤ QGi ,max i ∈ NG
by QR algorithm. QCi ,min QCCi ≤ QCi ,max i ∈ NC
Damping ratio gives an index to dynamic
performance of system, and the damping ratio of where λVn λQn are penalty factors; NE, NPQ, NG,
conjugate complex eigenvalue λ = α + jβ is: NL, NT and NB are branch set, PQ node set, PV
generator node set, compensating capacitor node
ξ α α β2 (2) set, transformer branch set and general node set;
gk is the conductance of branch k; Ui the voltage
Before reactive power optimisation, all eigen- of node i; θij the voltage angle difference between
values of system are solved, small-signal stability node i and j; Gij, Bij are coefficients of nodal admit-
index are formed by the maximum of real parts of tance; QGi is the reactive power of generators; Ti is
eigenvalues and the minimum of damping ratios the transformation tap of the transformers; QCi is
in electromechanical modes. α0 is the maximum the reactive power compensation of the capacitors.
of real parts of eigenvalues before reactive power Ti and QGi are discrete variables which are properly
696
disposed when being solved. Un,lim, Qn,lim are given and the weight coefficient in small-signal stability
as: optimisation. When ω1 = 0 and ω2 ≠ 0, the result of
optimisation shows that the system losses are lower
⎧U n, U n,min
min ; U n U n,min and the small-signal stability is enhanced.
⎪
⎨U n, U n ; U n, U n < U n,max
⎪⎩U n, U n,m
, ax ; U n U n,max 4 REALISATION OF PSO ALGORITHM
(6)
⎧Qn,lim Qn,min
min ; Qn Qn,min PSO, put up forward by Kenmedy and Eberhart
⎪ , lim at 1995, is a kind of swarm intelligence stochastic
⎨Qn,lim
, lim Qn ; Qn,min < Q < Q , max
⎪⎩Qn,lim optimisation algorithm. Compared with the evolu-
, lim = Qn ,max
max ; Qn > Qn ,max
tionary algorithms, the PSO algorithm retains the
population-based global searching strategy. At the
where Un, max, Un, lim are the upper limit and lower same time, the PSO algorithm is able to memory the
limit of nodal voltage; Qn, max, Qn, lim are the upper best position of the particles (Wang Ling, 2008).
limit and lower limit of reactive power of genera- In this paper, we use the improved PSO algo-
tors or compensating capacitors. rithm. Suppose that at t time, the i-th particle
When small-signal stability constraints are location of n dimension search space is Xi = [xi1,
considered, the optimised small-signal stability xi2, …, xin], with speed Vi = [vi1, vi2, …, vin]. First cal-
is not expected to be reduced; it means that the culate the objective function of the particles, and
eigenvalue of electromechanical oscillation mode determine the best position Li = [li1, li2, …, lin] of
should satisfy Equation 3. The controlled variable each particle and best position Lp reached by the
of small-signal stability optimisation is the same as swarm. Then use the following equations to update
that of reactive power optimisation. The objective each particle’s speed and position:
function and constraint condition are listed as:
t +1
u ⋅ vijt + c1r1 (lijt − xijt ) + c2 r2 (l pjt − x pjt )
⎧1 − fdt ⋅ α ≤ α 0 d ξ ≥ ξ0
ij
697
Initialise: Set the maximum iterations number Table 1. The comparison of the optimisation result of
D, then assume that there are M + N particles in 9-bus system when the weight coefficient is different.
the particle swarm (M > N), consider the variables
of each particle with random value within the Comparative ω1 = 0.0 ω1 = 1.0 ω1 = 1.0
item ω2 = 0.1 ω2 = 0.0 ω2 = 0.1
value range, and initialise the speed and position
of each particle. Ploss/pu 0.05057 0.03951 0.03953
Evolution: Renew particle velocity and position, ηsave/% −26.17 1.42 1.37
according to the iterative formula. td 75 80 75
Sorting: Calculate the fitness of each particle,
then sort the particles. If there is an individual that
evolves to the target solution, it goes to (6), or (4).
Screening: The former M particles with higher The optimisation result of network loss Ploss,
fitness will directly enter into the next iteration, loss descent rate ηsave and iterative times td is shown
while the latter N particles with lower fitness will in Table 1. The optimisation result of electrome-
be reinitialszed. chanical oscillation mode eigenvalue is shown in
Update information: Calculate the fitness Form 2.
of the N particles after being reinitialised, then
renew the position of swarm. If no individuals ηsave = ( Plloss 0
Plloss 0
) / Plloss
)/ (10)
evolve to the target solution or iterative times is
less than D, it goes to (2), or (6). where, Plo0ss is the network loss before reactive
Output: If the optimisation is successful, output power optimisation, and Ploss is the network loss
the particle information that satisfy the require- after reactive power optimisation.
ments, otherwise output the information for opti- The change of steady state loss index of sys-
misation failure. tem is shown in Form 1 for different optimisation
schemes. When ω1 = 0.0 and ω2 = 0.1, the optimi-
sation objective is to enhance small-signal stabil-
5 EXAMPLES
ity without considering the loss of system, and the
loss after optimisation is larger; when ω1 = 1.0 and
Examples used in this paper are IEEE 3-genera-
ω2 = 0.0, the optimisation objective is to decrease
tor 9-bus system and IEEE 8-generator 24-bus
the loss of system without considering small-sig-
system, and the information such as system wiring
nal stability, and the loss after optimisation is the
diagram shows in (Tse T, 2010; Qiu Lei, 2011). In
smallest; when ω1 = 1.0 and ω2 = 0.1, the objective
the example, the adjustable range of transformer
of the optimisation is mainly to decrease the loss
ratio is 0.9∼1.1 and the step length of adjustment is
of system and slightly enhance small-signal stabil-
0.025; There are ten compensating capacitor sets,
ity, andhe loss after optimisation will decrease less.
and the magnitude of node voltage is 0.9∼1.1. Rel-
The change of electromechanical oscillation
evant power data is expressed in per unit value, and
mode eigenvalue of system is shown in Table 2 for
benchmark capacity is 100 MVA.
different optimisation schemes. When ω1 = 0.0 and
The procedure of setting the related parameters
ω2 = 0.1, the optimisation objective is to enhance
in the PSO algorithm is as: D = 100, M = 30, N = 10.
small-signal stability without considering the loss
Adjust the parameters ω1 and ω2, then the propor-
of system, and the minimum damping ratio of
tion of that decreasing network loss and enhancing
electromechanical oscillation mode after optimisa-
the system small-signal stability in the optimisation
tion will decrease most; when ω1 = 1.0 and ω2 = 0.0,
results is changed. Since using Power System Stabi-
the optimisation objective is to decrease the loss
lizer (PSS) (Fu Hong-jun, 2013) is the main means
of system without considering small-signal stabil-
of improving the system small-signal stability, the
ity, and because it includes small-signal stability
system is at the risk of low frequency oscillation.
constraints, the small-signal stability of system
No matter adjusted, the system small-signal stabil-
changes little after optimisation. When ω1 = 1.0
ity may not be effectively improved only by reduc-
and ω2 = 0.1, the optimisation objective is mainly
ing the controlled quantity of network loss.
to decrease the loss of system and slightly enhance
1. The example of 9-bus system: small-signal stability, and the maximum real part
All the active power generation of the 9-bus of electromechanical mode eigenvalue after opti-
system reactive before power optimisation is misation is between those in former two schemes.
PGT = 3.65234, and the total loss Ploss = 0.04008. 2. The example of 24-bus system:
There are two electromechanical oscillation modes All the active power generation of the 9-bus
for the system, the minimum damping ratio system reactive before power optimisation is
ξ0 = 0.12249: the maximum real part of eigenvalue PGT = 27.79403, and the total loss Ploss = 0.35882.
α0 = −1.11875. There are two electromechanical oscillation modes
698
Table 2. The eigenvalue of electromechanical mode in 9-bus system when the weight coefficient is different.
Table 3. The comparison of the optimisation result of 24-bus system when the weight coefficient is different.
Table 4. The electromechanical oscillation mode eigenvalue of 24-bus system when the weight coefficient is different.
699
Li, Y., Zhang, L. & Yang, Y. (2001). Reactive power opti- probabilistic approach. IEE Proceedings - Generation,
mization under voltage constraints margin. Proceed- Transmission and Distribution, 147(2), 69–75.
ings of the CSEE, 21(9), 796–801. Wang, L. & Li, B. (2008). Particle swarm and scheduling
Liu, H., Ge, S. & Li, H. (2009). Reactive power optimiza- algorithm. Tsinghua University Press (pp. 1–10).
tion based on improved particle swarm optimization Zhang, A., Yang, H., He, X. & Yang, K. (2010). Paral-
algorithm with hard restriction regulation. Journal of lel computing model for coordinated reactive power
Tianjin University, 42(9), 31–35. optimization considering load changing. Power Sys-
Luo, Y. & Duo, J. (2013) Multi-objective reactive power tem Protection and Control, 38(18), 13–18.
optimization based on quantum immune colonial Zhao, B. & Cao Y. (2005). A multi-agent particle swarm
algorithm. Electric Power Automation Equipment, optimization algorithm for reactive power optimiza-
33(9), 31–35. tion. Proceedings of the CSEE, 25(5), 1–7.
Qiu, L., Wang, K. & Li, K. K. (2011). Construction Zhao, L. & Lu, J. (2010). Multi-objective power optimi-
design and parameter coordination of multi-band zation of wind farm based on improved genetic algo-
PSS. Power System Protection and Control, 39(5), rithm. Electric Power Automation Equipment, 30(10),
102–107. 84–88.
Ruan, R., He, B., Kong, D. & Chen, L. (2010) Research Zhong, Z., Xie, H. & Wang, K. (2000). A novel modeling
on tournament-based ant colony algorithm for reac- technique for modern power system dynamic studies
tive power optimization. Power System Protection and Proceedings of the CSEE, 20(3), 30–33.
Control, 38(12), 80–85. Zhou, X-J., Jiang, W-H. & Ma Li-li (2010). Reac-
Sun, Y., Yang, X. & Wang, H. (2005). Optimal power tive power optimization of power system based on
flow with transient stability constraints in power sys- improved genetic algorithm. Power System Protection
tems. Automation of Electric Power Systems, 29(16), and Control, 38(7), 37–41.
56–59.
Tse, T., Wang, K. W. & Chung, C. Y. (2000). Parameter
optimization of robust power system stabilizers by
700
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: This paper has designed drive circuits for beacon laser, mainly including the temperature
control module and the power control module. In the temperature part, the nonlinear correction of
thermistor, PID control compensation for ADN8830 and the output peripheral circuit are given. In the
power part, the circuit for photocurrent detection and comparison is designed, and the power remains
stable through an AVR single chip microcomputer which changes the intensity of the constant current
source output. Also, the output power is tuneable through the digital potentiometer X9221. Stable output
power, makes power is adjustable within the range indicator. This design can provide a temperature
control precision of 0.02°C, and output power stability of about 0.25% – stable and tuneable.
701
2.2 Nonlinear correction of thermistor
The relation between the value of thermal and tem-
perature is not absolutely linear, which causes the
bridge resistance circuit to also be unbalanced. To
solve the nonlinear problem, here we adopt a way of
linear compensation to achieve the largest linearisa-
tion output. The specific method is to put an ordi-
nary resistance Rr and the thermistor RT in parallel.
When the value of resistance Rr equals the value of
NTC resistance corresponding to the setting tem-
Figure 3. The relationship between output voltage and
perature, then the output is largely linear in the tem-
resistance.
perature range. The equation is given as follows:
We should adjust the parameters of the controller
⎛ Rr ( RT + ΔRT ) ⎞ according to the relationship between the perfor-
⎜ Rr RT + ΔRT R3 ⎟ mance of dynamic-state and steady-state. The math-
U DB ΔU DB = VCC ⎜ − ⎟ (1) ematical model of PID controller is:
⎜ R1 + Rr ( RT + ΔRT ) R2 + R3 ⎟
⎝ Rr RT + ΔRT ⎠
⎡ 1 t de(t ) ⎤
u(t ) = K P ⎢e(t ) +
⎣ TI ∫ e(t )ddt + T
0
D ⋅
dt ⎥⎦
(2)
When the temperature is at 25°C, thermistor
resistance is approximately 10 kΩ, obtained by
experiment. We should therefore choose a resistor The corresponding transfer function is:
Rr = 10 kΩ and in parallel with RT, and then make
R2 = R3 = 10 kΩ. We can get UB = 2.5 V. When tem- U (s ) ⎡ 1 ⎤
G (s ) = = K P ⎢1 + + TD s ⎥ (3)
perature is 21°C, thermistor corresponding about 12 E (s ) ⎣ TI s ⎦
kΩ, then make R1 = (10 × 12)/(10 + 12) ≈ 5.45 kΩ.
Now the corresponding output voltage UDB = 0.
This paper is based on temperature of 25°C, with where KP is proportional coefficient; TI is integral
the voltage of UDB as the initial voltage. The resist- time constant; TD is differential time constant.
ance bridge circuit revised is shown in Figure 2. Adjust the control parameters through Matlab
From experimental test we obtain the curve simulation, to realise LD temperature control.
shown as Figure 3. The relationship between out- ADN8830 integrates low-noise amplifier which
put voltage UDB and resistance is nearly linear, consists of PID compensation circuit with periph-
which means that the output voltage and tempera- eral circuit among the TEMPCTL pin, COMPFB
ture of the resistance bridge circuit revised have a pin and COMPOUT pin, as shown in Figure 4.
linear relationship. R1 and R3 control proportion coefficient, C1 and
R3 control integral time constant, C2 and R1 con-
trol differential time constant, CF can increase the
2.3 PID control compensation stability of the compensation circuit. Adjust the
PID is a linear controller, consisting of three control component parameters to get satisfactory con-
variables Proportional (P), Integral (I) and Differen- trol effect, and choose R1 = 100 kΩ; R2 = 1 MΩ;
tial (D) (Zhu Hongbin et al., 2009). It is a common R3 = 205 kΩ; C1 = 10 μF; C2 = 1 μF; CF = 330 pF.
feedback loop in industrial control applications. The
PID controller parameter setting is the core content 2.4 Peripheral circuit design
of TEC temperature control system design. Differ-
ent PID controller parameters can realise different ADN8830 using the way of differential output
response speed and temperature stability of TEC. drives TEC. In order to provide the required cur-
rent of TEC cooling, an H-bridge circuit is designed
outside of ADN8830, as shown in Figure 5.
The pins of P1, P2, N1, N2, OUTA and OUTB
respectively connect to the pins of P1, P2, N1, and
N2, OUTA and OUTB of ADN8830. TEC driving
mode uses asymmetric output, which can not only
reduce the ripple effect, but also improve the effi-
ciency of power source. P1 and N1 drive periph-
eral PMOS and NMOS working in switch mode
in the way of PWM output, while P2 and N2 drive
Figure 2. The resistance bridge circuit revised. peripheral PMOS and NMOS in a linear way.
702
Figure 6. Schematic of power control.
703
3.3 Constant current source circuit
The output of digital potentiometer X9221 is con-
trolled by AVR controller. X9221 is connected
with K, G end of the constant current source
DHM903. The circuit connection diagram is
shown in Figure 8. Therefore if we adjust the value
of digital potentiometer, the output current size
of DHM903 will change, and the output power
of LD will also change. They basically meet linear
relationship. Finally, the power can realise a stable
and adjustable output.
