scispace - formally typeset
Search or ask a question
Author

Zhong Li

Other affiliations: Zhangzhou Normal University
Bio: Zhong Li is an academic researcher from Rolf C. Hagen Group. The author has contributed to research in topics: Chaotic & Electromagnetic interference. The author has an hindex of 11, co-authored 46 publications receiving 561 citations. Previous affiliations of Zhong Li include Zhangzhou Normal University.

Papers
More filters
Journal ArticleDOI
TL;DR: In this paper, the authors proposed a switched-boost dc-dc converter for high stepup voltage conversion applications, such as renewable energy power generation, uninterruptible power supply, and automobile high-intensity discharge headlamps.
Abstract: This paper proposes a family of switched-boost dc–dc converters for the high stepup voltage conversion applications, such as renewable energy power generation, uninterruptible power supply, and automobile high-intensity discharge headlamps. Compared with other dc–dc converters, the proposed switched-boost converter, which combines the traditional switched-boost network with the switched-capacitor/switched-inductor cells, has the following features: higher output voltage gain, a fewer passive components such as inductors and capacitors, and lower voltage stress across the output diode and power switches. Another advantage of the proposed topology is its expandability. If a higher voltage conversion ratio is required, additional cells can be easily cascaded by adding one inductor and three diodes. The structure, operating principle analysis, parameter design, and comparison with other dc–dc converters are also analyzed. Finally, both simulations and experimental results are presented to verify the effectiveness of the proposed converter.

119 citations

Journal ArticleDOI
TL;DR: The development of power electronics in the past century and the current state-of-the-art power electronics converters are briefly reviewed, before giving an insight into the deficiencies of the conventional current-source and voltage-source converters and, then, proposing a design methodology for impedance source converters aimed to replace the traditional tedious, manual and experience dependent design methods.
Abstract: The development of power electronics in the past century and the current state of the art of power electronics converters are briefly reviewed, before giving an insight into the deficiencies of the conventional current-source and voltage-source converters and into the superiority of impedance-source converters and, then, proposing a design methodology for impedance-source converters aimed to replace the traditional tedious, manual and experience-dependent design methods. Some examples for their deployment in renewable-energy applications are discussed, and the direction into which power electronic converters will develop in the future is indicated.

110 citations

Book ChapterDOI
TL;DR: In this paper, two boost converters with three active Z-networks are designed and two novel Z-Networks are used to improve the performance of the boost converter.
Abstract: Two novel boost converters with three active Z-networks are to be designed in this chapter.

70 citations

Journal ArticleDOI
TL;DR: A new model of a power grid involving the active and reactive power loads is proposed and then used to analyze the cascading behavior of power grids, which is also used to explain the reason of the blackout happening in India.
Abstract: Two huge blackouts, occurred separately on 30 and 31 July 2012 in India, spread over half the country when three of its five regional grids collapsed, leaving hundreds of millions of people without government-supplied electricity and ringing once again alarm bells with security problems in electric power grid systems. The first investigation reveals that the outage of the second (backup) 400 kV Bina–Gwalior–Agra line on 29 July 2012 led to the cascading failure through the grid, which can be simulated and explained from the perspective of the complex networks theory. In this paper, a new model of a power grid involving the active and reactive power loads is proposed and then used to analyze the cascading behavior of power grids, which is also used to explain the reason of the blackout happening in India. Furthermore, some strategic advices are given for improving the stability and security of power grids, especially Indian power grids.

59 citations

Journal ArticleDOI
TL;DR: In this paper, an impedance network dc-dc boost converter with continuous conduction modes is proposed. But, it is not shown how to determine its various parameters and simulations and a 250-W prototype is conducted to verify the converter's effectiveness.
Abstract: An impedance network dc–dc boost converter is developed in this letter. Compared to the conventional boost converter, it can reach a higher voltage gain with fewer diodes and a small duty cycle (smaller than 33%) and, meanwhile, avoid instability caused by saturation of its inductors, whereas the conventional boost converters realize high-voltage gains at rather large duty cycles (normally exceeding 50%) resulting in saturation of inductors. Furthermore, it can well fulfill the stringent industrial requirements, particularly of renewable power systems. The proposed converter with continuous conduction modes is analyzed for different states of its components. Then, it is shown how to determine its various parameters. Finally, simulations and a 250-W prototype are conducted to verify the converter's effectiveness.

53 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: A comprehensive survey of the entire wireless radio frequency chaos-based communication systems, which categorizes different transmission techniques by elaborating on its modulation, receiver type, data rate, complexity, energy efficiency, multiple access scheme, and performance.
Abstract: Since the early 1990s, a large number of chaos-based communication systems have been proposed exploiting the properties of chaotic waveforms. The motivation lies in the significant advantages provided by this class of non-linear signals. For this aim, many communication schemes and applications have been specially designed for chaos-based communication systems where energy, data rate, and synchronization awareness are considered in most designs. Recently, the major focus, however, has been given to the non-coherent chaos-based systems to benefit from the advantages of chaotic signals and non-coherent detection and to avoid the use of chaotic synchronization, which suffers from weak performance in the presence of additive noise. This paper presents a comprehensive survey of the entire wireless radio frequency chaos-based communication systems. First, it outlines the challenges of chaos implementations and synchronization methods, followed by comprehensive literature review and analysis of chaos-based coherent techniques and their applications. In the second part of the survey, we offer a taxonomy of the current literature by focusing on non-coherent detection methods. For each modulation class, this paper categorizes different transmission techniques by elaborating on its modulation, receiver type, data rate, complexity, energy efficiency, multiple access scheme, and performance. In addition, this survey reports on the analysis of tradeoff between different chaos-based communication systems. Finally, several concluding remarks are discussed.

