Northwestern Polytechnical University was attacked by American NSA network: the United States gradually infiltrated and stole secrets for a long time.

  Cctv newsOn September 27th, the National Computer Virus Emergency Response Center issued a document "Investigation Report on Northwestern Polytechnical University Attacked by NSA Network (Part II)".  

  On June 22, 2022, Northwestern Polytechnical University issued a "Public Statement" saying that the school was attacked by overseas cyber attacks. The Beilin Branch of the Public Security Bureau of Xi ‘an, Shaanxi Province immediately issued the "Alert Bulletin", which confirmed that a number of trojans and malicious programs originated from abroad were found in the information network of Northwestern Polytechnical University, and the Xi ‘an police have officially filed an investigation.

  China National Computer Virus Emergency Response Center and 360 Company participated in the technical analysis of this case. The technical team has successively extracted Trojan samples from many information systems and Internet terminals of Northwestern Polytechnical University, comprehensively used existing domestic data resources and analysis methods, and got the full support of partners in some countries in Europe and Southeast Asia, which completely restored the overall overview, technical characteristics, attack weapons, attack paths and attack sources of related attacks. It is preliminarily determined that the related attack activities originated from the "Office of Specific Invasion Operations" of the National Security Agency (NSA) (namely, the Office of Tailored Access Operation, hereinafter referred to as "TAO").

  This series of research reports will publish the important details of some specific attacks in thousands of cyber attacks launched by TAO against Northwestern Polytechnical University, and provide useful cases for countries around the world to effectively discover and prevent TAO’s subsequent cyber attacks.

  First, the process of TAO attack infiltrating Northwestern Polytechnical University

  TAO’s cyber attacks launched by other countries are highly targeted, adopting semi-automatic attack flow, single-point breakthrough, gradual infiltration and long-term stealing.

  (A) a single breakthrough, cascading infiltration, control of the network of Northwestern Polytechnical University

  After long-term careful preparation, TAO used the "acid fox" platform to carry out man-in-the-middle hijacking attacks on the internal hosts and servers of Northwestern Polytechnical University, deployed "anger jet" remote control weapons, and controlled several key servers. By using the way of Trojan horse cascade control penetration, it deeply penetrated into the internal network of Northwestern Polytechnical University, successively controlled the core network equipment, servers and terminals of the operation and maintenance network and office network, and obtained the control rights of some important network node equipment such as routers and switches in Northwestern Polytechnical University, stole the authentication data, and further implemented penetration expansion, and finally achieved the hidden control of the internal network of Northwestern Polytechnical University.

  (2) Concealed residence, "legal" monitoring and stealing core operation and maintenance data.

  TAO uses the cover weapon "Precision Surgeon" and the remote control Trojan NOPEN to realize the overall "invisibility" of the process, files and operation behavior, and secretly control the operation and maintenance management server of Northwestern Polytechnical University for a long time. At the same time, it adopts the way of replacing three original system files and three types of system logs to eliminate the trace and avoid the traceability. TAO has stolen several network device configuration files from the server. Using the stolen configuration files, TAO remotely "legally" monitored a number of network devices and Internet users, providing data support for the subsequent expansion and penetration of these targets.

  (3) Collecting authentication data, building channels and infiltrating infrastructure.

  By stealing key sensitive data such as account passwords, operation records and system logs of remote business management of operation and maintenance technicians in Northwestern Polytechnical University, TAO has mastered a number of account passwords of network boundary devices, access rights of business devices, configuration information of routers and other devices, and information of FTP server documents. According to the characteristics of TAO attack link, penetration mode and Trojan horse samples, it is found that TAO illegally attacked infrastructure operators in China, and a "legal" channel for remote access to the core data network of infrastructure operators was constructed, which realized the penetration control of infrastructure in China.

  (four) control of important business systems, the implementation of user data theft

  TAO entered the China infrastructure operator’s network as a "legitimate" by mastering the account passwords of Cisco PIX firewall, Tianrongxin firewall and other equipment, and then implemented intranet penetration and expansion, respectively controlled the service quality monitoring system and SMS gateway server of the relevant operators, and used the weapon tools specifically aimed at the operator’s equipment such as "Magic School" to query a group of sensitive identity personnel in China, and packaged and encrypted the user information and sent it back to the headquarters of the National Security Agency.

  Second, stealing sensitive information from Northwestern Polytechnical University and China operators.

  (1) Stealing key sensitive data such as passwords and operation records of remote business management accounts of Northwestern Polytechnical University.

  TAO secretly sniffed and stole the remote maintenance management information of the operation and maintenance management personnel of Northwestern Polytechnical University for a long time by installing the sniffing tool "drinking tea" in the operation and maintenance management server of Northwestern Polytechnical University, including the account password of network boundary equipment, access rights of business equipment, router and other equipment configuration information.

  The types of network devices that are sniffed include fixed Internet access network devices (routers, authentication servers, etc.), core network devices (core routers, switches, firewalls, etc.), and also important devices of communication infrastructure operators (data service platforms, etc.), including account numbers, passwords, device configurations, network configurations and other information.