704
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Yu Feng
School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, China
ABSTRACT: At present, with the continuous improvement in distributed energy utilisation technol-
ogy and people’s awareness of energy saving and environmental protection, this paper presents a design
scheme of an intelligent garbage bin combined with solar street light, and gives the principle of the com-
bination of solar street lamp and intelligent garbage can. The design scheme for intelligent trash, includes
garbage box cover automatic switching function, automatic voice prompt function, automatic garbage
compression, garbage trunkful detection function and dynamic information acquisition and transmis-
sion function. The three principles of the combination of the trash can and the street lamp are: minimise
the impact of their own original functions; in line with the surrounding landscape features; use modular
design with free separation from each other.
Keywords: Solar energy; Street lamp; Intelligent trash can; ZigBee; Energy saving
705
automatic turning cover, automatic compression,
voice prompt, garbage trunkful detection function,
dynamic collection and transfer function of infor-
mation in the area.
For the dustbin cover automatic switching func-
tion, this paper describes a control starting circuit
switch through the infrared induction system, which
causes the transmission mechanism to automatically
flip. When people leave, with the help of the delay
circuit, the trash can automatically close the cover.
For automatic compression function, the compres-
sion mechanism is used to compress the garbage.
For the voice prompt function, first with the pro- Figure 1. Schematic diagram of the infrared sensor
gramming module entry into the memory, and circuit.
then in the process of running through the speaker
to achieve voice functions. The trunkful detection
function is implemented through the pressure sen-
sor. When garbage is compressed, if the measured
force acting on the pressure sensor reaches the max-
imum value set previously, the sensor will pressure
signals to SCM, and then trash flip mechanism to
stop the operation (Qiang Zhou, 2016).
Finally, we consider the function of the dynamic
acquisition and transmission of the information.
It is achieved with the help of ZigBee technology. Figure 2. Trash liner structure.
ZigBee is a new kind of wireless communication
technology, which has the characteristics of close
range, low difficulty, low cost, low power con- automatically closes the cover, it drives the com-
sumption and low speed. It is based on the wireless pression mechanism to compress the garbage. At
protocol of standard IEEE802.15.4, and can real- the same time, due to the fact that the garbage bag
ise two-way communication by the mutual coordi- is not easily separated from the tank of trash, an
nation between the wireless sensors. Through the adjustable capacity trash liner has been designed
use of ZigBee wireless sensor network technology, to solve the problem.
and using a series of sensors and chips to design The following illustrates the adjustable capac-
the circuit, we can produce a smart garbage can ity trash liner. Due to the squeeze pressure, the
(Wang, 2012; Hai Ma, 2010). original loose garbage moves close together, lead-
ing to relatively large attraction between the mol-
ecules; hence it is not easy to take the trash bag
4 METHOD FOR REALISING from the trash. Therefore, the structure of the
INTELLIGENT GARBAGE CAN screw nut is used to fix the nut and the movable
baffle plate around the barrel wall, and the vol-
4.1 Function of automatic opening and closing ume of the garbage bin can be varied. When the
cover for garbage box garbage can has been filled, and the rubbish needs
to be taken out of the trash can, we can rotate
After access to information, we use thermal infra- the bolt and change the trash volume slightly, so
red sensors to achieve garbage automatic flip func- that the garbage bag and the liner can be easily
tion (Huabin Wang, 2012). separated (Zhao, 2012). The trash liner structure
The principle is as follows: when people get is shown in Figure 2.
close to the trash to throw rubbish, the thermal
infrared human body sensor can feel the people
around, triggering the CC2430 chip and CC2430 4.3 Voice prompt function
chip, and the I/O port will drive the motor. The For the voice prompt module, this paper suggests
thermal infrared sensor induction principle is using SYN6288 voice chip to achieve the conver-
shown in Figure 1. sion of text to speech.
706
ule. First, for the weight monitoring module, this through the serial port or through the network
paper recommends the use of the TYC901 weight to achieve remote data transmission. Then the
sensor. However, because the signal transmitted relevant departments can develop a simple data
by the weight sensor is generally weak, it needs management centre software through the data-
the signal to use a differential amplification circuit base technology. After receiving the data from the
to amplify the weight sensor. Then, the volume sensor network, the data centre is capable of com-
monitoring module. In this paper, the idea is to pleting the analysis and storage of the data (Hai
use the laser sensor and photosensitive resistance. Ma, 2010). After the data are processed by com-
The components of the laser sensor consist of a puter, the information platform will launch real-
laser, a laser detector, and a measuring circuit. By time information to the sanitation workers. With
detecting the voltage of the photosensitive resist- the help of this information, the sanitation work-
ance, and combining with the weight of the trash ers can decide which trash needs cleaning up, and
can, we can determine whether the trash can is full. which does not need cleaning up, eliminating the
The circuit schematic diagram of the laser sensor trouble of performing a daily patrol and improv-
and the photosensitive resistance are shown in ing efficiency.
Figures 3 and 4 respectively.
Figure 4. Circuit schematic diagram of photosensitive Figure 5. Schematic diagram of the combination of
resistance. solar street lamp and intelligent garbage can.
707
6 CONCLUSION graduate students, Beijing City, Changping District
Huilongguan Beinong Road No. 2 North China
It is an effective way of energy use to combine the Electric Power University, 10220618811362511,
intelligent garbage can with the solar street lamps, fengyuhm@163.com
which can promote the progress of the social life.
If the battery supplies energy for the solar street
lights and the trash can at the same time, it not REFERENCES
only makes full use of solar energy, but also saves
the cost of laying out the power grid for the trash Ma, H. (2010). Design and implementation of remote
can and reduces the operation cost; on the other data monitoring based on ZigBee wireless sensor
hand, it may also save city trash and street lamp network (masters dissertation). Wuhan University of
layout area. Furthermore, through the ZigBee Technology, China, 1–14.
wireless communication technology, it can help Wang, H., Luo, Z., & Zeng, S. et al. (2012). Design of
intelligent environmental sanitation garbage bin based
improve the efficiency of street cleaning for clean- on ZigBee. Computing Technology and Automation,
ers, improve the efficiency of garbage disposal, 31(1), 48–50.
and improve the efficiency of the urban operation. Yin Liu, Linlin Li, & Tang, J. (2014). Analysis on appli-
Therefore, this research is of value, and the intel- cation mode of solar street lighting in urban lighting.
ligent garbage can combined with the solar street Zhao Ming Gong Cheng Xue Bao, 25(5), 65–66.
lamp has excellent development prospects. Zhao, T., & Wang, H. (2012). Garbage can which auto-
matically compress garbage. China Science and Tech-
nology Information, 12, 170–171.
ACKNOWLEDGEMENTS Zhou, Q., Feng, G., Lin, L. et al. (2016). The design of a
self-flip compressible multi-function intelligent trash.
New Product Development, 43(5), 51–53.
This project was supported by North China Elec- Zicheng Luo, Min Tang, & Jun Xu. (2013). Study on a
tric Power University students’ innovation and new type of energy saving and environmental protec-
entrepreneurship training programmes (2016193). tion solar lighting type luminous garbage bin. Theo-
Author: Yu Feng (1996 -), male, Jiangsu Xuzhou, retical Research, 12(1), 95–96.
North China Electric Power University, under-
708
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Jianjun Xu, Lin Huang, Lianwei Zhang, Yina Zhou, Limei Yan & Hongyu Li
Department of Electrical Information Engineering, Northeast Petroleum University, Daqing, China
ABSTRACT: The control core of the doubly fed wind generation system is the dual PWM converter.
Traditionally, the control method is used with the Proportional Integral (PI) controller. With the increase
of wind turbine installed capacity, the system requirements for control precision and stability are higher.
It is difficult to ensure that the PI control method can meet with control requirements in the case of an
unbalanced power system. This paper adopts the method of Proportional Resonant (PR). The PR con-
troller makes sure that the system’s output is without static error. This method can also guarantee active
power and reactive power of rotor side decoupling control at the same time, eliminating the coupling and
feed-forward compensation to reduce the times of coordinate changes. This can reduce the influence of
grid frequency deviation of the converter output inductor current, thus effectively improving the precision
of the control algorithm and the electric energy’s quality. The feasibility and correctness of the theory are
verified by simulation experiment and result analysis.
Keywords: Double fed motor; Double PWM converter; PR controller; Power decoupling
s Khs
GPR ( s ) = K b 2K j (1) Gh ( s ) = (3)
s +ω2
2
s 2
( h ⋅ )2
Compared with the PI controller, the PR con-
troller can achieve zero steady state error, and has
good anti-interference ability. However, there are 2 POWER GRID SIDE PR CONTROL
the following problems in practice. In the circuit SYSTEM
simulation data and components of precision lim-
ited, due to the large amount of computation the 2.1 Establishment of mathematical model
control algorithm cannot achieve real-time con-
trol; when there is power grid frequency fluctua- Adopting controllable switch IGBT to control the
tion, it cannot effectively suppress the harmonic power device of a power grid system can reduce
(Chen Wei, 2014; Ekanayake J. B. & Holdsworth harmonics of the system. Because of the high
L., 2003; Jin Yuanyuan, 2014). Therefore, with the speed of the IGBT switch, low switching loss and
advantages of PR control, the optimised PR con- large working range, the network side converter
trol method is proposed. The transfer function is: can realise its function better. The converter of
the rotor side can be seen as a circuit load, and
the main circuit structure of the network side con-
ωcs
G (s) = Kb 2K j (2) verter is obtained, as shown in Figure 1.
s + 2ω s + ω 2
2
When we are modelling, the electric potential
of the power network is symmetrical, and the net
The wind power generation system’s units are side filter inductance is not linear and saturated.
becoming bigger. There is an urgent demand for Thus, in order to better express the logic value of
improvement in the power grid’s quality. Interference the power switch, when the S value is 1, the lower
709
Figure 1. Main circuit structure of network side
converter.
bridge arm is closed and the upper bridge arm is Figure 2. PI controller of the network side converter.
opened; when the S value is 0, the lower bridge
arm is opened and the upper bridge arm is closed.
According to Kirchhoff’s voltage law, we can get
(Morren J. & de Haan S. W. H., 2005; Teodorescu
R. & Blaabjerg F., 2006; Xu Le, 2015):
diia
L
dt
+ Riia = ua (udcSa uNC ) (4)
⎧ diia
⎪ua Ria L dt − Sa udc Figure 3. PI controller of the network side converter.
⎪ dii
⎪= ub Rib L b − Sa udc obtained after the reference current and through
⎪ dt
⎨ dii
(5) coordinate transformation to obtain the values
⎪= uc Ric L c − Sc udc in two-phase stationary coordinates. The system
⎪ dt choose comparison of the current PR as control
⎪ dudc
c
⎪⎩ dt = ic iL = Sa ia + Sb ib + Sc ic − iL
input and the output of PR controller as the input
voltage SVPWM. SVPWM modulation is used to
switch signal in order to control the main circuit
In the formula, ua,ub,uc is three-phase voltage of the converter. In this way we realise the network
source; ia,ib,ic is three-phase input current; iL is load control strategy side converter.
current; ic is output current; udc is output voltage
of DC side. In the system, the sum of three-phase
current is zero and three-phase voltage is basic bal- 3 PR CONTROL SYSTEM OF ROTER SIDE
anced, so we can get:
3.1 Basic structure and function of
{ia ib + ic = 0
ua + ub + uc = 0
(6) rotor side converter
The rotor side converter is the hub of the doubly
fed induction motor grid side and, and converter.
The control of the wind power generation system
2.2 Control strategy
is achieved by the rotor side converter. Through the
The control strategy of the dual PWM converter rotor side PWM converter, we can control the dou-
system’s grid side is mainly to get good input char- bly fed asynchronous motor conversion of wind
acteristics, to maintain the stable output voltage energy utilisation and energy. The structure of
of DC side, and to ensure that the input power the inverter circuit is similar, but the implementa-
factor is close to 1. The traditional control system tion is a two-way energy flow. The circuit is shown
adopts PI control mode. The structure is shown in Figure 4.
in Figure 2. In the circuit, the power is divided into active
It can be concluded from Figure 3 that three- power, reactive power and apparent power, which
phase AC current in the grid side can be obtained needs to be kept close to the unit power factor.
by the coordinate transformation. Given the The main function of the rotor side converter is
feedback voltage and the voltage comparison is to achieve the decoupling of active power and
710
Figure 4. Structure of rotor side converter. Figure 5. Control block diagram of PR control strategy.
711
but always work in 50 Hz and output waveform is
always stable. This confirms that the system can
realise variable speed with constant frequency.
When the active power is under disturbance, the
stator current response speed is fast, and the stator
current reactive power is without disturbance. Tthe
realisation process of active power and reactive
power decoupling control, and ensure unit power
factor operation system.
ACKNOWLEDGMENT
Figure 6. Voltage and input current waveforms of the
grid side under the control of PR. This work is supported by PetroChina Innovation
Foundation (2016D-5007-0201).
This work is supported by 2015 Heilongjiang
Province degree and graduate education reform
research project [No.JGXM_HLJ_2015107]: “the
research on the cultivation system of innovation
ability of graduate students of electrical engineer-
ing degree”. Corresponding Author is Yan Limei.
This work is supported by the graduate stu-
dents’ innovative research fund of Northeast
Figure 7. DC bus voltage under PI control strategy.
Petroleum University (YJSCX2015–029 NEPU &
YJSCX2016–027 NEPU).
REFERENCES
712
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Shuai Wang
School of Physics, Nankai University, Tianjing, China
ABSTRACT: Along with the developing national aerospace industry and growing strategic considera-
tion, the radiation resistance of semiconductor devices has been widely concerned Single event effect is
the key factor which can affect the aerospace components’ reliability, which raises wide attention.
The semiconductor devices of the current mainstream technology are micro-nano scale, and sensitivity to
single event effect is also increased. In this paper, a model is established to analyze the characteristics of
the device, and single event effect of SRAM components is studied by simulation.
1 INTRODUCTION
713
the design of hardening was carried out in differ-
ent degree in China Academy of Space Technology
and Shanghai Academy of Spaceflight Technology.
Various types of single event effects have been
found so far, including the SEU, SEL, SEFI, and
SEB. However, the statistics show that the single
event upset has a great influence on the operation
and reliability of the spacecraft and the device. The
most typical is the issue of the ITRS report has
been defined the single event upset, which is one of
the most important challenges in nano-technology
(International Technology Roadmap for Semicon-
ductors Reports 2009) integrated circuits. Moreo-
ver, its report pointed out that with the increase
in device integration and decrease in cell size, the
Figure 2. Heavy ion incident SRAM components. probability of the single event upset is constantly
increasing. Soft error rate under 65 nm process
from multiple upsets is 16% in 2007, and gradually
Functional Interrupt, SEFI, Single Event Burnout, increased to 64% of the 35 nm process in 2013 and
SEB, Single Event Gate Rupture, SEGR, Single in 2016, the data is 100% which process is 25 nm.
