Laser cutting medical care bed opens a new era of technology elderly care

Laser cutting medical care bed opens a new era of technology elderly care

The aging era of China is coming. According to statistics, the proportion of people over 65 in China has risen to more than 13%. According to internationally recognized standards, 7%-14% of the population over 65 is slightly aging, 14% -20% is moderate aging, and 20%-40% is severe aging. In other words, China is already on the brink of moderate aging.

 

Once a person is getting old, then they walk or run slowly, especially the disabled elderly who lose the ability to take care of themselves, they only rely on family care. Have you encountered the following nursing troubles? Such as eat, stand up, go to the toilet, wash hair, infusion, and sit up. Traditional nursing care is exhausting as both the old and caregivers are suffering.

PTJ has more than decades of experience in China and can offer one-stop 3d Printing service (3d printing parts & CNC machining prototype) for our OEM customers.

 

These troubles can be solved by a modern nursing bed. With the development of medical and health services, scientific and technological elderly care has become the norm, and patients have received better care. Like a medical care bed, it has evolved from a single lying function to a composite medical furniture integrating multiple functions, such as raising back and legs, turning over, infusion, eating, defecation, guardrails and moving, which satisfies different people, including the elderly, in the aspects of treatment, rehabilitation, and life. Literally, having a modern nursing bed which makes nursing more convenient, comfortable and safe for family.

 

In China, the nursing bed market is developing rapidly. On the one hand, the potential needs of disabled elderly and home patients are being tapped, especially for elderly care needs. On the other hand, the price is not that high, which makes most families afford. That depends on the rise of China's manufacturing industry, which has greatly reduced the manufacturing cost of the entire product. For example, pipe cutting, which accounts for a large proportion in the production of nursing beds. Therefore, it has been gradually introduced into the pipe processing flow of nursing beds in recent years, and it meets the design requirements of the high-end market of nursing beds and reducing costs.

 

The manufacture of nursing beds is not easy. Take metal pipes with a lot of materials as an example, there are amount of pipe parts with shape of long or short, round or square needed to be processed including bed body, back frame, turning frame, beam frame, protective fence, rocking handle, infusion stand and so on. At the same time, each pipe component will be designed with multiple openings of different sizes and positions to simplify the subsequent assembly of the pipe components of the nursing bed. Therefore, the functions of raising the back, raising the legs, turning over, and armrests can be achieved. The more functions and the more complex the design, the less conducive to production, which is undoubtedly a huge challenges of pipe processing.

 

In terms of the production investment and production quality of metal pipe parts in each part of the nursing bed, it consumes a lot of molds, manpower and high investment costs, compared with traditional pipe processing methods that require multiple processes such as cutting, punching, and drilling. However, the tube processing needs of the nursing bed can be met by the fully automatic fiber laser tube Cutting Machine. Since that allows the nursing bed to have higher production efficiency, better product quality and lower processing costs.

 


Advantages of fully automatic fiber laser tube cutting machine

1. Low investment cost: mold-less production, avoiding the expensive cost of manufacturing, replacing, maintaining and storing molds;

2. Short preparation cycle: the traditional stamping and blanking mold manufacturing, trial, and optimization links are omitted, and the production preparation cycle that takes only one day or even a few hours can be completed;

3. Highly flexible production: It can process different metal pipes such as stainless steel pipes, aluminum pipes, copper pipes, and there is no restriction on the product outline. Square pipes, round pipes, special-shaped pipes can be cut;

4. High-speed and intelligent: automatic loading and unloading, automatic calibration and detection, automatic setting of the optimal processing path, automatic cutting after programming, and general workers can be employed after training, which saves labor costs;

5. Realization of complex design: there is non-contact laser cutting has no restrictions of non-contact laser cutting, and it makes the processing of any graphics easier, and meets the design needs of mid-to-high-end nursing beds;

6. High cutting quality: capacitive fiber laser cutting head, high-precision servo motor drive, and high-precision transmission mechanism achieve high accuracy in size, position and trajectory. The non-contact cutting process ensures that the pipe does not produce surface crack to obtain better edge quality than punching blanking. It can be directly used for welding without secondary grinding.

 

Satisfying the needs of nursing staff and patients for equality, care, efficiency, and humanization, enhancing medical social interaction, and extending the life cycle are all necessary for an excellent medical care bed.

 

As an excellent medical care bed processing equipment, the fully automatic fiber laser tube cutting machine brings the feeling of care and efficiency to the processing enterprise: a more user-friendly operation design greatly reduces manpower consumption and makes operators get rid of repetitive, heavy manual labor and dangerous operations; more efficient and energy-saving characteristics make the company's unit productivity higher and bring huge profits to the company; at the same time, laser cutting brings a new degree of processing freedom and also helps designers put forward their ideas, optimize the design, and make the nursing bed experience better.

 

Recommended -HyTube series fully automatic fiber laser tube cutting machine

 

Features of automatic fiber laser tube cutting machine:

CCD pipe section recognition system;

Automatic bundle feeding system;

Automatic sorting system for finished pipe fittings;

Floating trusteeship for pipes;

Intelligent remote monitoring system;

Automatic measurement system for tube sheet length.

 

Materials:

Carbon steel tube cutting, aluminum alloy tube cutting, stainless steel tube cutting, titanium alloy tube cutting.

 

Link to this article:Laser cutting medical care bed opens a new era of technology elderly care

Reprint Statement: If there are no special instructions, all articles on this site are original. Please indicate the source for reprinting.:Cut Wiki,Thanks!^^

China Top additive manufacturing company that specializes in additive technologies:DLP, Carbon Digital Light Synthesis (DLS), HP Multi Jet Fusion (MJF), Stratasys FDM, select laser sintering (SLS), binder jetting, SLA,direct metal laser sintering (DMLS) and more. PTJ 3D Printing Company can help you discover new applications for additive, design applications, manufacture industrial-grade parts and fulfill at scale. Meets AS9100D standards.

Design Ideas of Navigation Software Based on Embedded Linux System

With the popularization of various vehicles such as automobiles, the demand for vehicle navigation devices has become increasingly strong. as in-vehicle equipment. Not only reliable performance, but also portability, low power consumption, and low price. And the design scheme of GPS navigation terminal, which adopts the embedded system based on ARM microprocessor and GPS module, can well meet the requirements of this system. To this end, this paper introduces the software and hardware structure and design method of a terminal that uses ARM9 development board and GPS module to realize GPS navigation function.