243 citations

Journal ArticleDOI
TL;DR: The results of several experimental, statistical analysis and key sensitivity tests show that the proposed image encryption scheme provides an efficient and secure way for real-time image encryption and transmission.
Abstract: Image encryption is somehow different from text encryption due to some inherent features of image such as bulk data capacity and high correlation among pixels, which are generally difficult to handle by conventional methods. The desirable cryptographic properties of the chaotic maps such as sensitivity to initial conditions and random-like behavior have attracted the attention of cryptographers to develop new encryption algorithms. Therefore, recent researches of image encryption algorithms have been increasingly based on chaotic systems, though the drawbacks of small key space and weak security in one-dimensional chaotic cryptosystems are obvious. This paper proposes a Coupled Nonlinear Chaotic Map, called CNCM, and a novel chaos-based image encryption algorithm to encrypt color images by using CNCM. The chaotic cryptography technique which used in this paper is a symmetric key cryptography with a stream cipher structure. In order to increase the security of the proposed algorithm, 240 bit-long secret key is used to generate the initial conditions and parameters of the chaotic map by making some algebraic transformations to the key. These transformations as well as the nonlinearity and coupling structure of the CNCM have enhanced the cryptosystem security. For getting higher security and higher complexity, the current paper employs the image size and color components to cryptosystem, thereby significantly increasing the resistance to known/chosen-plaintext attacks. The results of several experimental, statistical analysis and key sensitivity tests show that the proposed image encryption scheme provides an efficient and secure way for real-time image encryption and transmission.

216 citations

Journal ArticleDOI
28 Aug 2015-Energies
TL;DR: In this article, the authors review the most relevant works that have investigated robustness in power grids using complex networks (CN) concepts, and propose strategies to improve robustness such as intentional islanding, restricted link addition, and more efficient electrical metrics such as electrical betweenness, net-ability and others.
Abstract: This paper reviews the most relevant works that have investigated robustness in power grids using Complex Networks (CN) concepts. In this broad field there are two different approaches. The first one is based solely on topological concepts, and uses metrics such as mean path length, clustering coefficient, efficiency and betweenness centrality, among many others. The second, hybrid approach consists of introducing (into the CN framework) some concepts from Electrical Engineering (EE) in the effort of enhancing the topological approach, and uses novel, more efficient electrical metrics such as electrical betweenness, net-ability, and others. There is however a controversy about whether these approaches are able to provide insights into all aspects of real power grids. The CN community argues that the topological approach does not aim to focus on the detailed operation, but to discover the unexpected emergence of collective behavior, while part of the EE community asserts that this leads to an excessive simplification. Beyond this open debate it seems to be no predominant structure (scale-free, small-world) in high-voltage transmission power grids, the vast majority of power grids studied so far. Most of them have in common that they are vulnerable to targeted attacks on the most connected nodes and robust to random failure. In this respect there are only a few works that propose strategies to improve robustness such as intentional islanding, restricted link addition, microgrids and Energies 2015, 8 9212 smart grids, for which novel studies suggest that small-world networks seem to be the best topology.

208 citations

Journal ArticleDOI
TL;DR: This is Applied Cryptography Protocols Algorithms And Source Code In C Applied Cryptographic Protocols algorithms and Source Code in C By Schneier Bruce Author Nov 01 1995 the best ebook that you can get right now online.

207 citations

Journal ArticleDOI
TL;DR: A secure image encryption scheme based on logistic and spatiotemporal chaotic systems is proposed that can resistant different attacks, such as the brute-force attack, statistical attack and differential attack.
Abstract: Information security has became more and more important issue in modern society, one of which is the digital image protection. In this paper, a secure image encryption scheme based on logistic and spatiotemporal chaotic systems is proposed. The extreme sensitivity of chaotic system can greatly increase the complexity of the proposed scheme. Further more, the scheme also takes advantage of DNA coding and eight DNA coding rules are mixed to enhance the efficiency of image confusion and diffusion. To resist the chosen-plaintext attack, information entropy of DNA coded image is modulated as the parameter of spatiotemporal chaotic system, which can also guarantee the sensitivity of plain image in the encryption process. So even a slight change in plain image can cause the complete change in cipher image. The experimental analysis shows that it can resistant different attacks, such as the brute-force attack, statistical attack and differential attack. What's more, The image encryption scheme can be easily implemented by software and is promising in practical application.

162 citations