Event Transient, SET. Among them, the soft errors Therefore, it is meaningful to study the single event
refer to the change of the logic state and storage effect on micro-nano scale SRAM device.
of the data, but the device is not damaged, such as
SEU and SET, while hard errors could cause per-
manent damage to a device, such as SEB, SEGR. 3 DEVICE CHARACTERISTICS
With the introduction of new materials and INFLUENCE ON SINGLE
new structures, as the CMOS technology keeps EVENT EFFECT
scale down, the research on the radiation effect
of the devices is getting more and more attention. The effect of device characteristics on the single
Especially, the research of single event effect has event effect has been a hot research topic in the
been widely developed. The research on the reli- device level. This part is based on the RPP model
ability of aerospace devices is very important for to study the effect of device characteristics on the
international sounding plan. The single event
effect has been studied by Naval, Research Labo-
ratory (Petersen et al 1992), Vanderbilt Univer-
sity (Petersen et al 2005) and Clemson University
(Reed 1994) and other research institutions since
the end of 70 s. Besides, as a result of the high-
speed development of semiconductor technology,
the single event effect research has received more
attention as a new cross subject. The research
on single event effect starts late in China, but in
recent years many domestic institutions have made
important achievements in the research of single
event effect and hardening technology. For exam-
ple, IMP and Atomic Energy Research Institute
had carried out a single event simulation test in the
1990s. SEU and SET mechanism, modeling and
numerical simulation were carried out by North
west Institute of Nuclear Technology (NINT) and
National University of Defense Technology (Chen
et al 2008), and research on radiation effects of
SOI devices in the institute of microelectronics of
Chinese Academy of Sciences. The sensitivity of
the total ionizing dose to the single event effect was
studied by XinJiang Technical Institute of Physics
and Chemistry Chinese Academy of Sciences, and Figure 3. Geometry in the RPP model (a is top view
the research on the test of single event effect and and b is sectional view).
714
single event effect of SRAM components. Using
LET value to calculate the upset rate under single
event effect on orbit, thus the particle species and
energy distribution in the space environment can
be simplified as the LET curve, and the deposition
of energy, as shown in the formula (1):
EDeposition = LEffective × d (1)
715
Binder D., Smith E.C. & Holman A.B. 1975. Satellite Petersen E.L., Pickel J.C., Adams J.H., et al. 1992. Rate
Anomalies from Galactic Cosmic Rays. IEEE Trans Predictions for Single Event Effects-Critique I. IEEE
Nucl Sci, 22(6): 2675–2680. Trans Nucl Sci, 39(6): 1577–1599.
Chen S.M., Liang B., Liu B.W., et al. 2008. Tempera- Petersen E.L., Pouget V., Massengill L.W., et al. 2005.
ture Dependence of Digital SET Pulse Width in Bulk Rate Predictions for Single Event Effects-Critique II.
and SOI Technologies. IEEE Trans Nucl Sci, 55(6): IEEE Trans Nucl Sci, 52(6): 2158–2167.
2914–2920. Pickel J.C. & Blandford J.T. 1980. Cosmic-Ray-Induced
EIA/JESD57. 1996. Test Procedures for the Measure- Errors in MOS Devices. IEEE Trans Nucl Sci, 27(2):
ment of Single-Event Effects in Semiconductor 1006–1015.
Devices from Heavy Ion Irradiation. Reed R.A. 1994. Prediction Proton-Induced Single Event
International Technology Roadmap for Semiconductors Upsets Rates. Ph. D dissertation, Graduate School of
Reports, 2009. Clemson University.
JEDEC STANDARD. 2001. Measurement and Report- Weller R.A., Mendenhall M.H., Reed R.A., Schrimpf
ing of Alpha Particle and Terrestrial Cosmic Ray- R.D., et al. 2010. Monte Carlo Simulation of Single
Induced Soft Errors in Semiconductor Devices. Event Effects. IEEE Trans Nucl Sci, 57(4): 1726–1746.
716
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Yingchen Dai
College of Mechanical and Electrical Engineering, Beijing Union University, Beijing, China
ABSTRACT: With the development of technology, industrial robots have become more widely applied
in industrial production than ever, while at the same time the working environment of industrial robots
is more complex. To ensure industrial robots’ regular work in various electromagnetic environments, it is
particularly important to carefully design the industrial robot system. This paper mainly introduces the
structure, the Electromagnetic Compatibility (EMC) of the hardware circuit and a moving-control algo-
rithm of an industrial robot’s design.
717
Figure 2. The three-part basic composition of the
EMC.
718
of the industrial robot. The power circuit and the factors of the shielding design that should be taken
load circuit are carried out in many places. The into consideration are shown in Figure 5.
connection between the ferrite beads and the PLC In Figure 5, the electromagnetic environment
power supply circuit can then suppress electromag- of the industrial robot, including the type of
netic interference noise. The grounding design of electromagnetic field, the intensity of the field,
the PLC power supply circuit is shown in Figure 4. the frequency and the distance between the con-
trol system and the source of the interference,
should first be determined. Second, according to
3.2 The shielding design on PLC hardware circuit
the electromagnetic environment, electromagnetic
Shielding is an important measure to improve shielding requirements and the nature of the elec-
the electronic system and electronic equipment tromagnetic field, the appropriate material should
of EMC. It can effectively prevent or reduce the be chosen. Third, after the determination of shield-
radiation electromagnetic energy which is not ing materials, the shielding structure is designed.
needed and make sure that the equipment can When the strong magnetic field is shielded, a multi-
work in the electromagnetic environment. Because layer shield structure can be used. The material’s
an industrial robot is likely to be disturbed by elec- inner layer is made of low permeability material,
tromagnetic noise, it is particularly important to the middle layer is made of medium permeability
effectively shield the PLC hardware circuit. The material, and the outer layer is made of high per-
meability material. Finally, the shield of the indus-
trial robots should be well grounded.
4 MOVING-CONTROL ALGORITHM
DESIGN
Figure 5. Shielding design of PLC hardware circuit. Figure 6. Planar linear interpolation algorithm.
719
and Pi(θi, Φi), or Pi-1(Pxi-1, Pyi-1) and Pi(Pxi, work in all kinds of complicated electromagnetic
Pyi) to represent. In the first group of the above environments.
for the joint coordinate system of the pulse value,
the second is angle value and the third is Card
flute coordinate. The three groups of the above are REFERENCES
equivalent.
Coiffet, P. (1980). Robots technology vol.1, modelling
and control. Prentice-Hall, Inc.
5 SUMMARY Matej, K., & Milan, Š. (2016). Electromagnetic compat-
ibility analysing of electrical equipment. Diagnostic of
Electrical Machines and Insulating Systems in Electri-
This paper discusses the structure and electro-
cal Engineering (DEMISEE), 104–109.
magnetic compatibility of a power supply cir- Slivinschi, I., Mihai, S., & Clement, F. (2016). Algo-
cuit of hardware circuit and shielding of circuit, rithms and control structures for industrial robots
as well as a moving-control algorithm for indus- TX90 model. 2016 IEEE International Conference on
trial robot system design, which are essential to Automation, Quality and Testing, Robotics (AQTR),
making industrial robots keep working regularly 1–4.
720
Industrial production, manufacturing,
management and logistics
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Zijian Wang
State Grid Corporation of China, Beijing, China
ABSTRACT: With the development of information technology, the State Grid Company urgently
needs to change the present situation of the artificial project audit, to realise the automatic repeat audit.
Therefore, this paper puts forward a project audit plan system for the electric power enterprises based
on full-text retrieval technology. Firstly, the current situation of project audit in the State Grid Corpora-
tion and the research status of full-text retrieval technology are deeply analysed in this paper. Secondly,
this paper simply introduces the concept of Lucene (a full-text search engine) and the full-text retrieval
technology, detailing the process of full-text search and analysing the difference in Chinese analysis
technology. Lastly, the text retrieval technology is applied in a project audit plan of the electric power
enterprises and this paper provides a system design for the project audit plan of the electric power enter-
prises based on full-text retrieval technology.
Keywords: Full-text retrieval technology; Electric project audit plan; Lucene; Chinese analysis technology
723
2 FULL-TEXT RETRIEVAL
TECHNOLOGY AND LUCENE
SEARCH ENGINE
724
will have a large index redundancy and easily get
the wrong result. Consequently, in the Chinese
retrieval system, Lucene Chinese analyser is not up
to the design requirements of the retrieval system.
At present, there are two major types of the third
party Chinese analyser: JE analyser and Paoding
analyser. Dictionary-based Forward Maximum
Match Method is used to segment Chinese words
in JE analyser, which supports dynamic extensions
of dictionaries. The Paoding parser supports a
user-defined dictionary, and is not limited to the
name and catalogue of the dictionary. When the Figure 3. Design of project plan audit system for elec-
program is compiled, developers can visit a back- tric power enterprise.
ground thread for updates of the thesaurus and
automatically compile the updated thesaurus into
binary version and loading.
Learned through practice, the overall perfor-
mance of the Paoding analyser is optimal consid-
ering the time, space and recall of three factors.
It supports an unlimited number of easily added
custom Thesauruses.
725
technology. According to the design requirements
of the system, this system extends the related
interface of Lucene to realise the corresponding
system function. As Lucene is used as its techni-
cal support, the system has the advantages of good
architecture and being Lucene object oriented. It
is convenient to add or improve system functions
by extending the related interface of Lucene. In
addition, the default implementation query engine
of Lucene is very powerful, which implements the
following query operations: Boolean operations,
group queries, fuzzy queries, etc. Therefore, it is
quite simple to design the code. Furthermore, the
retrieval accuracy and speed of the system meet
Figure 5. N dimensional space.
the requirements of system design.
726
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Fang Zhu
Department of Aircraft Maintenance and Engineering, Guangzhou Civil Aviation College, Guangzhou, China
Xiongfei Huang
Department of Marines, Naval Marine Academy, Guangzhou, China
ABSTRACT: Aircraft parts require a high degree of fabrication accuracy and multiple quality charac-
teristics, which can be achieved in reality by a manufacturing process that consists of many fabrication
steps to achieve specified precision of a part. Since manufacturing quality fluctuation is performed as
composite variation, then quality variation prediction is becoming key to the quality assurance of aircraft
parts. In this paper, aimed at the large dimension, complicated construction of aircraft parts used in
large commercial airplanes, research actuality, existing problems and development trends of aircraft part
fabrication were analysed. Air-craft parts fabrication technologies were discussed, including path and
type of fabrication, fabrication process modelling, fabrication variation analysis, parameter optimisation
based on fabrication stability modelling and quality variations adjustment and correcting, among others.
Finally, a case study is performed to prove the proposed strategy. This work can provide a guideline for
theoretical research and engineering application for aircraft parts manufacturing.
727
1.2 Related work statistical estimation, which has been developed
for effectively solving the installation of real-time
Great efforts have already been conducted in ear-
detecting equipment at some stages in the aircraft
lier studies to describe deviation transmission
parts fabrication process. Therefore, the quality
modelling in the multistep fabrication process
fault needs to be predicted by combining the detec-
from quantitative engineering models. The popu-
tion and quality measurement data of an aircraft
lar engineering method is the application of a state
part. At the same time, the proposed quality pre-
space model for modeling and controlling qual-
diction and adjustment strategy can solve the fol-
ity of multistage fabrication or assembly process.
lowing problem: the conventional SPC techniques
Wang et al. (2005) proposed the equivalent fixture
treat the multistage fabrication process as a whole
deviation concept and formulated the mathematic
and they lack the capability to discriminate among
deviation transmission model. However, the
changes at different stages. On the other hand, the
research, as mentioned above, has concentrated
SPC methods are normally used to monitor quality
on dimensional variation from kinematic sources,
problems in the manufacturing process and they do
such as fixture support and locator variation, fab-
not provide the diagnostic capability to tell where
ricate tool stack-up variation and part variation
the problems occur.
from the previous stage, etc. Less research has
The rest of the paper is structured as follows.
been conducted into the contribution of variation
The engineering-based aircraft parts fabrication
due to static deformation in a workstation, which
process model used in the adjustment strategy is
can have a strong influence on fabrication preci-
developed and described in detail in Section 2. The
sion in an aircraft part. Static deformation varia-
quality prediction and adjustment method is pre-
tions include part distortion and deflection due to
sented in Section 3. An actual industrial case study
clamping and cutting forces. When considering the
is illustrated in Section 4. Finally, further discus-
static deformation during an aircraft part fabrica-
sion and conclusions are given in Section 5.
tion process, the modelling and prediction of the
quality variation introduce new challenges.
There is some research on fabrication process
deviation considered diagnosis has been reported, 2 ENGINEERING MODEL
which based on product characteristics meas-
urements scheme and data. Zhong & Hu (2006) In the different aircraft manufacturing enterprises,
proposed an engineering model to diagnose the classical aircraft parts fabrication processes involve
fabrication process faults based on a 4-2-1 manu- many different fabrication stages where quality
facturing process planning set-up. Xie et al. (2010) characteristic deviation can propagate from one
developed an effective and rapid rough set-based fabrication stage to the next one and eventually
deviation source identification method. The fault accumulate to the final aircraft parts. Hence the
diagnosis methods based on mathematic models engineering model of the aircraft part fabrication
and for single fault diagnosis cannot be reliable process is a very important part of quality charac-
due to the absence of static variation sources, teristic prediction and adjustment of the aircraft
which could be important factors affecting the parts fabrication process. In quality control appli-
quality of a complex product. The diagnosis cations, quality characteristic deviation and pro-
method based on traditional state space models cess error values are usually small. Hence, in order
(Wang et al., 2005) cannot ensure the correct fault to facilitate the analysis of the problem, a lineari-
detection if static variations are present. The ear- sation of a non-linear system or a linear model is
lier study has developed extensive and important often acceptable for representation of the aircraft
methods of deviation source identification for a parts fabrication process. The final part geometric
multistep fabrication process, but the usage of the quality variation can be calculated in terms of fab-
earlier methods and strategy is limited, because all rication and fixture variation, part variation, and
of those methods have deficiencies; for example, fabrication/clamping force variation.
some methods are not considered the static devia- There are two types of process parameter devia-
tion which caused by fixture pressure, only consid- tions that are considered in aircraft parts fabrica-
ering the relevance of fixture parameter deviation tion process modelling. One type of deviation is
and quality characteristic data. the motorial deviations caused due to the fabrica-
This paper presents a strategy and an experi- tion faults in the set-up plan surfaces and fixture
mental study of modelling and quality predic- properties. Another type of deviation is the static
tion for an aircraft part fabrication process. The deviation caused by the clamping and fabrication
sources of dimensional variation modelling forces, which can cause elastic, linear fixture pres-
include both kinematic and static variations. The sure deformation on the aircraft part being fab-
quality prediction and adjustment method carries ricated. In general, static-induced variations can
out engineering model and variation component be considered as one of the most critical process
728
variables for quality prediction rather than others repeatability and locator accuracy of the fabrica-
such as cutting-tool deflections, thermal deforma- tion fixture, which are assumed to be available
tion or geometric deviations of fabricate-tool axes, from fixture specifications or measurement. The
due to the fact that some variations in the fabrica- differences between TM(k) and Tp(k) are the devia-
tion process are partly controlled by the computer tions between station k−1 and station k. The 4 × 4
numerical control compensations. transformation matrix TMM ( k + ) corresponds to
In aircraft parts production, the fabrication and the transformation between the station k and the
manufacturing errors are very small due to the station k+1, and can be expressed as follows:
application of advanced and high-precision fabri-
cates or manufacturing facilities. Since the errors TM ( k + ) = TPM ( k + )TPM1 ( k ) (3)
are small, the linearity of the modelling is held and
the state space modelling method can be applied. TPM is a transformation matrix, corresponding
An aircraft part requires much higher precision to the transformation from the machine tool coor-
than a normal multistage fabrication or manufac- dinate system to the part coordinate system. It can
turing process. Therefore, for an N-station aircraft be deduced that X iP TPM −1
( k ) X iMk , X iP TPM1 ( k +
part fabrication process, there should be N set-ups. 1) X iM ,
k +1 the quality characteristic vector X does not
iP
It is possible to mathematically model the geomet- change; hence, from the equation TPM1 ( k ) X iM k
=
ric dimensional expression of the fabrication char- TPM ( k + ) X iM , it follows that X iM TPM ( k + )
1 k +1 k 1 −1
acteristics for the set-up at the given station k as TPM1 ( k ) X iM
k
. A ( k + ) is the quality characteristics
follows: matrix that will not fabricated at station k, can be
represented below:
X M k ) = Ak X M (k k Bk X P k ) + wk
(1)
Y ( k ) = Ck X M (k k = 1, 2,..., N M k +1TMM ( k + ) = Mk M (k )TP−M1 ( k )
( k ) vk , Ak TPPM (4)
In Formula (1) above, XM(k) corresponds to the The fabrication processes at station k will lead
quality characteristic vector of the aircraft part to static deviations and kinematic deviations. Z
with deviation at station k. Y(k) corresponds to the is the static deviation matrix vector, and it can
measured data of the aircraft part quality property be represented as Z = E⋅F. E corresponds to the
at station k. XM(k−1) corresponds to the quality modulus of elasticity matrix, F corresponds to the
characteristic vector with deviation at station k−1. fabrication force and fixture stress vector and, to
AkXM(k−1) corresponds to the transformation of calculate the static deviations, it is assumed that
quality characteristic from station k−1 to station the Young’s modulus, cutting and clamping forces,
k. Xp’(k) is the latest fabricated quality characteris- and the force deviations are known. Hence Bk can
tic vector at station k. BkXp’(k) corresponds to the be represented as follows:
effect that the process deviations affect the aircraft
part quality characteristic at station k. wk and vk are Bk N kTPF ( k )TM1 k) k )TFM1 ( k ) + N k Z (k
k TF 1 ( k) k TPF ( k ) (5)
different types of noise. wk corresponds to the noise
affected on the aircraft part at station k. vk corre-
Nk is the aircraft part quality characteristic that
sponds to the measurement noise at station k.
is fabricated at station k. The two terms on both
The aircraft part quality characteristic vector
sides of the plus sign (+) from left to right at the
transformation from station k to station k+1 can
right-hand side of Equation (5) are caused by kin-
be represented as follows:
ematic (fixture and set-up surface) deviations and
static (fixture stress and fabrication forces) devia-
k 1
X iM TMM ( k ) X iMk (2) tions respectively.