1 Introduction

With the popularization of various vehicles such as automobiles, the demand for vehicle navigation devices has become increasingly strong. as in-vehicle equipment. Not only reliable performance, but also portability, low power consumption, and low price. And the design scheme of GPS navigation terminal, which adopts the embedded system based on ARM microprocessor and GPS module, can well meet the requirements of this system. To this end, this paper introduces the software and hardware structure and design method of a terminal that uses ARM9 development board and GPS module to realize GPS navigation function.

2 GPS navigation system structure

The GPS global positioning and navigation system introduced in this paper can be divided into five parts: embedded main control module, GPS module, Display module, expansion module and power supply module according to its functions.

The embedded main control module is based on the S3C2440 processor and is mainly responsible for the response, processing and control of the GPS navigation module data. In hardware, the main control module is an embedded development board, including touch LCD interface circuit, SD card interface circuit, FLASH, SDRAM, etc. In software, the embedded Linux system should be run on the main control module. The main function of the embedded Linux operating system is to manage the program module process and schedule the process.

The GPS module is mainly used to receive navigation satellite data and send it to the main control module in a specific format. The Display module can choose 3.5-inch TFT LCD with touch screen, which is mainly used to interact with users. The expansion module mainly refers to the SD card. The power supply module mainly provides power for the normal operation of the system. Figure 1 shows the structure of the system.

3 Extraction of GPS data

The output sentences of the GR-87 GPS module follow the NMEA-0183 standard. The standard sentences all start with “$” and end with “CR” and “LF”. “$” is followed by a 5-character address, the first two characters are the sender identification code (“GP” for GPS), and the last three characters are the sentence name. The data in the positioning information is divided by “,”. The GPS module can generally output sentences in NMEA-0183 format once per second. In a navigation system, generally only time, date, latitude and longitude, and speed are needed. And because the RMC statement completely contains the above information required by the system, so. Only need to extract the RMC statement. Figure 2 shows the specific process of extracting GPS data.

4 Implementation of Navigation Map

After obtaining the positioning information such as latitude and longitude, it is also necessary to visually display them on an Electronic map or other display media, so as to truly play a role in navigation. In order to accurately display it on the electronic map, it needs to be transformed with a certain algorithm, that is, the map matching algorithm.

In general, the basic idea of ​​map matching is to match the GPS track of the vehicle with the vectorized road segment objects on the map, so as to find the road currently traveling, and project the current GPS positioning point on the road.

The key to map matching is to determine the matching points, and the projection method can be used to find the matching points during design. The basic idea of ​​the projection method is to determine the matching point with the smallest value as the projection based on the distance from the point to the line, and process it with the nearest neighbor method, and then filter out the wrong matching points by setting the threshold to obtain the preliminary result, thus completing the point to line. match.

The specific implementation method is to preprocess the road layer first, then convert the road into a polyline segment, find the current road, then project the current location point on the road, and then find a line segment in the road layer closest to the location point, and then Calculate the point with the shortest distance from the point to the line, and finally find the road within the error range in each layer.

The basic process code of its algorithm is as follows:

The realization of the navigation map can be realized by using the embedded graphical interface tool Qt embedded. The graphical interface is a human-computer interaction interface, and the user can understand the navigation information through the screen, and can also directly operate the touch screen to operate the system, such as zooming in and out of the map, viewing positioning information, and the like.

5 Conclusion

Because the ARM processor has the characteristics of low power consumption and high performance, it can be widely used in various portable electronic products. Based on the existing electronic products, this design expands the GPS navigation function through an external GPS module, which can save costs for users without losing too much portability. To this end, the author hopes to use the combination of ARM development board and GPS module to realize the method of GPS navigation function, which can provide a reference for smart devices to expand GPS function.

The Links:   LQ150X1LGN2A NL6448AC20-02

RAND Corporation Report: Combating Foreign Disinformation on Social Media

1. Research questions

How do other countries use disinformation on social media to advance their interests? What was the U.S. response to these movements and how did it evolve?

What does the joint force—especially the U.S. Air Force—need to prepare to respond?

How do state adversaries use disinformation on social media to advance their interests? What does the joint force—especially the United States Air Force (USAF)—need to prepare to respond? Using a wide variety of primary and secondary sources, as well as more than 150 original interviews from the U.S. government, joint forces, industry, civil society, and subject matter experts from nine countries around the world, researchers studied social interactions in country A, Russia, and North Korea. The use of disinformation in the media and the responses the United States and its allies and partners are taking. The authors found that disinformation campaigns on social media can be more subtle than often depicted. Still, much of the response to disinformation has been ad hoc and discordant. Disinformation campaigns on social media are likely to increase over the next decade, but it is unclear who has a competitive advantage in this race; at the same time, disinformation techniques and countermeasures are constantly evolving. This multi-volume series outlines recommendations for better preparation for this new era of communications warfare.

2. Main findings

Disinformation campaigns on social media may be more subtle than often depicted

Russia and Iran have used this tactic abroad more than Country A and North Korea.

Disinformation campaigns on state-led social media are a relatively new phenomenon.

These movements can intimidate, divide and denigrate, but there is little evidence that they can change steadfast beliefs.

Smaller, locally popular social media platforms may face a higher risk of disinformation than larger mainstream social media platforms.

The disinformation campaign on social media is clearly operationally successful, but its strategic impact is uncertain.

Disinformation campaigns on social media are likely to increase over the next decade.

Much of the response to disinformation remains ad hoc and incoherent

The U.S. government’s lead agency to combat disinformation, the State Department’s Center for Global Engagement, lacks the necessary political and institutional clout to guide a coordinated effort.

Joint efforts to man, train, and equip forces to combat disinformation remain ad hoc and service-dependent.

Allies and partners have also tried other countermeasures, most of them with unclear results.

The industry — especially after the 2016 election meddling — has worked aggressively to combat disinformation, but how companies respond depends on their business models.

Civil society groups play an important but often overlooked role.

While disinformation campaigns on social media are likely to increase over the next decade, it is unclear who has a competitive advantage in this race as disinformation technologies and countermeasures evolve simultaneously

3. Recommendations

The U.S. Air Force, especially Air Force Special Operations Command, should expand its information operations capabilities and responsibilities.

The joint force should understand the information environment and look beyond U.S. platforms. It should also train on disinformation, focus on key demographics, minimize widespread bans on smartphone and social media use, increase transparency, enforce information discipline, and conduct DoD-wide scrutiny of information operations forces.

The U.S. government should publish an anti-disinformation strategy that leverages civil society groups and industry without outsourcing the fight against disinformation, avoids bans on social networks, balances anti-disinformation efforts with a commitment to free speech, and Carefully weigh risks while focusing on priorities. Aggressive influence efforts on real information.

The Links:   2MB1300NB-060 LM150X05-B3 LCD-Display

How the laser cutting machine helps the advertising sign industry to achieve creative design

How the laser Cutting Machine helps the advertising sign industry to achieve creative design

As we all know, the competition in the advertising sign industry is fierce, and the laser cutting machine can realize the creative designs of designers. It completes the cutting of arbitrary graphics and arbitrary shapes at a lower cost and higher quality than the traditional cutting process.

 

The use of laser cutting machines in the advertising sign industry is very important. Laser cutting is applicable to various materials in the advertising sign industry, which greatly promotes the development and reform of the advertising industry. Fiber laser cutting machine can cut metal material products, such as stainless steel Display stands, metal characters, signs, etc.; CO2 laser cutting machine can cut non-metal material products in the advertising sign industry, such as crystal characters, wooden display stands, composite board door heads , Two-color board and so on.

PTJ has more than decades of experience in China and can offer one-stop 3d Printing service (3d printing parts & CNC machining prototype) for our OEM customers.

 

The laser cutting machine can cut any plane graphics on metal and non-metal materials. As long as there are drawings, it can cut out good samples through computer control, automatically typesetting and saving materials, achieving smooth cuts and low processing costs. For a creative industry such as advertising, efficient laser cutting technology improves the flexibility of production and has obvious advantages. At the same time, the whole process is environmentally friendly and pollution-free, the production workshop can be kept tidy, and the cutting waste will be greatly reduced.

 

In addition to cutting, the fiber laser cutting machine or CO2 laser cutting machine can also perform laser hollowing and laser engraving. For the more and more precise design, complex structure, novel and beautiful advertising sign industry, laser cutting machines are both the best choice.

Link to this article:How the laser cutting machine helps the advertising sign industry to achieve creative design

Reprint Statement: If there are no special instructions, all articles on this site are original. Please indicate the source for reprinting.:Cut Wiki,Thanks!^^

China Top additive manufacturing company that specializes in additive technologies:DLP, Carbon Digital Light Synthesis (DLS), HP Multi Jet Fusion (MJF), Stratasys FDM, select laser sintering (SLS), binder jetting, SLA,direct metal laser sintering (DMLS) and more. PTJ 3D Printing Company can help you discover new applications for additive, design applications, manufacture industrial-grade parts and fulfill at scale. Meets AS9100D standards.

Dalian Daquanding Group launched a dual-mode fully automatic smart door lock solution based on Qualcomm products

On November 14, 2019, Dalian General Holdings, a leading semiconductor component distributor dedicated to the Asia-Pacific market, announced that its subsidiary Quanding has launched a dual-mode fully automatic smart door lock Turnkey solution based on Qualcomm (Qualcomm) QCA4024.

In recent years, with the rapid development of cloud computing and big data, the smart home industry has also become popular. The popularity of the market and the popularity of consumer concepts continue to promote the progress of the industry. As an important component of the smart home security category, smart door locks are increasingly recognized and accepted by people. The current door lock market is in the early stage of rapid development, with the transformation of traditional door lock manufacturers and the participation of Internet giants and start-ups. In response to the pain points of traditional door lock manufacturers lacking technology development for Electronic products, Dalian Daquan Ding integrated the company’s internal resources to launch a dual-mode smart door lock Turnkey Solution based on Qualcomm QCA4024.

Figure 1 – The Display board of Dalian Daquan Ding’s dual-mode fully automatic smart door lock solution based on Qualcomm products

QCA4024 is the first SoC designed by Qualcomm specifically for IOT to support ble and zigbee modes. This solution includes software and hardware design materials and mobile APP. The latest SDK is developed based on Qualcomm qca4020.or_.3.0 version QSDK. The SDK has complete functions, penetrates the bottom layer and the application layer in the form of middleware, and realizes support for Modules such as motor, fingerprint, voice, touch, Display, etc.; integrates Bluetooth and wifi network communication to realize the interconnection of cloud and mobile terminals; combined with the provided APP Realize the unlocking and unlocking and historical record query and OTA function of cloud and mobile terminals. The SDK has various connection combinations, such as BLE+WIFI, BLE+ZIGBEE, BLE, BLE+WIFI+ZIGBEE.

The overall development environment is the window system, and python is used to organize the entire compilation and programming process. GUI interface tools are not provided, all are commandline tools.

The program provides APP for customer customized development. Both Android and IOS versions are supported. Drawing on the technical specifications of homekit, it integrates mainstream functions in the market, with source-level support, reducing the difficulty of secondary development for customers.

Figure 2 – The block diagram of the dual-mode automatic intelligent door lock solution based on Qualcomm products launched by Dalian Daquanding

Core technical advantages

  • Highly integrated single-chip solution, only one soc

  • Good expansion performance and rich io interfaces

  • Multiple unlocking methods, support ble / zigbee APP, fingerprint, password, card unlocking

  • Support BLE, zigbee OTA function

  • Battery detection and low battery alarm

  • Temporary password management

  • APP provides fingerprint, card, password registration, addition and deletion and other personnel management functions

  • Door opening and closing history

Program Specifications

  • Chip 8 x 8mm2, 0.40mm pitch, 68-pin QFN

  • 2 core MCUs (Arm M4F, Arm M0)

  • Support ZigBee3.0 and Thread via OpenThread

  • Supports Bluetooth 5 Qualcomm Mesh connectivity

The Links:   LMG7520RPFC 6MBP30RH060

Are you still using stepper motors as medical syringe pumps? Come check out this servo solution!