Based on the foregoing analysis, the aircraft part
In Formula (2) above, TM(k) is a 4 × 4 homog- quality characteristic deviations XM(k) can be rep-
enous transformation matrix, corresponding to the resented by:
position coordinate value of the machining tool
in the fabrication. The formation of TM(k) accu- ΔX M k ) Ak ΔX
ΔX M (k k Bk ΔU ( k
k)) + wk
(6)
racy of a fabrication tool is included both angu- ΔY ( k ) Ck ΔX M (k
( k ) vk k , ,…, N
lar repeatability and axial linear, deriving from the
performance or specifications of the fabricate tool. In Formula (6)) above,, T the input vector
k +1
X iM k
and X iM correspond to the quality char- ΔU ( k ) ⎡⎣ ⎡⎣ ΔX P ( k ) ⎤⎦ [ ΔZ ( k )]⎤⎦ corresponds to
acteristic vector state of X iM in station k+1 and the new deviations, which consist of the static devi-
station k respectively. Tp(k) is also a 4 × 4 homog- ations ΔZ ( k ) (including fixture stress and fabri-
enous transformation matrix, corresponding to the cation forces) and kinematic deviations (including
position coordinate value of the fabrication fixture set-up surface and fixture) ΔX X P′ ( k ). It emerged
tool. The formation of Tp(k) is dependent on the from the fabrication process at station k.
729
3 QUALITY PREDICTION OF AIRCRAFT
PARTS FABRICATION PROCESS
4.1 Description of the fabrication process Quality prediction of the aircraft parts fabrication
process is a critical aspect of quality control activi-
An industrial case study has been conducted to val- ties. However, the static-induced variation source has
idate the methodology as presented in this paper. not been considered in previous research work. In
The part as shown in Figure 1 is a cover board. this paper, a mathematic model-based quality predic-
With the datum features, the dimension specifica- tion approach is proposed and applied to the aircraft
tion is shown in Figure 1. parts fabrication process. A statistical estimation
730
algorithm is used to calculate the improvement char- root cause identification and measurement reduction.
acteristics strategy. The case study validates that the Journal of Manufacturing Science and Engineering,
proposed method could be a promising technique 127(3), 512–521.
for quality prediction of an aircraft parts fabrication Xie, N., Chen, L., & Li, A.P. (2010). Fault diagnosis of
multistage manufacturing systems based on rough set
process. approach. International Journal of Advanced Manu-
facturing Technology, 48, 1239–1247.
Zantek, P.F., Wright, G.P., & Plante, R.D. (2006). A self-
REFERENCES starting procedure for monitoring process quality in
multistage manufacturing systems. IIE Transactions,
Liu, C.Q., Li, Y.G., Zhou, X., & Shen, W.M. (2015). 38(4), 293–308.
Interim feature-based cutting parameter optimization Zhong, W.P., & Hu, J.S. (2006). Modeling machining geo-
for aircraft structural parts. International Journal of metric variation in an N-2-1 fixturing scheme. Jour-
Advanced Manufacturing Technology, 77, 663–676. nal of Manufacturing Science and Engineering, 128,
Wang, H., Huang, Q., & Katz, R. (2005). Multi-opera- 213–219.
tional machining processes modeling for sequential
731
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: This paper constructs measure indexes of the international fragmentation production of
the manufacturing industry based on the available data of the parts and components trade. With the use of
the trade data of China’s manufacturing goods by SITC Rev.3, the paper measures the international frag-
mentation of China’s manufacturing production with Asia, Africa, Europe, Latin America, North America
and Oceania, and so on. It also analyses China’s product types, which participated significantly in the inter-
national fragmentation of production. The results show that the Chinese manufacturing industry has the
highest degree of fragmentation in production with North America and Asia. The second highest is with
Europe and Latin America, and the last is with Africa and Oceania. The method of China’s fragmentation
production with Asia, Europe, North America and Latin America is more dependent on importing parts
and components. However, the method with Africa and Oceania is dependent on exporting parts and com-
ponents. In addition, China’s participation in international fragmentation of production is concentrated.
Keywords: International Fragmentation of Production; Parts and Components Trade; China’s Manu-
facturing Industry
733
2 MEASUREMENT OF INTERNATIONAL 3 DATA SOURCE AND DESCRIPTION
FRAGMENTATION OF PRODUCTION
BASED ON PARTS AND COMPONENTS The components selected in the equation (1)
TRADE include 225 species of five-bit code products cat-
egorised by the SITC Rev.3, shown in Appendix A.
It was Yeats that first used the measurement Manufactures include all 1-bit code products clas-
method of international fragmentation of produc- sified by the SITC Rev.3 from SITC5 to SITC8.
tion based on the parts and components trade. The data amount of imports, exports and the total
Since then, this method has been widely used. Some imports and exports of parts and manufacturing
have used it to measure the degree of international are respectively the data of imports, exports and
fragmentation of production in certain countries the total imports and exports of the 225 compo-
or regions (Kaminski and Ng, 2001; Gaulier. etc, nent products in Appendix A and all products
2005). Others have used this method to measure an from SITC5 to SITC8. From Asia, Africa, Europe,
industrial level of international fragmentation (Lall. Latin America, North America and Oceania, we
etc, 2004). The advantage of the measurement of select 27 typical countries or regions3 that China
international fragmentation of production based on exports to most, including 10 countries or regions
the parts and components trade is the availability of in Asia, 3 in Africa, 8 in Europe, 2 in Latin Amer-
data and the observability of the degree of interna- ica and 2 in North America and Oceania. Based
tional fragmentation in major countries. on the imports, exports and imports and exports
The key to this method is the determination and of manufacturing between China and these rep-
recognition of components2. Referring to Athukora- resentative countries, we analyse the international
la’s (2003) method, and according to the classifica- fragmentation of production of Chinese parts
tion of SITC Rev. 3, we use the 225 species of five-bit and manufacturing to Asia, Africa, Europe, Latin
code products, which belong to the classification of America, North America and Oceania. All the data
the SITC7 and SITC8 as trade indicators. Among of the import and export trade of the 225 com-
them, 168 species of five-bit code products belong ponent products and the SITC5 to SITC8 manu-
to the SITC7 sector, while 57 species belong to the facturing products are obtained from the United
SITC8 (see Appendix A). We can construct a metric Nations COMTRADE database.
index of international fragmentation of production
based on the parts and components trade as follows:
4 CHINA’S PARTICIPATION IN
PC
Cij PCX
CX ij PCM
CM ij INTERNATIONAL FRAGMENTATION
F T
ij ,F
FPPijX = , FPijM = (1) OF MANUFACTURING PRODUCTION
Tij TX
X ij TM
M ij
BASED ON PARTS AND COMPONENTS
TRADE
Here, F ijT , FFPPijX and FP PijM respectively repre-
sent the indicators of international fragmentation According to equation (1) and using the data of
of manufacturing production measured from the imports, exports and import/export trades and
perspective of trade import and export volume, manufacturing among China, Asia, Africa, Europe,
export and import. “i” represents trading nation, Latin America, North America and Oceania coun-
and “j” represents some certain industry. PCij is the tries or regions, we calculated and measured the
total import and export of the parts and components international fragmentation of manufacturing
trade between country i and country j. Tij is the total
import and export of manufacturing industrial trade
3
between country i and country j. PCXij is the total These 27 countries were selected according to the export
trade volume of parts and components that country i data of China, Asia, Africa, Europe, Latin America,
exports to country j. TXij is the total trade volume of North America and Oceania in 2001–2008, and the data
of China’s exports to continent countries for 9 con-
manufacturing industrial trade that country i export secutive years China, Hong Kong, Japan, South Korea,
to country j. PCMij is the total trade volume of parts Singapore, India, Taiwan, the United Arab Emirates,
and components that country i imports from coun- Malaysia, Indonesia, Thailand; Africa selected three
try j. TMij is the total trade volume of manufacturing of the largest exporting countries and regions in Asia:
industrial trade that country i imports from country j. China has the largest exporting countries: South Africa,
Egypt, Nigeria; Europe selected eight of China’s largest
exporting countries: Germany, the Netherlands, Britain,
2
Some documents refer to BEC rev.3 as spare parts for Italy, Russia, France, Spain, Belgium, Latin America
capital goods (excluding transport equipment) with class selected the two largest exporters of China: Mexico,
code 42 and transport equipment spare parts with class Brazil; North America selected two of China’s largest
code 53 as a measure of trade in components, such as exporters: Canada, the United States; Oceania selected
Gaulier et al. (2006). two of China’s largest exporters: Australia, New Zealand.
734
Table 1. China’s imports of parts and components from the world and the continent’s share of manufacturing
imports (unit: %).
Partner
countries North Latin
Years World Asia Europe America America Africa Oceania
Source: Author calculated from the United Nations COMTRADE database data.
Table 2. China’s exports of parts and components from the world and the continent’s share of manufacturing exports
(unit: %).
Partner
countries North Latin
Years World Asia Europe America America Africa Oceania
production from the point of import, export and imports from Asia (45.8%) is below the average
import and export (See Table 1, Table 2 and Table 3). degree of international fragmentation of China’s
Table 1 shows the share that China’s import of imports from the world (46.4%). The degree of
components from the world and State account for international fragmentation of China’s imports
the import of manufacturing. From the point of from Europe, North America, Latin America,
China’s imports from the world, the international Africa and Oceania fluctuated from 1997 to 2008.
fragmentation of Chinese manufacturing pro- The average degree of international fragmentation
duction increased from 39.8% in 1997 to 51% in of China’s imports from Europe is 45.8% and the
2006, then declined, but the average degree of frag- average degree of international fragmentation of
mentation is 46.4%. The degree of international China’s imports from North America is 51.3%,
fragmentation of China’s imports from Asia also which are higher than the average degree of inter-
showed the same trends as the degree of China’s national fragmentation of China’s imports from
imports from the world. However, the former the world. The average degree of international
data are slightly lower than the latter. The average fragmentation of China’s imports from Latin
degree of international fragmentation of China’s America is 45.5% and is lower than the average
735
Table 3. China’s share of imports and exports of parts and components from the world and continents (%).
Partner
countries North Latin
Years World Asia Europe America America Africa Oceania
736
then dropped by more than 37.9% in 2008. The Table 4. The import share and total of the top 7 prod-
average degree of international fragmentation ucts imported in China (unit: %).
from China and Europe and Latin America are Code
respectively 38.4% and 38.6%, slightly lower than
Years 776 764 728 759 772 778 792 Total
the average of international fragmentation pro-
duction between China and the world; and China, 1997 13.9 12.7 11.9 7.3 6.0 5.8 7.2 64.9
Africa and Oceania international fragmentation 1998 17.1 15.6 9.3 8.1 6.2 5.4 6.5 68.1
production as a whole are growing, but the aver- 1999 22.8 15.5 7.8 7.2 6.3 5.8 5.4 70.7
age levels are 28.1% and 23%, far lower than the 2000 27.0 15.6 7.5 7.6 6.9 6.1 2.8 73.5
average of international fragmentation production 2001 26.2 14.5 7.4 8.2 7.0 5.6 5.0 73.9
between China and the world. 2002 30.7 12.1 7.1 8.8 6.9 5.9 3.5 75.0
The above content measures the international 2003 32.6 11.5 6.6 7.8 6.8 5.6 2.8 73.6
fragmentation production of manufacturing 2004 34.7 10.8 7.2 7.0 7.0 5.7 2.3 74.7
industry in our country from the point of view 2005 38.5 11.1 5.3 7.0 7.4 5.4 2.7 77.4
of imports, exports and import and export. From 2006 39.6 10.6 4.7 6.6 7.6 5.4 3.6 78.1
the perspective of import and export, the degree 2007 41.0 9.0 5.2 6.3 8.1 5.6 3.0 78.1
of international fragmentation from China, North 2008 39.5 8.8 5.1 5.5 8.1 5.7 2.7 75.3
America and Asia are at the highest degree, fol-
lowed by China and Europe. Latin America’s Note: See Appendix A for product codes and
degree of segmentation, the gap of international classifications.
Source: Author calculated from the United Nations
fragment degree from China with them is not great,
COMTRADE database data.
but China with Africa, Oceania fragment degree is
low, with the front four there is a big gap. From
the perspective of imports, the degree of inter- Table 5. China’s exports of parts and components in
national fragmentation from China and North the top seven export share of the product and the total
America and Europe are of the highest degree, (unit: %).
followed by the degree of international fragmenta- Code
tion from China and Asia and Latin America. The
Years 764 759 851 776 778 821 848 Total
gap between these four is not particularly large,
but China and Africa and Oceania are far lower 1997 12.8 5.7 19.4 4.4 7.1 5.7 7.2 62.4
than the previous four, and the gap is particularly 1998 13.1 7.3 17.6 5.0 7.2 5.9 6.1 62.2
large. From the perspective of exports, China and 1999 14.3 7.4 15.6 6.6 8.0 6.2 4.9 63.0
North America has the highest degree of interna- 2000 16.3 8.0 13.0 7.0 7.9 6.0 5.0 63.2
tional fragmentation, followed by China and Latin 2001 18.0 10.2 11.8 5.8 7.7 5.9 5.0 64.3
America and Asia, then come China and Europe 2002 18.5 12.8 10.2 6.7 7.2 6.1 4.4 65.9
and Africa’s degree of international fragmenta- 2003 19.2 13.2 8.9 7.2 7.0 6.2 4.4 66.1
tion, and finally comes Oceania. The gap among 2004 21.8 12.3 7.5 8.0 6.7 6.2 3.5 66.1
them is not great. It also shows the characteristics 2005 23.8 11.3 7.3 7.8 6.3 6.3 3.2 66.0
of China’s manufacturing industry in international 2006 25.2 10.3 6.5 8.7 6.2 6.2 2.0 65.0
fragmentation production: on the whole this is 2007 24.5 9.2 6.0 8.5 6.5 6.4 1.6 62.7
through a large number of imports of intermedi- 2008 23.4 7.7 6.0 8.7 6.6 6.4 1.4 60.2
ate goods, processing or assembly and then export.