Medical infusion pumps and syringe pumps not only improve the efficiency, flexibility and reliability of clinical drug delivery operations, but also reduce the workload of nursing care and reduce doctor-patient disputes. At present, most of the infusion pumps/syringe pumps on the market use stepper motor solutions, so what are the advantages of the servo solution compared to the stepper solution? Take a look.

Introduction to this article

Medical infusion pumps and syringe pumps not only improve the efficiency, flexibility and reliability of clinical drug delivery operations, but also reduce the workload of nursing care and reduce doctor-patient disputes. At present, most of the infusion pumps/syringe pumps on the market use stepper motor solutions, so what are the advantages of the servo solution compared to the stepper solution? Take a look.

Application Background Science of Infusion Pump and Syringe Pump

In some clinical situations, accurate doses are required, so ordinary drug delivery methods are definitely not feasible, especially for critically ill patients such as ICU, CCU, pediatrics, cardiothoracic, brain surgery, general surgery, etc., the dose may be more or less. It affects the patient, and the speed at which the drug enters the patient’s body may also affect the patient, so there is a need for a product that can control the amount of the drug and the speed at which the drug enters the patient’s body.

Medical syringe pumps are such a product. Generally, infusion pumps are used when high precision and strict control of drugs are required. The role of medical infusion pumps is not only for patients, but also for medical staff. Under normal circumstances, if medical staff are required to grasp the patient’s medicines, there will definitely be a gap, and this gap may be affected by many factors. The use of medical syringe pumps is also a liberation for medical staff.

The existence of medical infusion pumps improves the efficiency and flexibility of clinical drug delivery operations, reduces the workload of nursing, and reduces doctor-patient disputes, which is not only good for patients, but also for medical staff.

The medical syringe pump solution is composed of a stepper/servo motor and its driver, a screw rod and a bracket, etc., with a reciprocating screw and a nut, so it is also called a screw pump. The nut is connected with the piston of the syringe, and the liquid medicine is contained in the syringe to achieve high-precision, smooth and pulsation-free liquid transmission. When working, the stepper/servo motor drives the screw to turn the rotary motion into a linear motion, and pushes the piston of the syringe for injection and infusion. The injection speed can be set by the operator through keyboard operation, as shown in the following figure:

Stepper Motor VS Servo Motor

So, choose a stepper motor or a servo motor as the control scheme for the infusion pump/syringe pump? Don’t worry, let’s compare the characteristics of the two motors first, and then make a choice after understanding the characteristics of the two motors. The following table shows the comparison of the two motors:

The above table compares from various aspects. It can be seen that compared with stepper motors, servo motors have certain advantages in overload capacity, control characteristics, torque characteristics, response speed, low frequency characteristics, temperature rise characteristics and anti-interference.

Especially when taking medicine, when the speed of the stepping motor is fast, the torque is usually not enough, resulting in a slow medicine taking speed. Usually, the medicine taking time is more than 8S, which has become a pain point in the industry, and the servo motor is rated torque within the rated speed, not only The low-speed characteristics are good, and the speed range is wider, which can perfectly solve the pain points of the stepping solution.

Servo control ESC block diagram

The following is the block diagram of the infusion pump/syringe pump servo control ESC scheme launched by Ligong Technology. The position, speed and torque are controlled by closed loop, which has the advantages of high control accuracy, fast response speed, strong anti-overload capability, stable and reliable operation, and basically no temperature. It has the advantages of high power and noise, stable injection and bidirectional operation, supports fault monitoring, and has high energy consumption utilization. The software adopts AMetal-FOC motor-specific algorithm, which has strong versatility and can be easily adapted to various motors.

Servo Control Demo

The video below shows the evaluation board to achieve precise control of the speed and position of the servo motor to meet the requirements of scenes such as stable injection and bidirectional operation. If you are still using the stepper motor solution, want to optimize and improve the original solution, or are making similar products, you may wish to contact us and take a look at this servo motor solution.

The Links:   LQ084S3LG03 CM200TXPA-24T

Melexis’ Newest LIN RGB LED Controller Offers Ease of Use, Boosts Performance in Automotive Ambient Lighting Applications

Tysondello, Belgium, December 4, 2019 – Melexis, a global microelectronics engineering company, announces the introduction of a new generation of LIN RGB (W) LED controller IC products. As the global leader in ambient lighting solutions, the new MLX81113 will support the further development of LIN-based RGB LED ambient lighting applications (also known as LIN RGB), which has been approved by nearly every OEM worldwide. Compared to the popular MLX81108, the MLX81113 features larger on-chip memory, higher constant current source output and enhanced EMC stability. In addition, the MLX81113 complies with ISO 26262 functional safety requirements and is ASIL-A rated.

The MLX81113 enhances the system-on-chip functionality with an MLX16 FX 16-bit RISC microcontroller, 2 KB RAM and 32 KB Flash, and system ROM to significantly improve application performance. The on-chip EEPROM is increased to 576 bytes for storing user data, such as LED calibration coefficients, to ensure that RGB LEDs for automotive applications have uniformly balanced brightness and color.

The four constant current source outputs are software programmable to provide up to 60 mA and support the use of various RGB LEDs from different suppliers. Independent PWM control, supporting 16-bit resolution, can be used to adjust any color point and brightness level of the connected RGB LED. Built-in temperature monitoring ensures color stability from -40°C to 125°C and allows temperature compensation for all color channels. Any temperature drift in red, green and blue is fully compensated. We offer a complete tool chain to support rapid application development, including PCB evaluation boards, in-circuit emulators and C compiler packages. To simplify software development for customers, we also provide all required software components, including LIN drivers, color mixing and math libraries, and IC initialization routines.

“Lighting is one of the key features that will enable personalization and differentiation in the cabin of the future. With our latest product, we have further expanded our lighting product range to accommodate this trend,” said Michael Bender, LIN Product Line Manager at Melexis. “Our LIN-compatible RGB(W) drivers provide excellent and cost-effective interior ambient lighting applications for entry-level, mid-range, and luxury vehicles. The MLX81113 utilizes Silicon-on-Insulator (SOI) technology for extremely high EMC stability, resulting in improved performance metrics and reduced external component count. In addition, the MLX81113 is designed to ISO 26262 rating, which facilitates system-level functional safety certification.”