Of course, the division characteristics of produc- Note: See Appendix A for product codes and
tion with the continents are also different. Com- classifications.
Source: Author calculated from the United Nations
pared with the export parts, in the international
COMTRADE database data.
fragmentation mode of production, China and
Asia, Europe, North America and Latin America
are more dependent on imported components, but
the international fragmentation from China and China’s participation in the international fragmen-
Africa and Oceania are just the opposite. tation production of products with a concentra-
According to the method of Table A2 in Appen- tion, the share of imports of products which is
dix A, the five-digit code corresponding to SITC China’s imports of spare parts in the top seven
Rev.3, which represents the component, is mapped accounted for about 70% of the total, and showed
to the three-digit horizontal code, which can be a growth trend, from 64.9% in 1997 increased to
used to analyse the product types in China’s man- 78.1% in 2007, declined in 2008, but still accounted
ufacturing industry. Table 4 shows the import of for 75.3%. Among them, the division of produc-
China’s top seven parts of the import share and tion up to 776, accounting for about 30%, and the
the total can be seen from the data in the table. growth trend is more obvious, from 13.9% in 1997
737
to 41% in 2007, 2008 also 39.5%. 776, 764, 728, with Latin America, Asia and Europe. The last
759, 772, 778, 792 international fragment is also is with Latin America. The gap of the fragmenta-
more obvious. tion degree is not very big among China, North
Table 5 shows the export share of China’s top America, Europe, Asia, Latin America and Oce-
seven exports of components and the total exports ania. So we can see the characteristics of China’s
of China’s exports in the top seven largest export participation in the international fragmentation
share of the product accounted for more than of manufacturing production. That is importing
60%, of which the largest share is 764, account- a large number of intermediate goods, then pro-
ing for 20%, an increase from 12.8% in 1997 to cessing and assembling, finally exporting. China’s
25.2% in 2006, followed by a slight decline in 2007 participation in the international fragmentation
and 2008, but still more than 23%, followed by the of production is concentrated. The top seven
higher share of 851 and 759. In total, 851 products imports of parts and components account for
had a downward trend, and 759 products had an about 70% of China’s total components imports,
upward trend. The share of the gap among 776, and the top seven exports of parts and compo-
778, 821 and 848 products is not great. It can be nents account for about 60% of China’s total
concluded from the export of parts shown that the components exports. Those shares are continu-
strongest participant in the degree of international ously increasing.
fragmentation is 764, followed by 851 and 759, and Obviously, China’s participation in the interna-
finally 776, 778, 821 and 848 products. tional fragmentation of manufacturing production
has greatly accelerated the growth of manufactur-
ing output and exports in China. Meanwhile, it
5 CONCLUSION also showed that China’s manufacturing output
and exports contained a large amount of the for-
The advantages of metrics based on the parts and eign investment. So, what kind of stage should
components trade data to measure the degree of Chinese manufacturing production sections are in
China’s participation in the international fragmen- the international division of production system,
tation of production are the availability of data and how to strive for a higher degree of fragmen-
and the observability of the trade flow. Also it can tation in the production with high added value and
compare the degree of international fragmentation more interest? This research direction is worthy of
of production between the major countries so as further investigation.
to comprehensively reflect the situation and the
regional characteristics of China’s participation in
the international fragmentation of manufacturing ACKNOWLEDGEMENTS
production. Measurements based on the parts and
components trade data show that the degree of This research is supported by Natural Science
international fragmentation of China’s manufac- Foundation of China (No.71163047) and Depart-
turing production continues to increase. From the ment of Science and Technology of Yunnan Prov-
perspective of overall imports and exports, Chinese ince under grant number 2016FB118.
manufacturing industry has the highest degree of
international fragmentation in its trade with North
America and Asia. The second is with Europe REFERENCES
and Latin America. The gap of the fragmentation
degree is not very big among these four. However, Athukorala, Prema-chandra (2003). Product Fragmenta-
the degree of international fragmentation of Chi- tion and Trade Patterns in East Asia. Departmental
Working Papers 21, Australian National University,
na’s manufacturing trade with Africa and Oceania Arndt-Corden Department of Economics.
is still very low, which is different from the previous Egger, H. and Egger, P. (2003). Outsourcing and skill-
four. The degree of international fragmentation specific employment in a small economy: Austria after
of China’s importing of components from North the fall of the Iron Curtain. Oxford Economic Papers,
America and Europe is more prominent, but it is 55(4), 625–643.
less with Asia and Latin America. The gap of the Feenstra, R.C. and Hanson, G.H. (1996). Globalization,
fragmentation degree is not very big among North Outsourcing, and Wage Inequality. American Eco-
America, Europe, Asia and Latin America. Mean- nomic Review, 86(2), 240–245.
while, the degree of international fragmentation Hummels, D., Ishii, J. and Yi, K.-M. (2001). The nature
and growth of vertical specialization in world trade.
of China’s importing from Africa and Oceania is Journal of International Economics, 54(1), 75–96.
still very low, which is different from the previous Hummels, D., Rapoport, D. and Yi, K.-M. (1998). Ver-
four. The degree of international fragmentation tical specialization and the changing nature of world
of China’s exporting of components to North trade. Federal Reserve Bank of New York Economic
America is more prominent. However, it is less Policy Review, 4(2), 79–99.
738
APPENDIX A PART PRODUCT CODE
A1 Product code for the five-digit codes of the 225 SITC Rev.3 classifications of the representative parts included in
SITC7 and SITC8.
A2 SITC Rev.3 Classify the correspondence between the five-digit horizontal codes and the three-digit code levels.
Corresponds to the
three-digit code Others
713 714 716 71192 71280 71819 71878 71899 72119 72129
723 724 728 72139 72198 72199 72439 72449 72467 72468
735 737 741 72488 72491 72492 72591 72599 72689 72691
742 744 745 72699 72719 72729 73719 73729 73739 73749
749 759 764 74380 74391 74395 74699 74839 74890 74991
771 772 776 74999 77429 79199 81211 81219 81380 81391
778 784 785 81392 81399 87119 87149 87240 87319 87329
792 821 846 88422 88431 88432 88433 88439 88591 88592
851 874 881 88593 88597 88599 89124 89129 89191 89195
891 89199 89410 89935 89937 89949 89966 89984
89986 89996 89997
739
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: Based on the research of Humphrey and Schmitz (2000), this paper studies the industrial
chain upgrading of the buyer-driven and producer-driven global production networks. It uses export
sophistication to measure the degree of China’s manufacturing industry chain upgrading. It then analyses
the impact of the global production network on China’s industrial chain upgrading. The paper puts for-
ward a hypothesis, builds a model and analyses the conclusion.
741
and Xj is the total amount of all exports of coun-
try j. yj denotes the per capita income level of
country j, PRODYi is the weighted average of per
capita income, and xij/Xj is the weight of product
i in country j, reflecting the importance of p prod-
( )
uct i in country j’s export structure; ∑ j x ij / X j
is the sum of the product i’s total exports in each
country. The weighting variable reflects the impor-
tance of country i’s exports in all countries that
export such products, reflecting the comparative
advantage of country i. PRODYi is the weighted
average of the per capita income weighted by the
Figure 1. Buyer-driven global production network dominant comparative advantage of the prod-
industry chain upgrading. uct i of the exporting country, and therefore the
higher the explicit comparative advantage of the
product i in the exporting country under the same
other conditions, the higher the sophistication, the
higher the sophistication of the product; if a prod-
uct is densely exported by high-income countries,
the sophistication of the product is higher, while a
product-intensive low-income countries to export
the product sophistication is low.
Product sophistication PRODY can be inte-
grated into the national level, a country’s export
sophistication index EXPY can be defined as the
weighted average of the sophistication of each
country’s export product PRODY, and the weight
is the share of each product’s export value to the
country’s total export value.
Figure 2. Producer-driven global production network
industry chain upgrading.
x ijj
Yj = ∑ i
EXPY • PRODY
Yi (2)
export products to measure a country’s indus- Xj
trial chain position. According to Hausman et al.
(2007), each country’s exports can be ordered at where EXPYj is the export sophistication of coun-
the productivity level corresponding to the prod- try j and xij/Xj is the share of exports of product i
uct. However, since data on the productivity level in total exports of country j.
of a product are difficult to obtain, the weighting This paper selected 118 countries and regions
reflects the dominant comparative advantage of a as the world’s representative countries, using all
country on the exported product by weighting the countries from 2001–2011 export trade data and
per capita GDP of the country that exports a prod- per capita GDP data. First, the export trade data
uct. First of all, each country exports a product are derived from the United Nations Trade Sta-
corresponding to the level of income or productiv- tistics Database (COMTRADE), which uses the
ity indicators PRODY; second, the structure of a three-digit code for product exports of the Stand-
country’s export-level industry-level measurement ard International Trade Classification Third Edi-
of the sophistication of indicators; finally, a coun- tion (SITC Rev.3). Second, the per capita GDP
try basket of export products corresponding to the of each country comes from PWT 8.1, which
level of income or productivity indicator EXPY. is the per capita GDP calculated at Purchasing
Using the method of Rodrik (2006), the measure Power Parity (PPP), as well as for each country.
of the sophistication of an arbitrary product i can According to Formula (1), the export sophistica-
be constructed as follows: tion of 205 three-digit products is calculated from
2001 to 2011. Then, according to (2), we calculate
x ij / X j the export sophistication of Chinese manufactur-
Yi = ∑ j
PRODY • yj (1)
∑ (x ) ing industry from 2001 to 2011. In these 11 years,
Xj
j ij
China’s manufacturing export sophistication
increased year by year. Therefore, China’s manu-
PRODYi represents the sophistication of prod- facturing industry chain is escalating, as shown
uct i, xij represents the export value of country i, in Table 1.
742
Table 1. The degree of China’s manufacturing industry chain upgrading (unit: US dollars).
743
absorb the technology spillover from the host where the dependent variable PRODYit is the
country by the industry correlation effect, so that export sophistication of country i in period t, Tit
multinational subsidiaries have the opportunity to denotes the technological development level of
be embedded in the host country industrial chain the country i in the period t, mainly measured by
and information channels, to better learn from the technological investment indicators and total
affiliated enterprises, and to understand the lat- expenditure of country i’s technology activity;
est technological developments in the industry. FDIit represents the foreign direct investment that
(3) Personnel movement effect. Multinational sub- country i attracts in the period t; OFDIit represents
sidiaries can employ local high-quality scientific the foreign direct investment of country i in period
research personnel to enhance their technological t; PTit represents the processing trade of country
research and development capabilities, but also i in period t, and is measured by the import vol-
through the employment of local high-level tech- ume of parts and components trade; αi denotes the
nical personnel and management personnel to intercept term of country i; uit indicates the error
improve their production and management capa- term.
bilities. (4) R&D cooperation. The main reason for
the effectiveness of this mechanism is that through
4.2 Data sources and processing
direct foreign investment they can carry out techni-
cal cooperation and share part of the cost of R&D The sample selected in this paper is Chinese manu-
with host governments and enterprises. facturing; the time span is 2003–2011. China’s total
expenditure data STit on science and technology
Hypothesis 3: China’s industrial chain upgrading activities come from the China Statistical Yearbook
(export sophistication) degree and China’s OFDI of Science and Technology (2004–2012); China’s
have a positive relationship. ASEAN FDI data, China’s actual use of ASEAN
FDI data and the exchange rate data come from
the China Statistical Yearbook (2003–2012); Chi-
3.4 Processing trade
na’s import data of parts and components from
The effect of international trade on export sophis- the ASEAN come from the United Nations COM-
tication is reflected in the technical effect of inter- TRADE database.
national trade. The way processing trade through
trade technology promotes product sophistication
4.3 Measurement model regression
is: processing trade gives technologically backward
countries the opportunity to imitate the technolo- Based on the above-mentioned processing, this
gies of the frontiers, while imitation is a process paper estimates the model (1) using OLS under
of improving technology; imports of new inter- robust standard error and obtains the following
mediate products can enhance the productivity of preliminary results: the purpose of this paper is to
importing countries through input-output effects; analyse the different factors, especially the produc-
import and export trade can avoid duplication of tion network of China-ASEAN, on the industrial
effort, improve the efficiency of research activi- chain upgrading of our country’s manufacturing
ties around the world, and so on. Processing trade industry as the dependent variable. The results
facilitates the increase in output and export prod-
uct sophistication of the participating countries. Table 2. Econometric analysis of the China–ASEAN
production network on China’s industrial chain
Hypothesis 4: China’s industrial chain upgrading upgrading.
(export sophistication) and China’s processing
trade have a positive relationship. Variable Model 1 Model 2 Model 3
744
of the different model tests are shown in Table 2. to China’s industrial chain upgrading is not signifi-
The insignificant variables from Model 1 to 3 cant. Therefore, we consider removing the variable
are deleted in turn to estimate. The coefficient of FDI, and obtain Model 3.
RD in Model 1 is positive, which indicates that In Model 3, the variable FDI is deleted, the
the investment of science and technology in our t-value of RD regression coefficient is significantly
country has a significant impetus to the upgrad- positive and, for each additional unit of scientific
ing of the industrial chain in China. PT coefficient and technological activities, China’s industrial
is negative, but not so significant, indicating that chain is increased by 1.5 units; China’s FDI to
the processing trade imports on the impact of the ASEAN is negative on China’s industrial chain.
industrial chain upgrading is not so obvious. FDI
coefficient is positive, meaning that the use of
ASEAN FDI from the impact on China’s indus- ACKNOWLEDGEMENTS
trial chain upgrade is positive. OFDI coefficient is
negative, t value is significant, and OFDI on the This research is supported by Natural Science
impact of China’s industrial chain upgrading is Foundation of China (No.71163047) and Depart-
negative. First, we consider removing the non-sig- ment of Science and Technology of Yunnan Prov-
nificant PT from the model, and obtain Model 2. ince under grant number 2016FB118.
In Model 2, after the deletion of variable PT, the
coefficient of RD is significantly positive, indicat-
ing that the investment of science and technology REFERENCES
activities on China’s industrial chain upgrading
has promoted a significant role in science and Hausmann, R., Hwang, J., & Rodrik, D. (2007). What
technology activities, funding, for each additional you export matters. Journal of Economic Growth, 12,
unit, China’s industrial chain to improve 1.447 1–25.
units. OFDI coefficient is negative, and t value Humphrey, J., & Schmitz, H. (2002). How does insertion
in global value chains affect upgrading in industrial
is significant; therefore, OFDI on the impact of dusters? Re∼onal Studies, 36(9).
China’s industrial chain upgrading is negative. The Lall, S. (2000). The technological structure and perfor-
coefficient of FDI is positive, but the significance mance of developing country manufactured exports,
is decreased, indicating that the FDI from ASEAN 1985–1998. Oxford Development Studies, 28.
745
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: Logistics demand forecasting is one of the important factors to measure at a regional
logistics development level. Logistics development in the Wuling area has rare opportunities and loca-
tion advantages, but these factors are not equal to the reality of logistics demands; how to grasp the
market information to predict decision-making, drive the scale of logistics demand and the high-speed
development of the regional economy are of great significance. This paper studies the problems emerging
in logistics industry development in the Wuling mountain areas, analyses the regional logistics demand
in theory and its forecasting contents, finds reasonable logistics resource allocations used for the Wuling
mountain area, builds the logistics demand forecasting model, and achieves the balance between logistics
supply and demand to save costs.
747
which will be conducive to reasonable planning, 2.3 The predictability and contents of regional
constructing a logistics infrastructure, and improv- logistics demand
ing the logistics supply system.
Regional logistics demand is derived demand, it is
brought about by the regional economic develop-
2.2 The principle and characteristics of logistics ment itself, and therefore it is closely related to the
demand analysis development of the regional economy. Through
the analysis of the theory of regional logistics
From the perspective of the social and economic
demand, it can be seen that as the regional economy
significance of logistics demand analysis, it is
aggregates, the change of the industrial structure,
required that more attention should be paid to
resource distribution and regional logistics demand
logistics demand analysis. Especially considering
aggregates, and the quantity, structure and hierar-
the condition that the current level of economic
chy of logistics demand also changes. Furthermore,
development in our country is still backward, and
with the development of the economy, the quantity
considering the condition that the logistics scale
of regional logistics demand presents the trend of
continues to grow, the quality of logistics serv-
obvious growth. In addition, through the analysis of
ices needs to improve, and the logistics demand
the correlation data, it also shows that there exists
structure keeps continuously developing. Logistics
a great correlation between the regional logistics
demand analysis should abide by the following
demand and the regional economic level. Therefore,
principles.
it can be thought that regional logistics demand
Firstly, logistics enterprises should consciously
has a certain predictability, and the indicators of
strengthen their market investigation and research
the regional economy are available to forecast the
work and attach importance to market demand
regional logistics demand indicators.
forecasts. Secondly, improve the ability of infor-
Regional logistics demand forecasting aims to
mation management and utilisation, perfect the
estimate and speculate the flow, source, flow direc-
construction of the logistics information system,
tion, flow velocity and construction of goods that
and attach great importance to the comprehensive
has not yet occurred within the area or is not clear
analysis and evaluation of logistics demand infor-
at present, in order to study the size of the regional
mation. Thirdly, pay attention to studying and
logistics demand and the demand hierarchy, for
drawing lessons from the successful experiences
providing gist and decision in regional logistics
of logistics enterprises at home and abroad, and
planning. So, according to the characteristics
reduce the blindness and arbitrary behaviour of
and requirements of regional logistics services in
logistics demand analysis. Fourthly, emphasise the
regional logistics demand forecasting, the following
role of logistics consulting research institutions, lay
can be predicted: the overall scale of the regional
emphasis on scientific prediction technology and
logistics demand; the flow distribution of regional
combine this with expert analysis. Lastly, strengthen
logistics; the change of the main influencing factors.
the analysis of the international and domestic eco-
nomic situation, grasp and understand the charac-
teristics of the whole social logistics demand, make 3 BUILD THE LOGISTICS DEMAND
explicit the requirements of the logistics enterprises FORECASTING MODEL
services objectives in terms of the characteristics of
quality and quantity, enhance the accuracy of logis- The basis of the neural network lies in neurons
tics demand analysis, and find the market break- that are a biological model based on nerve cells in
through point of logistics enterprises. biological neural systems. People research biologi-
Logistics demand refers to the organisations cal neural systems, explore the mechanism of arti-
or individuals suggested for products, services or ficial intelligence and digitise the neurons, which
information flow with the needs or the ability to produces the neuron model. A large number of the
pay. Analysis showed that either on the supply same neurons in this form are coupled together
chain exists a lot of logistics demand, logistics to form the nerve network, which is a highly non-
demand exists in every link in the supply chain linear dynamic system. Although the structure
even throughout the supply chain, respectively to and function of each neuron is not complex, the
form intermediate or ultimate logistics demand of dynamic behaviour of neural networks is very com-
logistics demand. Compared with the demand for plex. Therefore, a neural network can express dif-
other commodities, logistics demand has its par- ferent phenomena of the practical physical world.
ticularities, and these characteristics are related
and influenced by each other. There are seven main
3.1 BP neural network model
characteristics, i.e. derivation, universality, variety,
imbalance, part of the alternative, the qualitative The BP network has many layers, and for the sake
specificity of time and space, and hierarchy. of simplicity of narrative, as an example it takes
748
Figure 1. The schematic diagram of the BP neural
network.
Figure 2. The schematic diagram of adaptive learning.
three layers to reduce computational formula. The
schematic diagram of the BP neural network is as a predictor. Based on the previous time entered
shown in Figure 1. x (n−1) and model in (n−1) moment of parameter,
Assuming the BP network has three layer net- it estimates n moment of output. Compared with
works, the input neurons use i as a serial num- the actual value x (n) (as the right answer), its dif-
ber, and the input vector is X ( x x x xn ) ,
T
ferentials are called “new information”. If “new
adding to x0 = −1 as neurons of hidden layers intro- information” e(n) equals zero, the parameters of
ducing the threshold value. Neurons of hidden lay- the model are not amended, or should be amended
ers use j as a serial number, and its output vector is to track environmental changes.
O (o o o ol ) , adding to O0 = −1 as neurons
T
(
This paper aims for the following improvement:
min Remp ( f ) = ∑ yi f (X i ) )
2
the adjustment to a self-adapted learning rate, (4)
i =1
which makes network of training automatically set
the size of different learning rate in While statistical learning theory points out the
Different stages. The norm of the adjustment minimum of empirical risk it does not ensure the
learning rate is: check whether the revised value of minimum of expected risk. In the optimised target
the weight really reduces the errors function, if it of Structural Risk Minimisation (SRM) minimi-
does so, the value of the selected learning rate is sation, the parameters (W,b) of the above linear
small, and it can add a volume. If it does not do so, regression equations should meet:
it produces over-regulation, and it should reduce
the value of the learning rate and guarantee that the 1
min Q (W , b) Remmp ( f )
2
network can always accept the maximum learning W + CR (5)
rate for training. In Figure 2, the network is taken 2
749
2
There into, W reflects the generalisation abil- 3.3 The kernel method
ity of the regression function f(x), and C is the The kernel method is the generic term of a series of
penalty factor. advanced and non-linear data processing technol-
In the equation of (3), the common loss func- ogy, whose common feature is that these methods
tion L(Xi) includes quadratic function, Laplace of data processing apply in kernel mapping. From
function, ε-non-sensitive function, etc. the specific operation, the kernel method first uses
ε-non-sensitive functions are as shown in the method of non-linear mapping to bring the
Figure 3: original data from the data space mapping to the
feature space, and then in the feature space corre-
⎧⎪0, yi f (X i ) ≤ ε sponds to the linear operation, as shown in Fig-
Lε (X i ) = ⎨ (6)
⎪⎩ yi f (X i ) f (X i ) > ε
yi ure 4. Because of using non-linear mapping, which
is often very complex, it greatly enhances the capa-
bility of the non-linear data processing.
There into, the regression error can be neglected The kernel function realises the non-linear trans-
in the scope of ε, which is more suitable for the formation between the data space and the feature
data processing of the economic society system, space. Supposing xi and xj are the sampling points
because all the data targets of this system exist of the data space, the mapping function from the
with higher error, often for many reasons. data space to the feature space is Φ, and the basis
of the kernel method is to realise the inner product
transformation of the vector:
(x x ) → K (x x )
i j i j ( )
Φ ( xi ) ⋅ Φ x j (7)
750
makes an improved new model to positively fore- in Guizhou Province Marked by the word LH on
cast the logistics quantity demanded for the Wul- 7480 [2014].
ing mountain area for three years. Through the
predicted results, it provides the theoretical basis
on the development and plan of the logistics indus- REFERENCES
try in the future for a given period. Figure 5 shows
our adopted technical route. Bazaras, D., et al. (2016). Competence and capacity-
building requirements in transport and logistics mar-
ket. Transport and Telecommunication Journal, 17(1),
5 CONCLUSION 1–8.
Komori, O., et al. (2016). An asymmetric logistic regres-
sion model for ecological data. Methods in Ecology
In a word, this paper expounds the logistics demand and Evolution, 7249–260.
forecasting models, the BP neural network model Korczak, J., et al. (2016). Strategic aspects of an eco-
and the Support Vector Regression (SVR) model, logistic chain optimization. Sustainability, 277(8), doi:
then draws forth the technical route, and lastly 10.3390 /su8040277.
concludes the full text. The disadvantage of this Lukinskiy, V., & Dobromirov, V. (2016). Methods of
article is that it only considers the tangible logistics evaluating transportation and logistics operations
demand, and predicts the scale index of logistics in supply chains. Transport and Telecommunication,
demand, but does not think of the structural index 17(1), 55–59.
Škerlič, S., et al. (2016). A decision-making model for
of logistics demand, that is, the demand of logis- controlling logistics costs. Model odlučivanja za kon-
tics service quality, such as the aspects of intangi- trolu logističkih troškova; Tehnički vjesnik, 23(1),
ble logistics demand, logistics efficiency, time, cost, 145–156.
etc. In the future, we will regard the above uncon- Xu, S., & Xu, Y. (2012). Study on Shanghai logistics
sidered sides, and further study them. demand characteristics and influencing factors. Mod-
ern Management, 2:88–92. http://dx.doi.org/10.12677/
mm. 2012. 22016.
ACKNOWLEDGEMENTS
751
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Guosong Zhen
Logistics College, Beijing, P.R. China
ABSTRACT: Logistics equipment support capability evaluation is a kind of cognitive activity that takes
logistics equipment as the evaluation object, and takes the object attribute—logistics equipment support
capability as the evaluation target. Its purpose is to evaluate the capability and the rationality of the cur-
rent logistics equipment.
753
Figure 1. Evaluation index system for logistics equipment support capability.
the number of maintenance personnel receiving equal to (equipment matching rate of part A +
induction training/the total number of mainte- equipment matching rate of part B +…equipment
nance personnel; management personnel allocat- matching rate of part N) / N.
ing rate equal to the actual maintenance personnel
number/standard management personnel number;
3.3 Personnel–equipment coordination degree
management personnel matching rate equal to the
number of management personnel in matched This can be divided into four aspects—training
majors/the total number of management person- satisfaction degree, supporting construction sat-
nel; management personnel induction training rate isfaction degree, management quality satisfaction
equal to the number of management personnel degree, and equipment maintenance satisfaction
receiving induction training/the total number of degree.
management personnel.
3.4 Evaluation index synthesis model
3.2 Equipment satisfaction degree
In the index system of logistics equipment support
The calculation method of each index is as fol- capability evaluation, the indexes are mutually
lows. Equipment allocating rate equal to the actual independent. At the same time, the linear weight-
number of logistics equipment/the stand number ing method is used to calculate the top index val-
of logistics equipment; equipment matching rate ues to ensure that the main index well reflects each
754
sub-index in simple and intuitive results. Suppose The Delphy method was used in this study. 20
that index Z consists of the following n sub-indexes. experts who have engaged in the logistics equip-
ment for many years were invited to score the
x1 x2 ,......, xn xi ≤ 1,
1, i = 1, 2......, n weight of each index in the index system. After
repeated study and calculation, the bottom index
The synthesis model of logistics equipment sup- values were finally determined, as listed in Table 1.
port capability evaluation is, Based on formula, Ai = ∑ nk Wij Biij , the support
capability of this kind of logistics equipment can
n be calculated and was found to be 0.75627, indicat-
A i = ∑ WijB ij ing that the degree of satisfaction of the inherent
k
support capability is 75.627% for this type of logis-
Where Wij indicates the weight of index Bij for tics equipment.
index Ai, and n indicates the number of index Bij
contained by index Ai.
4.2 Evaluation of system logistics equipment
support capability
The evaluation model used was: pg = ∑ i 1 pi × ω i
n
4 DEMONSTRATION OF LOGISTICS
EQUIPMENT SUPPORT CAPABILITY wherein i = 1, 2, 3, …n; n indicates the number of
divided logistics systems; Wi indicates the weight
4.1 Overall support capability evaluation of the corresponding logistics system; pi indicates
for single-type logistics equipment the degree of satisfaction of the inherent support
capability of the corresponding logistics equip-
The overall support capability of single-type logis-
ment; and pg indicates the satisfaction degree of
tics equipment is evaluated in the following steps.
the inherent support capability of the logistics
Step 1: Determine the weight coefficients of evalu- equipment system.
ation indexes according to expert scoring. The logistics equipment support capability eval-
Step 2: Calculate the values of bottom indexes in uation results for all kinds of professional logis-
the system. tics service systems and the weight coefficients
Step 3: Calculate the overall support capability of determined by expert investigation are shown in
this type of logistics equipment. Table 2.
Top index Three level index Index weight Wij Index value Bij
755
Table 2. Weight coefficients. the built evaluation index system needs constant
improvement, and further research needs to be
Service Satisfaction degree Weight performed considering the combined influence
of the logistics equipment theory and practicing
Military supplies 0.8 0.12
Medical 0.9 0.08
researchers to better support logistics equipment
Military transportation 0.8 0.30
construction.
Oil 0.8 0.25
Camp 0.6 0.1
Command 0.7 0.15 REFERENCES
756
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: A key problem of production management in missile general assembly workshops is pro-
duction scheduling. In this paper, the missile general assembly process was investigated. Network planning
was introduced to describe the complex production process and express the logical relationship between
working procedures and processing units. An optimising mathematical model was established in which
the production sequence was the constraint, and the minimum flow time and waiting time of all units was
the target. The genetic algorithm was applied to solve the model. Finally, the Plant-simulation software
was used to simulate the production scheduling and to show the working procedure. The simulation
demonstrated that the method proposed in this paper was helpful for making decisions about reasonable
production arrangements and to enhance the productive efficiency.
Keywords: Missile General Assembly; Production Scheduling; Network Planning; Genetic Algorithm;
Simulation
757
In the network planning G = (V, E, W, S), V
and E reflect the basic structure of the workflow
network planning. The state variation of V and E
influenced by W and S reflects the dynamics of the
workflow network.
758
Table 1. Chromosome encoding. The model could establish seamless integration
with the simulation model. The basic steps of
One chromosome forming the scheduling strategy are shown below:
No. 1 production No. 2 production No. 3 production 1. Initialisation
routine routine routine … For a fixed population size, the genetic algorithm
Des1-Res1- Des2-Res2- Des1-Res2-
parameter (variation and crossover operation),
Exv4-Bof1 Exv5-Bof2 Exv4-Bof6 maximal cyclic iteration and initial population
should be determined.
2. Integrating of the genetic algorithm model and
the simulation model
Added the optimal function of the genetic algo-
rithm to Plant-simulation, such as “GA Wizard”,
and “GA Sequence” task type.
3. Simulation optimising control
Input each chromosome of the population into the
simulation model. The adaptation value of each
chromosome could be obtained after the simula-
tion. According to the adaptation value, the prob-
Figure 2. Example of chromosome crossing. ability of coming into the next generation could be
determined. The algorithm was executed circularly
and stopped when requirements were met. The
hybrid optimal diagram of the genetic algorithm
and simulation is shown in Figure 4.