The MLX81113 contains a complete LIN system including transceivers and protocol handlers to connect the RGB environment module with the vehicle’s existing LIN network. The SoC is LIN2.x and SAE J2602 compliant and supports auto-addressing for the smallest module size and lowest bill of materials (BOM) cost.

Using the latest Silicon-on-Insulator (SOI) technology, the MLX81113 features high-voltage I/Os and operates from supply voltages as low as 4V, even if the vehicle supply voltage fluctuates, such as during start-stop operations. Provides excellent performance. Safety features include 28 V boost start, battery overvoltage and undervoltage detection. The MLX81113 is currently in production and is AECQ-100 compliant and PPAP compliant. The MLX81113 is available in SOIC8 exposed pad and lead-free DFN10 3 mm x 3 mm thermally enhanced package options for excellent thermal performance.

The Links:   G150XTN01.0 CM50MX-24A TFT-Panel

Yu Kequn: Implementing the Critical Information Infrastructure Security Protection System to Consolidate the National Network Security Barrier

Critical information infrastructure is an important strategic resource of the country. It is related to national security, national economy and people’s livelihood and public interests. It has a basic, supporting and overall role. Protecting the security of critical information infrastructure is the top priority of national cybersecurity work. The promulgation and implementation of the “Regulations on the Security Protection of Critical Information Infrastructure” (hereinafter referred to as the “Regulations”) is a timely move to improve my country’s cyberspace governance, strengthen the security protection of critical information infrastructure, and safeguard national security and development interests. It is of great significance. far-reaching.

1. Critical information infrastructure security is the top priority of network security

General Secretary Xi Jinping pointed out at the network security and informatization work symposium, “The key information infrastructure in the fields of finance, energy, electricity, communication, transportation, etc. is the nerve center of economic and social operation, and it is the top priority of network security. Targets that may be under attack… We must conduct in-depth research and take effective measures to effectively protect the country’s critical information infrastructure.” General Secretary Xi Jinping’s important instructions pointed out the direction for us to carry out the security protection of critical information infrastructure.

Countries around the world attach great importance to the security of critical information infrastructure. The United States and Europe have raised the cybersecurity protection of critical infrastructure security to the level of national security strategies through legislation or policy documents. Network attack and defense around the security of critical information infrastructure has become an important field of strategic games between countries and the main battlefield of high-intensity confrontation in cyberspace.

my country’s Cybersecurity Law, which was officially implemented in 2017, clearly sets forth requirements for the security of critical information infrastructure operations. The promulgation and implementation of the “Regulations” is an important measure to implement General Secretary Xi Jinping’s important thought on cyber power, implement the major decisions and deployments of the Party Central Committee and the State Council, implement the relevant requirements of the Cyber ​​Security Law, and improve the security protection of my country’s critical information infrastructure. The protection of the rule of law is also the proper meaning of implementing the overall national security concept in the cyberspace field, responding to the new changes in the current international situation, and maintaining the sovereignty and security of cyberspace.

2. The promulgation and implementation of the “Regulations” provides basic guidelines for the security protection of critical information infrastructure

As an administrative regulation formulated in accordance with the Cybersecurity Law, the “Regulations” implement and refine the relevant provisions of the Cybersecurity Law on the operation security of critical information infrastructure, and promote the establishment and improvement of the legal and regulatory system for the security protection of critical information infrastructure in my country.

(1) Clarify the objects and key processes of critical information infrastructure security protection. The Regulations clearly define the concept and scope of critical information infrastructure. At the same time, it also sets up process-based and standardized requirements guidelines for key links such as the identification and change of critical information infrastructure, the establishment of special security management agencies by operators, and the reporting of cybersecurity incidents and threats.

(2) Clarify key national protection, guarantee and promotion measures for critical information infrastructure. The “Regulations” established the working principle of “comprehensive coordination, division of responsibilities, and legal protection”, and clarified the division of responsibilities among the national network information department, the public security department of the State Council, the protection work department, and the local government, forming a joint force of supervision and protection; on the other hand, the “Regulations” The Regulations put forward protection measures such as information sharing, monitoring and early warning, emergency response, inspection and testing, and military-civilian coordination around key information infrastructure, as well as promotion measures such as professional personnel training, technological innovation and industrial development, and network security service organization construction and management. , which reflects the state’s will and determination to protect critical information infrastructure; in addition, the “Regulations” also make special provisions prohibiting illegal intrusion, interference, and destruction of critical information infrastructure. Safe behavior will face severe punishment by laws and regulations.

(3) Clarify the responsibilities and obligations of critical information infrastructure operators. The “Regulations” focus on consolidating the main responsibilities of critical information infrastructure operators (hereinafter referred to as “operators”), from security protection measures, establishing and improving protection systems and responsibility systems, setting up special security management agencies, funding and personnel input, testing Clear requirements have been put forward at multiple levels such as assessment, cyber security incident and threat reporting, and cyber product and service procurement, and a long-term mechanism for the security protection of critical information infrastructure has been established.

3. Some thoughts on implementing the requirements of the “Regulations” and improving the security protection capability of critical information infrastructure

The first is to strengthen awareness and deeply understand the importance of critical information infrastructure security protection. Units and individuals engaged in the operation and protection of critical information infrastructure should be fully aware that doing a good job in the security protection of critical information infrastructure is not only related to their own system security and stable business operation, but also to the national economy and people’s livelihood. Facility security is extremely important, stand in a high position, stay awake, dare to take responsibility, and act bravely, take national network security as its own responsibility, and strictly implement the requirements of relevant laws, policies and systems.

The second is to clarify the bottom line and accurately grasp the safe operation of key information infrastructure. Mastering the network and data asset information for the safe operation of critical information infrastructure is an important prerequisite for the competent national regulatory authorities and protection departments to carry out guidance and supervision; for operators, it is also a necessary means to implement the main responsibility and strengthen the protection work. On the one hand, it is necessary to comprehensively sort out the network products and services of the key information infrastructure. On the basis of mastering the network assets of the key information infrastructure, further sort out the component-level Model information, configuration setting information, etc., to support the rapid development of supply chain cyber attacks. positioning and accurate judgment. On the other hand, it is necessary to clarify the data assets carried by the key information infrastructure, sort out the data collection, processing, and transmission, and analyze the data flow conditions and paths. In addition, for the critical information infrastructure involving control systems, on the basis of the above measures, focus on strengthening analysis and identification, to maximize the understanding of the protocols and instructions that trigger or may trigger control actions, as well as those that may touch core control equipment and systems. Data flow and personnel with operating authority.

The third is to enhance capabilities and comprehensively strengthen the security protection of key information infrastructure. Operators should focus on self-examination and self-correction of vulnerabilities and hidden dangers, analysis and judgment of security incidents and threats, and continuous and stable operation of key information infrastructure under extreme extreme conditions, strengthen the construction of corresponding means, and gradually cultivate network security professionals. Team, pay attention to the inspection and evaluation of the effectiveness of protective measures, and strengthen the concept of continuous operation of network security protection; for network security academia, enterprises, and research institutions, it should be based on the particularity and importance of key information infrastructure, risk identification, assessment , prevention, and resolution are the focus of attention, and research and development will be strengthened from the theoretical, method, and technical levels to provide technical support for the security protection of key information infrastructure.

The fourth is to fully integrate and jointly promote the security protection of key information infrastructure. On the one hand, measures such as information sharing, monitoring and early warning, emergency response, inspection and testing in the “Regulations” need to be further systematized, institutionalized, and normalized by relevant departments to promote improvement; The relevant requirements for “the situation where network products and services may affect national security” are in line with the national network security review system. Operators should further enhance their initiative in the process of implementing network security review and ensuring the security of critical information infrastructure supply chains.

The implementation of the critical information infrastructure protection system requires full cooperation at all levels of government, industry, academia, research, and application. All sectors of society should strengthen their understanding, identify their positions, and contribute to jointly build a national network security barrier, thereby safeguarding national security. , economic development and social stability to provide solid support.

The Links:   LQ10D131 NL6448BC33-70C

Laser marker for Packing help packaging industry reform

Laser marker for Packing help packaging industry reform

States urged people with a series of energy saving policies in recent years, "green" and "environmental friendly" has become the focus of attention and discussion. Therefore, many traditional industries must adapt to the trend and the status quo, to make new changes and improvement. Laser marker for Packing does also, as an emerging industry technology, Laser marker for Packing has brought an environmental wind to packing industry.
 
Traditional application packaging industry are ink inkjet printer, inks is the cause of the pollution, the printing process produces large amounts of harmful chemicals, and hurts the staff body. However, laser marker, the non-contact processing method, eliminate radically the pollution and harmful factors from these sources.
 

Laser marker for Packing marking technology can be said to be the most environmentally friendly, the most advanced means of marking. Laser marker marking is a non-contact processing methods, is the use of high-energy density laser irradiation on the local workpiece , so that the surface material vaporization or color change of the chemical reaction, thus leaving a permanent mark marking method having hit a high mark precision, speed, marking a clear and so on. Because of its good stability, high accuracy and simple handling, Laser marker for Packing quickly gets affirmation and recognition of the packaging world .
 
Concern for environmental protection increases with passing days, as a pioneer in laser industry leader, Han’s Yueming Laser takes action firstly. Han’s Yueming laser marker for Packing is environmental, safety, does not produce any harmful chemicals to human body and the environment, completely cut off the chemical pollution, the operator also gets a careful protection. In line with GB7247-87, GB10320-88 standards, it is environmental friendly high-tech products. With a mature industrial design, reliable performance, it owns 24 hours of continuous work, laser maintenance up to more than 20,000 hours.
 

PTJ has more than decades of experience in China and can offer one-stop 3d Printing service (3d printing parts & CNC machining prototype) for our OEM customers.

Han’s Yueming laser assembly line laser printer, is praised as "Lightning series." with fast speed. According to user needs, lightning Series line laser marker is used for fast-moving high-quality products and the non-contact laser coding, marking handwriting clearly visible, permanent non-erasable, has incomparable advantages when compared with ink jet coding. And the series of equipment gets continuous and stable operation in harsh production conditions, 100,000 hours without supplies, flexible equipment installation, even in complex production line and working conditions, it also can run freely.
 
Han’s Yueming laser "Lightning series" line of laser printer include "fibers", "CO2" and "semiconductor end-pumped," the three series of models meet the needs of any industry, the machine can maintain stability in harsh production conditions , meeting the needs of a variety of packaging materials. It can mark carve permanent eye-catching logo, the complete eliminating the behavior of lowing the product quality in the circulation.

Link to this article:Laser marker for Packing help packaging industry reform

Reprint Statement: If there are no special instructions, all articles on this site are original. Please indicate the source for reprinting.:Cut Wiki,Thanks!^^

China Top additive manufacturing company that specializes in additive technologies:DLP, Carbon Digital Light Synthesis (DLS), HP Multi Jet Fusion (MJF), Stratasys FDM, select laser sintering (SLS), binder jetting, SLA,direct metal laser sintering (DMLS) and more. PTJ 3D Printing Company can help you discover new applications for additive, design applications, manufacture industrial-grade parts and fulfill at scale. Meets AS9100D standards.

TI’s PRIME power line communication data concentrator solution based on Concerto dual-core MCU

Summary

This document describes a power line communication (PLC) data concentrator scheme based on the PRIME standard implemented with C2000 series dual-core (CM3+C28x) microcontrollers. This solution implements a complete PRIME protocol stack through a Concerto MCU and SDRAM, provides a UART asynchronous serial port with a baud rate of 115200bps for network management and data communication for the client host, and provides a low-cost implementation of the data concentrator function. an effective solution.

Introduction

PRIME – PoweRline Intelligent Metering Evolution standard is a technical standard for remote meter reading developed by Spain Iberdrola Electric Power Company in conjunction with relevant PLC chip, system, meter and other manufacturers for narrowband PLC power line communication, including data transmission standards at the physical layer and MAC layer. The protocol of this technology is open, the implementation is free of copyright fees, and the products of different manufacturers can be interconnected. TI uses a low-cost DSP controller to implement the PRIME protocol in software, which improves the flexibility of applications compared to other manufacturers’ implementation of dedicated chip ASICs.