759
The production time of each workstation was In the example, the crossing probability of the
input, and the procedure obeyed the rule of ‘first- genetic algorithm model was set as 0.8. The varia-
in, first-out’. The work site was controlled dynami- tion probability was 0.1 and the adaptation function
cally by the process control object. The simulation was minimum work time. The initial number of the
model is shown partly in Figure 5. population was set as 40 and evolution generation
as 100. The simulation result is shown in Table 2.
The converge diagram of the genetic algorithm
was shown in Figure 6.
The simulation result demonstrated that the
simulation model integrating the genetic algo-
rithm could solve production scheduling optimis-
ing more scientifically and reasonably. It could be
applied to promote productivity.
5 CONCLUSION
760
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Li Xu, Jie Niu, Dehua Zou, Li Tang, Lanlan Liu & Wen Li
Live Working Centre of State Grid Corporation of Hunan, Changsha, China
Yanyi Fu
State Grid Xiangxi Power Supply Company, Xiangxi, China
ABSTRACT: Live work is not the only way of implementation for complex live operation projects; the
operation without power distribution line failure is another solution. The transition from live work to
non-outage operation, and handling complex live operation projects with simple non-outage operation,
is an effective way to reduce the security risk and improve the safety of live working. According to the
characteristics of the power network and the requirement of live working, a most widely used non-outage
maintenance method is explored, that is the “bridge construction method”.
761
region has explored a most widely used non- in the appropriate position under the switch, and
outage maintenance method called the “bridge connect the bypass cable and the leading wire
construction method”. Taking the replacement which connected the two sides of the switch by
of the pole-mounted load-breaking switch with the conventional method of non-outage drainage
load as an example, simply explains the operation line connecting, and the switch should be placed in
principle of the bridge construction method. The the position of the break-brake when connecting.
distribution line is equipped with equipment such When the connection is completed, put the
as a large number of pole-mounted load-breaking operate switch in the position of the close-brake,
switches (Figure 1) and isolation switches. and then make sure that the electricity—nuclear
During the operation, the replacement of equip- phase are all correct. At this time, the line load cur-
ment with load is usually needed because of equip- rent will pass through the main line, bypass cable,
ment failure. This work will be extremely complex and switching circuit respectively. Then use the
if it is carried out with load on. On the one hand, hard insulated wire in the way of live work, as is
the structure of the tension bar itself is complex, shown in Figure 3. Break the leading line at both
which makes the work difficult. On the other hand, ends of the operating point. Because of the exist-
to replace the pole-mounted load-breaking switch, ence of the bypass cable, the line load current will
not only six switch leads and between three and be transferred quickly to the bypass cable; at this
six arrester leads will be added, but also three divi- time the operation is only equivalent to a simple
sional insulation lines. So by simply live working line of charged break.
with load to replace such equipment, either the Operating points at both ends of the leading
covering or the replacement of equipment, will all line off after, a power cut (oval area) was built
lead to the construction difficulty and time waste, and completed, within this range, operators to
which in turn brings high risk. If instead a bypass perform good power outage, prove electricity,
load switch and cable down lead are used to build after the ground wire and other safety measures,
a power outage area to implement the replace- can carry out the construction work, security is
ment of switch by the way of building a bridge, greatly improved; After construction, in reverse
the above risks can be easily resolved as shown in order, the connection of the main wire is restored
Figure 2. Temporarily install a bypass load switch by using a conducting wire in the reverse order
(Figure 4). Remove the bypass cable and bypass
switch, construction of the bridge construction
method with load replacement switch is the end
of the report.
762
3 JOB STEPS
763
implementation of the complex live. Although the complex live work to implement the simplest class of
short time to stop on the terminal connected to a one charged off, the general power cut construction
power supply users, but the continuous supply of work carried out by the operation of the drain line
all power customers on the main line of the termi- and the power cut. Using the method of the con-
nal bar is guaranteed (short-term power failure is struction of the non-power cut operation to solve
also the goal of non-power failure operations), it the risk of complicated electricity operation, greatly
can also effectively solve the security risks of car- reduces the risk of operations. Operating strength
rying out live work on the terminal rod which is also decreases, fundamentally solving the problem
extremely poor in the environment. of carrying out the personal safety risk of the high
work brought by the complicated live work.
5 CONCLUSION
REFERENCES
The essence of the bridge construction method is
to use a bypass load switch and bypass cable, com- Chinese Standards. Technical guide for live working in dis-
monly used in distribution line, using specially tribution line (Standard No. GB/T 18857–2008).
developed hard insulated wire, on both sides of Hu, Y., ang L., Liu S. et al. The way of live working and
the rod to build a temporary segment, the imple- safety protection. High Voltage Technology, 26(5),
34–35.
mentation of a small bypass operation in the range Li, G. et al. (2007). Design and construction, operation and
of this bar. Using the method of non-power fail- maintenance of power distribution lines. Beijing: China
ure operation, it is very dangerous and very com- Electric Power Press.
plex to implement the simplest operation of the Liang, H. (2002). Distribution line. Beijing: China Elec-
two charged off line, two time line and power cut tric Power Press.
off the implementation of the general power out- Sun, C. et al. (2005). Manual of power distribution lines.
age. Temporary cut-off-the-wire method involves Beijing: China Electric Power Press.
764
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: Differing from the traditional logistics network site selection problem, this paper aims at
the optimisation of freight task, considering the unreliability of logistics network systems caused by col-
lection-distribution centre failures, establishing a layout optimisation model of logistics networks based
on imperfect information by extending the classical Uncapacitated Fixed-charge Location (UFL) model,
thus effectively reducing loss caused by facilities’ failures and improving the stability of logistics network
systems.
765
3.1.1 Definition of related set
I: Set of demand points i;
J: Set of alternative collection-distribution
centres j;
J : Set of alternative collection-distribution
centres J with virtual collection-distribution cen-
tres j0 J = J {J 0 }
J*: Set of built collection-distribution centres J;
Ji∗ : Set of collection-distribution centres
accessed from demand points i in any freight task;
Ji∗ : Set of collection-distribution centres and
virtual collection-distribution centres accessed
from demand point i in any freight task;
J j+ ; : Set of accessed points before alternative
⎧ J j j0 ;
collection-distribution centres j J + = ⎨ ;
−
j
⎩ J \ { j }, j J ;
J : Set of accessed points after alternative col-
j
{ j } j j0 ;
lection-distribution centres, j J − = ⎧⎨ 0 j J;
j ⎩ \ { j }, j J ;
J
766
y = S.T.
ijj ′r
⎧1,Freight task from demand point i to the
⎪ (r-1)-tth visit collecting-distributing center ∑y ij ∀i ∈ I (2)
⎨ j , the i it is j ′,∀r = 2, ,R
h r-th vis ; j J
⎪ R
⎩ 0, other yij + ∑ ∑y ijj ′r ≤ xi , ∀i ∈ I j ∈ J (3)
r = 2 j ′ J +j
⎛
⎜ + h (c ⋅ u + c ⋅ w ) d ⋅ y + ⎞ ⎟ R
⎜ ∑ ∑ ⎜ ∑∑ ⋅ ⎟ ⎟
r −1
q d y
⎝
i
⎠
j 2 j iij ij
−
ijj
j r
′ ′
ijj r
4.1 Data complement
i ⎜⎜ ⎟
i I j J r=2
′
j J j
Min
⎛ s s ⎞⎛ ⎞⎟ R 4.1.1 Demand points data
⎜ + ∑ h ∑ u ⋅ + w ⋅ ⎜ d ⋅ y + ∑ ∑ q ⋅d y ⎟ ⎟
X ,U ,W ,Y ,Y ′
r −1
In this paper, demand points are divided into 16
1 2
⎝ v v ⎠⎝
′
⎠⎟
i j j ij ij
ij ijj r ijj r
⎜ i I j J
1 2 ′
− r=2
parts according to the districts, freight volume of
⎜ + ∑ h ∑ (u ⋅ z + ⋅ ) ⎟
j J j
⎝ i j
⎠ 1 j 2 each points in Table 1 is set in accordance with the
i ∈I j ∈J
proportion of population. Further to this, Table 2
(1) shows the location of each centre.
767
Table 1. Freight volume of each point in 2012. dinates of A and B are defined as A (LonA, LatA)
and B (LonB, LatB) and d is the distance from A
Population Freight Volume to B.
District (Million) (Million tons)
( )
Chaoyang 376.67 4761.335971
sin( MLatA) si ( MLatB ) ⋅ cos(MLonA −
MLatB
Fengtai 223.72 2827.955726 C= (15)
MLonB ) + cos(( MLatA
MLattA) cos(ML
M at
a B)
Shijingshan 63.9 807.7345382
Haidian 348.43 4404.365339
Fangshan 98.65 1246.995496
Tongzhou 126.26 1596.002548 4.1.4 Other parameters
Shunyi 92.61 1170.646253 Penalty cost δ = 100,0000 Y, and R = 6, q = 0.03;
Changping 174.4 2204.521181 Average speed of road transportation is 75 km/h;
Daxing 143.53 1814.305763 Unit cost of transportation and warehousing is
Mentougou 30.65 387.4344851 5,000 Y/million tons*km; Average speed of road
Huairou 40.17 507.7730266 transportation is 85 km/h; Unit cost of transporta-
Pinggu 43.68 552.1415435 tion and warehousing is 2,500 Y/million tons*km,
Miyun 47.4 599.1645871 handling costs for railway is 50,0000 Y/million
Yanqing 32.33 408.6706983 tons*km.
Total 2069.3 26157.2
4.2 Result and discussion
Table 2. Location of alternative centres and fixed con-
According to the original data and parameters, the
struction costs.
results obtained using Gurobi6.5.0 and Eclipse3.1
Alternative Fixed costs with java interface.
centre Longitude Latitude (Yuan)
4.2.1 Result of site selection in Beijing
1 115.9144 40.50884 3048000 Using the basic data of 2012 and 2013, the results
2 116.2052 40.22605 2226000 are identical for both years (2012 and 2013). Fig-
3 116.6813 40.33467 4998000 ure 3 presents the result for site selection, and 14
4 116.6319 40.25716 3048000 collection-distribution centres are selected from 21
5 117.0077 40.07009 3048000 alternative points.
6 116.0904 39.99113 4998000 Figure 3 marks the position of each collection-
7 116.3393 40.02506 3906000 distribution centre (the black points and numbers
8 116.454 40.01769 4998000 show the alternative points, while red represents
9 115.9603 39.82563 3048000 the demand points, the triangles are the selected
10 116.1468 39.88132 2226000 collection-distribution centres, and the red lines
11 116.2113 39.92528 3906000 are the path of freight task). 16 sets of demand
12 116.2247 39.84796 3048000 points, corresponding to the 14 sets of collection-
13 116.3105 39.90171 6276000 distribution centres, each of which is closest to the
14 116.542 39.9185 3048000
demand point. The demand points 2 and 3 cor-
15 116.5993 39.91103 2226000
respond to the same alternative point 3 and the
16 116.4761 39.84263 4998000
demand point 11 and 12 correspond to the same
17 116.4244 39.79022 1545000
point 13.
18 116.6287 39.79626 1545000
19 115.9369 39.68469 3048000
20 116.0935 39.70794 1545000
4.2.2 The path to the collection-distribution
21 116.3283 39.70364 1545000
centres in freight task
The number of collection-distribution centres allo-
cated for each demand point is R = 6. According
4.1.2 Alternative points data to Eq. (2), a virtual collection-distribution centre
There are 21 alternative points, numbered 1–21, is the last point to visit in every freight task, so the
the land benchmark price is set as the fixed con- 6th visit is marked as 0. Table 3 shows the order of
struction cost of each alternative point. the freight task access to centres for each demand
point.
4.1.3 Distance of each point Table 3 shows the different path from the
Demand points and alternative points are both in demand points to centres. Each collection-distri-
latitude and longitude co-ordinates. So the co-or- bution centre can be obtained from demand point.
768
exists, freight task can also be taken by other cen-
tres. So the complementarity between centres can
maintain the stability of the logistics network in
Beijing to some extent, and thus reduce the loss
caused by the failures of the facilities.
5 CONCLUSION
769
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: Smart logistics is based on an emerging technology, Internet of Things (IOT), whose idea
is consistent with the automated, networked, visual, real-time, tracking and intelligent control development
tendency of modern logistics industry. It can greatly reduce the cost of various industries and promote the
upgrading of industry. It is the development tendency of future logistics. The transformation and upgrad-
ing from traditional logistics industry to “smart logistics” is an inevitable trend of social development. This
paper is focused on the basic concept of IOT and smart logistics to analyse the main problems existing in
the development of current smart logistics. Meanwhile, corresponding countermeasures and suggestions
are proposed for such problem so as to better promote the development of smart logistics.
771
Figure 1. Structure of Internet of Things.
Figure 2. Technical structure of smart logistics. 3.1 Problems in government regulation system
industry, as well as the operation pattern of smart First, there are conflicting policies from different
logistics with informatisation, intelligentisation and departments. The development of smart logistics
system automation. It mainly takes advantage of industry needs to integrate the latest achievements
high technology and modern management means of multiple industries including products produc-
to realise the high-efficiency and low-cost intelligent tion, commerce circulation and information tech-
operation of logistics distribution system. nology etc. The fuzzy definition of administration
The technical structure of smart logistics is based authority and the multi-administrative manage-
on the three-layer technical structure of IOT. Accord- ment pattern have set the multi-level administra-
ing to the application requirement of modern logis- tive obstacles.
tics, each layer should be refined to provide a more Second, government and business functions are
effective technical support for modern logistics. Actu- mixed together. For a long time, the government
ally, the implementation process is composed of five power of our country is too concentrated. The
steps. First, consider to realise the real-time sharing administrative service divisions fail to realise the
and mutual communication of basics IOT. Second, power of market in the resource allocation suffi-
consider to perceive the information of each logistics ciently. They adopt the method that the government
activity, integrate the information of logistics and directly control enterprises to enforce the develop-
IOT, and guarantee the informatisation of logistics ment strategy of smart logistics industry made by
process of things. The third step is to take advantage the government. This tends to cause the mismatch-
of automation technology to realise the automation ing in resource allocation of smart logistics industry
of handling process of things so as to reduce the development and reduce the allocation efficiency of
strength of logistics handling and improve the accu- smart logistics resource.
racy of logistics. The fourth step is to use information
technology to connect each logistics activity in series, 3.2 Problems in industrial technology
so as to realise the integration of information in the
whole logistics process. The last step is to make an in- First, logistics enterprises lack the necessary man-
depth analysis for each logistics activity, continually agement technology to implement smart logistics.
taking advantage of internet technology to deeply At present, logistics enterprises have the problem
optimise the logistics activity and finally realise the to value the logistics facility and neglect the logis-
smart logistics. Refer to Figure 2 for details. tics software, which makes them have an insuffi-
cient modern logistics management philosophy.
Second, logistics enterprises lack the necessary
3 RESTRICTION AND PROBLEM engineering technology to implement smart logis-
OF DEVELOPMENT FOR SMART tics. In consideration of saving the investment cost
LOGISTICS OF OUR COUNTRY of logistics equipment at the initial stage, part of
enterprises chooses the manpower to replace logis-
In general, many advanced modern logistics sys- tics equipment to rapidly promote the construc-
tems in our country have been provided with the tion of product logistics network.