In fact, TI has implemented the full functionality of the PRIME data concentrator earlier with the OMAP1808. The solution introduced in this paper is mainly to transplant the DC solution of the OMAP platform to the single-chip Concerto, and realize the upper and lower MAC protocols and physical layer protocols of PRIME in one chip, which is suitable for low-cost embedded data concentrator applications. Therefore, , we also refer to the data concentrator scheme as EDC, that is, Embedded Data Concentrate.

The DC solution of the OMAP1808 platform is based on the Linux operating system, while this EDC solution is based on the TIRTOS operating system. The upper-layer and lower-layer MAC communication adopts internal data sharing, which not only reduces the system and occupies less resources, but also the data is more reliable. In addition, the number of nodes that can be managed and connected is no different from the DC solution of the OMAP platform.

1 EDC system architecture

This solution uses the Concerto series chip F28M35H52C1 as the main chip to handle the UPPER MAC and LOW MAC, PHY layer protocols of the PRIME protocol. F28M35H52C1 is a dual-core MCU. It contains two MCU systems: Cortex m3 main system and TI C28x control subsystem. Each system has 512KB of Flash space. Cortex m3 uses 32KB RAM independently, and TI C28x uses 36KB RAM independently. , In addition, there are 64KB of shared RAM (all allocated to C28x in EDC system) and 2KB of IPC Message RAM with configurable usage rights. In the EDC system application, the main frequency of the Cortex m3 core is 75MHz, which is responsible for processing the Upper MAC protocol, and the main frequency of the C28x core is 150MHz, which is responsible for processing the Low MAC and PHY layer protocols. The two cores share data through IPC. zone mechanism for communication. The main chip MCU plus an 8M Bytes SDRAM, accessed by the CM3 core, is used to store data such as the node information database. The current size of the system is about 3M Bytes; in addition, there is a 128KBytes EEPROM, accessed by C28x, used to store the system Power-down parameters; the analog front end adopts TI AFE031, which supports three-phase and single-phase connections, and is controlled by the C28x core through the SPI interface. The system block diagram is shown in Figure 1. Among them, CM3 controls one LED through 1 GPIO port, and displays at 1Hz frequency when the system is working normally; C28x controls the other three LEDs through 3 GPIOs, indicating the working status of C28x and the communication status of PLC respectively.

Figure 1 Schematic diagram of PRIME EDC system architecture

2 EDC solution features

A single chip realizes the complete functions of PLC PRIME DC.

Provide UART interface to communicate with PC or user Host Processor, communication rate is 115200bps, 8 data bits, 1 stop bit, no parity check.

Provide PC (Ubuntu Linux OS) client software for simulation testing. The client software communicates with the server running on the EDC through mgmt and IEC-432 API interfaces. Users can refer to these client software sample codes to implement Host code design. Terminal software includes:

Management tool application

Base node conference tool application

IEC 61334-4-32 data transfer application

The hardware design retains the SCIA UART communication interface of C28x, which is convenient for customers to use the PC-side ZCG tool software provided by TI to test the parameters of the PLC PHY layer by connecting the COM port of the PC or the USB-UART adapter board to this interface.

3 Hardware Design

3.1 Reference Schematic

Please refer to Figure 2, Figure 3, and Figure 4 for the schematic design of the hardware-related parts.

Figure 2 Schematic diagram of the main chip MCU reference design

Figure 3 SDRAM and UART interface reference design schematic

Figure 4 AFE031 peripheral circuit reference design schematic

3.2 Circuit Board

The actual EDC circuit board is shown in Figure 5 and Figure 6. On the front of the circuit board are placed MCU, AFE031 and most components such as transformers, power supply ICs, and a piece of SDRAM on the back. The colored line connection part on the upper left of the MCU chip is the UART communication interface and the UART print information output interface, and the left side is the 15V power supply input interface and the meter connection interface. In section 6.3.1, the interface definition of the concentrator carrier module is designed, and the UART interface is connected to the UART0 of the MCU CM3 core; the black tape covered part on the right side is the external three-phase power line interface, which is also in accordance with the State Grid “Q /GDW 375.2-2009” standard section 6.3.2 defines the carrier coupling interface definition of the concentrator carrier module, and the service node can perform single-phase or three-phase signal connection with the EDC through the three-phase power line interface. When the EDC is powered on and works normally, the LED (LED-4) on the lower right as shown in Figure 5 will flash at a frequency of 1Hz.

Figure 5 Front View of EDC Board

Figure 6 Rear View of EDC Board

3.3 Network connection between EDC and PLC nodes

In this example, TI’s TMDSPLCKIT-V3 is used as the PLC node. The connection between EDC and two PLC nodes is shown in Figure 7. The UART0 interface of EDC and the Linux PC client are connected through a UART-USB adapter board, as shown in Figure 8. shown.

Figure 7 Schematic diagram of the connection between EDC and PLC nodes

Figure 8 Schematic diagram of the connection between EDC and PC

4 Functions that EDC can achieve

Supports registration/deregistration of up to 1200 nodes

· Supports up to 3600 Unicast MAC connections/releases

· Keep Alive function and automatic adjustment of Keep Alive check interval

· IEC-61334-4-32 Logical Link Layer

· Appemu data transfer test

· Support node relay

· Node promotion and demotion

· Multicast MAC connect/release

· Single-point and multi-point firmware upgrade

· Support for external applications using IEC 61334-4-32 services

· Support external management GUI

· Supports Linux client commands for DC conformance testing

5 Object code and Linux client software required for EDC to run

Concerto target code: prime_dc_concerto_cm3.out prime_dc_concerto_c28x.out

Linux client software: uart_intf, mgmt_cli, ext432App, bn_conf_tool

6 PRIME EDC Basic Function Demonstration

The function demonstration of PRIME EDC is based on a PRIME network, which consists of a base node and several service nodes, and EDC is one of the base nodes. The functional demo includes the following parts:

1. Node registration, node logout

2. Keep Alive Monitoring

3. Node connection, disconnection

4. Node upgrade (to relay node), node downgrade (to terminal node)

5. Data transmission according to IEC-61334-4-32 protocol

6. Firmware online update (unicast and multicast)

Refer to the network connection diagram in Figure 7 to build a demonstration network, and refer to Figure 8 to connect the UART1 of the EDC to the Linux PC. After powering on the EDC and the service node, the system will automatically complete the network connection. The above function demonstration can be realized by the corresponding command line operation on the Linux PC side. For command line operations on Linux PC, refer to the following chapters.

7 Command Line Operation Instructions on Linux PC

Prepare a PC with ubuntu Linux OS installed, and copy the provided Linux client software: uart_intf, mgmt_cli, ext432App, bn_conf_tool to the Home path.

7.1 Open UART relay

Open a Terminal on the Linux PC, enter the uart_intf path, execute the “make clean” command to remove the old executable files, and then execute the “make PREFIX=” command to generate the executable file uart_intf suitable for this system. In the current path, type the following command to enable the UART relay:

sudo ./uart_info –c /dev/ttyUSB0

After the command is executed normally, the following prompt is displayed:

Figure 9 Linux UART connection prompt

Among them, TCP port , TCP port , TCP port are the port parameters used by client processes such as subsequent data transmission, network management and DC consistency check.

7.2 mgmt network management tool client and its common command reference

Open a new Terminal on the Linux PC, enter the mgmt_cli path, execute the “make clean” command to remove the old executable files, and then execute the “make PREFIX=” command to generate the executable file pdc_mgmt_cli suitable for this system.

Under the current path, type the following command to run the Network Administration Tools client:

./pdc_mgmt_cli –p 56666

After the command is executed normally, the following prompt is displayed:

connecting to 127.0.0.1:56666

connected

>>

At the >> prompt type ? Then press Enter to list all the commands supported by the client; when using a command, if you do not know how to use parameters, you can also add spaces and ? after the command. , the parameters and parameter ranges required by the command will be displayed.

Description of some common commands:

7.2.1?

Function: List all commands list as follows:

get-dc-std

get-node-info

get-switch-info

get-terminal-info

get-mac-uc-conn-info

unreg-node

close-mac-uc-conn

pro-term

dem-switch

set-ka-tmo

get-ka-tmo

ena-ka-auto-adj

dis-ka-auto-adj

start-uc-fu

start-mc-fu

show-uc-fu

show-mc-fu

cancel-fu

add-to-black-list

rm-from-black-list

show-black-list

ena-event

dis-event

get-pib

set-pib

reboot-sn

send-new-image

del-curr-image

show-curr-image

add-node-to-fu-mc-gp

rm-node-from-fu-mc-gp

del-fu-mc-gp

show-fu-mc-gp

get-phy-tx-paras

set-phy-tx-paras

set-alv-params

get-alv-params

7.2.2 CTRL + c

Function: Exit the mgmt client and return to the Linux command line

7.2.3 get-dc-std

Function: Get the standard executed by DC

Example:

>>get-dc-std

PRIME

7.2.4 get-node-info

Function: Get the node information currently connected to the PRIME network.

Example:

7.2.5 get-ka-tmo

Function: Get the current Keep Alive check timeout

Example:

>>get-ka-tmo

128 seconds

7.2.6 set-ka-tmo

Function: Set the current Keep Alive check timeout time

Example:

>>set-ka-tmo –t 32

Keep alive timeout is now 32 seconds.

7.2.7 pro-term

Function: Upgrade an endpoint to a relay node

Example:

>>pro-term -l 2 –s 0

Request sent…

7.2.8 send-new-image

Function: Download firmware to DC

Example:

>>send-new-image –f /filefolder/prime_7.6.1.sbin –p 128

7.2.9 show-curr-image

Function: View the firmware information stored in the current DC

Example:

>>show-curr-image

Image file name: /filefolder/prime_7.6.1.sbin

Image CRC: 0xa57439b1

Image size: 187958 bytes

7.2.10 del-curr-image

Function: Delete the firmware stored in the current DC. Before downloading new firmware, you must execute this command to delete the current firmware.

Example:

>>del-curr-image

7.2.11 start-uc-fu

Function: start unicast firmware update

Example:

>>start-uc-fu –f drunk.sbin –e 55:55:55:55:55:55 –p 128

7.2.12 cancel-fu

Function: Cancel the current firmware update

Example:

>>cancel-fu

7.2.13 show-uc-fu

Function: Display the current firmware update status and information

Example:

>>show-uc-fu

Image File Name: /filefolder/prime_7.6.1.sbin

Node: 55:55:55:55:55:55

Image CRC: 0xa57439b1

Page Size: 128 bytes

Image Size: 187958 bytes

Page Count: 1469

Pgae Sent: 980

Communication State: CONNECTED

Upgrade FSM State: PAGE TRANSFER

7.3 IEC61334-4-32 upper layer application example of data communication

PRIME EDC allows external applications to communicate with nodes in the network following the IEC61334-4-32 protocol. This scenario provides application reference code for the Linux platform.

Open a new Terminal on the Linux PC, enter the ext432app path, execute the “make clean” command to remove the old executable files, and then execute the “make PREFIX=” command to generate the executable file pdc_app432 suitable for this system.

Under the current path, type the following command to start the data communication process:

/pdc_app432 –p 57777 –l 64 –ds 1 –da 2

Parameter Description:

-l is used to specify the number of data bytes to be sent, the parameter value range is 1~200;

-ds is used to specify the SAP address of the target node, the parameter range is 0~191;

-da is used to specify the node 432 address of the communication connection, which is obtained from the node information obtained by the get-node-info command.

Before executing the pdc_app432 command, you need to refer to Figure 10 and use the ZGUI tool to configure the TI PLC V3-KIT to AppEmu-LLC mode. In this mode, when the Linux client executes the pdc_app432 command, the PLC Module will send the received data back to the DC, and the DC will upload it to the PC through UART, and Display it on the Terminal where pdc_app432 is located. When transmitting a 190-byte packet, the operation result is shown in Figure 11.

Figure 10 Using the ZGUI tool to configure the node for AppEMU-LLC mode

Figure 11 Data Transfer Test Run Results

Reference documentation

1. TI PRIME DC Software User Guide

2. TI PRIME DC IEC-61334-4-32 API SPEC

3. Concerto F28M35x Technical Reference Manual (SPRUH22B)

4. Concerto Microcontrollers (SPRS742C)

5. Q/GDW 375.2-2009 “Type Specification for Electricity Consumer Information Collection System: Concentrator Type Specification”

The Links:   LM64C509 MEO450-12DA(H) DISPLAY-COMPANY

Exit mobile version