772
3.3 Logistics enterprise’s own problem 4 COUNTERMEASURE AND
SUGGESTION TO PROMOTE THE
Small scale, scattered layout and disordered man-
DEVELOPMENT OF SMART LOGISTICS
agement exist in logistics enterprises. At present,
IN OUR COUNTRY
although many enterprises have begun to use IOT
technology to build the smart logistics system, the
4.1 Perfect the management system of smart
scales of these enterprises are not generally large,
logistics
and it is difficult to form the industrial cluster.
Most of middle and small-sized enterprises have First, government administrative departments
difficulties in logistics informatisation, where the should make the planning scheme of smart logistics
management does not pay sufficient attention to from the perspective of supporting the social and
the application of information technology due economic development. In the macroscopic view,
to lack of corresponding talents and capital. The government administrative departments should inte-
supporting basic facilities still cannot be met even grate the administrative resources by changing the
though the technology related to smart logistics phenomenon that each department works for itself,
has been introduced, which causes the enterprise so as to effectively promote the healthy development
benefit to not obviously improve. of smart logistics. In the microcosmic view, govern-
ment administrative departments should break the
industry monopoly by deactivating the mechanism
3.4 Standardisation problem that the executive power excessively intervenes with
Smart logistics is established based on the stand- the market resource allocation so as to facilitate
ardisation of logistics information, which requires the multi-industry integration of logistics industry
realising the standardisation in the aspects related and information industry. Second, vigorously pro-
to codes like coding, file format, data interface, mote the construction of an authoritative indus-
Electronic Data Interchange (EDI) and global trial coordinating institution. The operation of the
positioning system (GPS) etc., so as to remove the logistics industry is the product of comprehensive
information communication barriers among dif- cooperation between multiple relevant industries.
ferent enterprises. Compared with the developed The industrial coordinating institution can take full
countries, a lot of logistics information platforms advantage of its industrial organisational ability and
and information systems all follow their own speci- information resource convergence ability to enhance
fication, which makes it is difficult to realise the the overall competitiveness and common interests of
information exchange and sharing among enter- logistics enterprises and effectively control the inter-
prises, platforms and organisations. It is hard for nal bad enterprise behaviours of the logistics indus-
the whole electronic IOT to realise compatibility. try. Finally, take the smart logistics project as the key
It is difficult for data to exchange. The complete support project in the aspect of financial policy.
and smooth supply chain of commodities from
production, circulation to consumption etc. is hard
to form, which has seriously affected the manage- 4.2 Optimise standard system of smart
ment of logistics industry and the operation of logistics industry
e-commerce, and restricted the industrialisation First, the standard system of smart logistics indus-
of smart logistics products and the engineering of try should form a unified standard in the transport
application. formats of logistics code and logistics information,
which is beneficial to removing the information
interaction barrier among various enterprises in
3.5 Lack of professional talents
different regions, so as to provide a standardisation
With the rapid development of the logistics system guarantee for products to carry out logis-
industry, the problem of talent demand has been tics and sales activities in a wider range.
highlighted increasingly in our country. The scar- Second, establish the professional organisation
city of talent in smart logistics has become the supporting the standardisation of the smart logis-
bottleneck restricting the logistics development tics industry. The formulation and implementation
of our country. At present, our country needs the for standards of the smart logistics industry is a
talents in logistics industry, at least 300,000. The systematic project. It needs to establish a unified
majority of logistics enterprises lack the high- and coordinated organisation specialised in the
quality skilled talents at the front line of logis- smart logistics industry to scientifically plan the
tics and the high-level compound talents who are technological development route of departments
familiar with not only logistics management but related to smart logistics business, and compre-
also operation regulations of modern logistics hensively allocate the limited logistics equipment
informatisation. resource and financial resource.
773
4.3 Make the planning of logistics development, with IOT, Cloud Computing, the Internet and
and establish the sound relevant policies other technologies provides the information serv-
and regulations ice in real-time, including goods distribution, intel-
ligent tracing and customer enquiry etc.
For the problems in the logistics enterprises of our
country (such aslarge quantity, small scale and back-
ward management), it is necessary for the central 4.6 Speed up the development and cultivation
government to plan the development of the logistics of logistics talent resources
industry, introduce the development strategy of the
Talent resource is called the “soft power” of enter-
logistics industry and cultivate a number of model
prise. For a series of problems existing in the devel-
enterprises in smart logistics industry with a high
opment of smart logistics, it is a must to speed up
informationalised level and demonstration-promo-
the development and cultivation of logistics talent
tion ability, so as to promote the development of
resource. First, actively introduce the excellent pro-
the same industry and other enterprises. Perfect the
fessional talent through favourable policy and high
relevant laws and regulations to create a fair and
reward to enrich the talent team of enterprise. Sec-
orderly market environment, remove the market
ond, strengthen the training for existing staff to
barrier of each region and make production factors
improve their overall quality. Third, establish the
flow freely. Optimise resource allocation accord-
effective evaluation and incentive mechanism to fully
ingly to form a unified, open and orderly market so
motivate the staff and strengthen their cohesion and
as to better protect the legal interests of operators,
working force. Fourth, establish the learning-based
safeguard the legitimate interests of logistics users,
organisation to carry out the activities in rationali-
and realise the legislation, standardisation and sys-
sation proposal, quality management and innova-
temisation of the logistics industry.
tion, or carry out team learning etc. for the actual
problems encountered, so as to exchange ideas, share
4.4 Speed up the construction of standard system experience and strengthen enterprise vitality.
for logistics informatisation
First, speed up the research and formulation of tech- 5 CONCLUSION
nology, code, safety, management and service stand-
ards in logistics information. Second, research and As a new concept, smart logistics brings the new
spread the application standard of bar code, radio opportunity and challenge for the operation and
frequency identification and other technologies management of modern logistics. Globalisation,
in the business of storage, distribution, container intelligentization and professionalisation are the
and cold chain etc. Promote the standard system development tendencies of the modern logistics
of logistics informatisation application in the key industry. The development of IOT has provided the
industries to gradually become perfect, including the advantageous technical guarantee for the realisa-
automobile and its parts, food, drug, textile, agricul- tion of smart logistics. With the vigorous develop-
tural materials and agricultural products etc. Finally, ment of IOT technology, logistics technology will
promote the linking of the logistics informatisation be developed in the direction of intelligentization
standard among data layer, application layer and and visualisation. Smart logistics will be the next
exchange layer etc. to push the construction of the stage of informationalised logistics, which also is
standard system in logistics informatisation. the general trend of modern logistics development.
774
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
ABSTRACT: Because of the specialty using Plant Simulation to simulate missile assembly and not suit-
able for production designation, this paper presents a simulation template based on plant simulation. The
input parameters and the solving process are templated, parameterised and standardised in the simulation
template. Then, the template was used to simulate the missile assembly production process, which proved
the validity of the template.
1 INTRODUCTION
2 SCENARIO OVERVIEW
775
3 BUILT-IN DEVELOPMENT MODE
3.1 UI modelling
In plant simulation, you can use a dialogue con-
trol to receive the final user’s input, as shown in Figure 4. UI control sort.
Figure 3.
The Kind of dialogue control can meet basic
requirements, but there are several limitations as
described below:
1. The dialogue control cannot be used until the
plant simulation is run. For user who are unfa-
miliar with the software, the use of this pattern is
difficult, even leading to the wrong operation.
2. There is little UI control, few form and limited
scalability, as shown in Figure 4.
3. The creation process is complex and there is no
visual function. As shown in Figure 5, the coor-
dinates need to be input manually for creating a
simple textbox control, and the size of the text-
Figure 5. Static textbox control.
box is non-adjustable.
776
4 DEVELOPMENT KEY POINTS BASED
PLANT SIMULATION COM INTERFACE
777
through changing the parameters on the applica-
tion interface, and it greatly increases simulation
efficiency. The template can be extended to other
application scenarios. If reprocessing can auto-
matically extract relevant output data, the template
can cooperate iSight or ModelCenter software to
make the whole process fitting, optimised or DOE.
We can then find the correlation in the whole
parameter space and find the best designation
point.
REFERENCES
778
Automotive, Mechanical and Electrical Engineering – Liu (Ed.)
© 2017 Taylor & Francis Group, London, ISBN 978-1-138-62951-6
Author index
779
Li, H. 543, 553 Liu, Z. 89 Song, H. 161
Li, H. 701 Liu, Z. 189 Song, H. 313
Li, H. 709 Lou, P. 203 Su, X. 775
Li, J. 193 Lu, L. 419 Su, Z. 9
Li, J. 559 Lu, L. 645 Sun, H. 119
Li, K. 501, 651 Lu, M. 549 Sun, J. 123
Li, M. 591 Lu, T. 151, 681 Sun, J. 207
Li, R. 419 Lu, X. 613 Sun, W. 161
Li, R. 655 Lu, Z. 127 Sun, X.H. 167
Li, S. 127 Lu, Z. 405, 443 Sun, Y. 363
Li, S. 349 Luo, J. 333 Sun, Y. 581
Li, S. 389 Lv, K. 269, 273 Sun, Y.T. 501
Li, S. 481 Lv, X. 357 Sun, Z. 591
Li, S.G. 515
Li, W. 175, 395 Ma, J. 597 Tan, B. 507
Li, W. 203 Ma, L. 69, 367 Tan, L. 651
Li, W. 761 Ma, L. 515 Tan, R. 161
Li, X. 57 Ma, L. 775 Tan, Z. 215
Li, X. 185 Ma, M. 771 Tang, H. 371
Li, X. 203 Ma, Z. 569 Tang, J. 123
Li, X. 409 Meng, H. 639, 655 Tang, L. 761
Li, X. 633 Ming, A. 313 Tang, S.C. 515
Li, Y. 289 Mo, J. 157 Tang, W. 203
Li, Y. 299 Mo, Y. 669 Tao, S. 691
Li, Y. 313 Mu, X. 181 Tao, Y. 507
Li, Y. 451 Tian, C.Y. 353
Li, Y. 757 Ni, F. 175, 395 Tian, Y. 605
Li, Y.D. 501 Ning, C.D. 353 Tian, Z. 139
Li, Z. 89 Niu, J. 761
Li, Z. 357 Wan, J. 181, 211
Li, Z. 427 Pan, B. 293 Wan, R. 277, 293
Li, Z. 669 Pei, L. 691 Wang, A. 349
Lin, Z. 525 Peng, W. 443 Wang, B. 321
Lin, Z. 675 Peng, Y. 455 Wang, D. 651
Liu, C. 9 Wang, G. 57
Liu, F. 639 Qin, P. 375 Wang, G. 687
Liu, J. 239 Qiu, Y. 339 Wang, H. 299
Liu, J. 461 Quan, H. 175, 395 Wang, H. 605
Liu, J. 491 Quan, J. 119 Wang, H. 605
Liu, L. 761 Wang, H. 633
Liu, M. 501 Ran, J. 223 Wang, J. 133
Liu, H. 305 Ren, B. 75 Wang, J. 277, 293
Liu, H. 321 Ren, J. 145 Wang, J. 669
Liu, Q. 447 Ren, Q. 431, 437 Wang, K. 239
Liu, S. 357 Ren, Y. 123, 181 Wang, K. 695
Liu, S. 569 Ren, Y. 211 Wang, L. 455
Liu, T. 219 Ren, Z. 605, 723 Wang, L. 687
Liu, T. 687 Ruan, N. 539 Wang, M. 321
Liu, W. 133 Wang, P. 525, 621, 627
Liu, W. 675 Sha, Y. 591 Wang, P. 639
Liu, X. 207 Shang, G. 23 Wang, S. 713
Liu, Y. 41 Shang, H. 215 Wang, X. 381
Liu, Y. 185 Shao, M.S. 485 Wang, X. 591
Liu, Y. 263 Shao, Y. 569 Wang, X. 597, 765
Liu, Y. 663 Shi, P. 133 Wang, X. 695
Liu, Z. 35 Shi, Z. 89 Wang, Y. 3
Liu, Z. 57 Shi, Z. 263 Wang, Y. 203
780
Wang, Y. 357 Yang, B. 427 Zhang, P. 65
Wang, Y. 563 Yang, C. 31 Zhang, P. 475
Wang, Y. 575, 581 Yang, F. 277, 293 Zhang, P. 639, 655
Wang, Y. 591, 605, 723 Yang, G. 253 Zhang, Q. 57
Wang, Y. 609 Yang, J. 511 Zhang, W. 313
Wang, Y. 633 Yang, L. 765 Zhang, X. 27, 49
Wang, Y.F. 167 Yang, Y. 207 Zhang, X. 181, 211
Wang, Z. 381 Yang, Y. 733, 741 Zhang, X. 497
Wang, Z. 575 Yang, Z. 313 Zhang, X.Z. 485
Wang, Z. 723 Yang, Z. 663 Zhang, Y. 139
Wei, K. 75 Yao, S. 507 Zhang, Y. 349
Wei, N. 727 Ye, B. 727 Zhang, Y. 471
Wei, Y. 9 Ye, J. 765 Zhang, Z. 69
Wen, F. 231, 283 Yi, B.F. 515 Zhang, Z. 127
Wen, X. 475 Yi, X. 99 Zhang, Z. 757, 775
Wu, H. 559 Yi, Z. 211 Zhao, B. 253
Wu, P. 207 Yin, D. 263 Zhao, L. 31
Wu, Q. 85 Yin, H. 511 Zhao, L. 381
Wu, Q. 215 Yin, J.L. 167 Zhao, L. 597
Wu, X. 15 Yin, X. 41 Zhao, S. 639
Yin, Y. 99 Zhen, G. 203
Xia, J.B. 167 Yu, F. 621 Zhen, G. 753
Xia, L. 651 Yu, H. 115 Zhen, Q. 23
Xiao, D. 701 Yu, H. 563 Zheng, H. 507
Xiao, W. 269 Yu, S. 157 Zheng, S. 357
Xiao, X. 207 Yu, T. 109 Zheng, W. 419
Xie, J. 85 Yu, X. 257 Zheng, X. 145
Xie, J. 559 Yuan, C. 305 Zheng, X. 443
Xie, X. 549 Yuan, L. 197 Zheng, X. 675
Xie, Z. 99 Yuan, R. 401 Zhou, H. 723
Xing, J. 659 Yue, S. 669 Zhou, J. 35
Xing, Y. 41 Yue, T. 257 Zhou, J. 65
Xiong, M. 419 Zhou, J. 123
Xu, F. 9 Zha, C. 695 Zhou, K. 245
Xu, F. 273 Zhai, C. 103 Zhou, S. 203
Xu, H. 591 Zhang, B. 109 Zhou, T. 263
Xu, J. 675 Zhang, B. 299 Zhou, X. 239
Xu, J. 695 Zhang, H. 123 Zhou, Y. 103
Xu, J. 709 Zhang, H. 321 Zhou, Y. 333
Xu, L. 481 Zhang, H. 471 Zhou, Y. 709
Xu, L. 761 Zhang, H. 701 Zhu, F. 727
Xu, W. 587 Zhang, J. 273 Zhu, G. 531
Xu, X. 15, 663 Zhang, J. 327 Zhu, H. 345
Xu, Y. 273 Zhang, J. 367 Zhu, L. 507
Xu, Y. 401 Zhang, J. 389 Zhu, X. 31
Xu, Z. 139 Zhang, J. 471 Zhu, X. 633
Zhang, J. 609 Zong, Y. 151, 681
Yan, C. 447 Zhang, L. 269 Zou, D. 761
Yan, H. 161 Zhang, L. 507 Zou, S. 569
Yan, L. 709 Zhang, L. 709 Zuo, X. 401
Yan, W. 461 Zhang, M. 409
781