  1. Steal the account password and configuration information of the core network equipment of Xigong University.

  At 6: 52 on December 11th, 20××× Beijing time, TAO used the proxy server (IP: 130.54 .××××××) located in Kyoto University of Japan as an attack springboard, illegally invaded the "telnet" management server of the operation and maintenance network of Northwestern Polytechnical University, uploaded and installed the NOPEN Trojan, and then controlled its intranet monitoring and management server in cascade. Both of the above servers had been installed with "tea drinking" sniffing in advance. TAO remotely controls the Trojan to retrieve and download the compressed and encrypted monitoring record file, and then clears the trace and exits. Stealing data includes the management account number, password, device configuration, network configuration and other information of routers and core network devices (core routers, switches, firewalls).

  2. Stealing the account password and configuration information of the access network authentication device for many times.

  (1) At 0: 28 on May 30th, 20××× Beijing time, TAO took the proxy server (IP: 210.135××××××) located in Japan as an attack springboard, illegally invaded the "telnet" management server of the operation and maintenance network of Northwestern Polytechnical University, uploaded and installed the NOPEN Trojan, and then controlled its intranet monitoring and management server in cascade. Both servers had been installed with "drinking tea" in advance. The stolen data includes the account number, password and configuration information of the access network authentication device.

  (2) At 1: 12 on July 4th, 20××× Beijing time, TAO used the proxy server (IP: 141.57 ××××××) located in Leipzig Institute of Technology, Economics and Culture as an attack springboard, illegally invaded the "telnet" management server of the operation and maintenance network of Northwestern Polytechnical University, uploaded and installed the NOPEN Trojan tool, and cascade controlled its internal network monitoring and management server and other three servers. These four servers were in advance.

  (3) At 10: 35 on October 11th, 20 ××× Beijing time, TAO used the proxy server (IP: 210.115 ×××××××) located at Gangwon National University in Seoul, South Korea as an attack springboard to illegally invade the monitoring and management server of the operation and maintenance network of Northwestern Polytechnical University, upload and install the NOPEN Trojan tool, and then cascade control its internal network backup server, authentication server and other four servers.

  (4) At 2: 46 on October 19th, 20××× Beijing time, TAO used the proxy server (IP: 143.248 .×××××××) of the Institute of Advanced Science and Technology in Daejeon, South Korea as an attack springboard, illegally invaded the "telnet" management server of the operation and maintenance network of Northwestern Polytechnical University, and controlled its intranet supervision server and other two servers in cascade. All three servers had been installed with "tea drinking" in advance.

  (2) Stealing configuration files and log files of network equipment operation and maintenance in Northwestern Polytechnical University.

  The National Security Agency’s "Specific Invasion Action Office" (TAO) has long attacked and invaded the network operation and maintenance management server of Northwestern Polytechnical University, secretly stealing the configuration files and log files of network equipment operation and maintenance.

  1. Steal the network operation log file of Northwestern Polytechnical University.

  At 3: 41 on March 2, 20×× Beijing time, TAO illegally invaded and controlled a network operation and maintenance management server of Northwestern Polytechnical University through a proxy server (IP: 210.135 ××××××) located in Japan. At 3: 49, TAO moved horizontally from the operation and maintenance management server to another operation and maintenance monitoring server, searched the log files with specific character strings as keywords and stole a batch of system operation log files and backup files of system daily self-inspection reports.

  2. Steal the regular task configuration script of Northwestern Polytechnical University server.

  At 10: 41 on October 11th, 20××× Beijing time, TAO invaded and controlled an intranet server of Northwestern Polytechnical University through a proxy server located in Korea (IP: 210.115 ××××××). At 10: 48, after two lateral moves, TAO invaded another intranet server, accessed the regular task configuration scripts in a specific directory, and retrieved 14 configuration files for regular tasks. Subsequently, these 14 files were stolen at one time, which can be used to perform regular cleaning, backup, power check and other operations.

  3. Steal the information file of the server system of Northwestern Polytechnical University.

  At 1: 27 on June 6, 20 ××× Beijing time, TAO invaded and controlled an intranet server of Northwestern Polytechnical University through a proxy server located in Korea (IP: 222.122 ××××××). At 2: 04, after two horizontal moves, TAO invaded another intranet server, accessed the system files under the directory /var/, and stole 60 commonly used system information files. The contents of the stolen system information files included system release version, user password hash, user rights, local domain name resolution configuration, etc.

  (C) Infiltration control of China infrastructure core equipment.

  The Office of Specific Invasion Operations (TAO) of the National Security Agency of the United States used the password of the stolen network equipment account to enter the service network of an infrastructure operator in China as a "legitimate" identity, control the related service quality monitoring system, and steal the user’s private data.

  1. Steal the privacy data of users in China.

  At 22: 53 Beijing time on March 7, 20 ×××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××××

  At 15: 02 on the same day, TAO saved the queried user data in the directory of the attacked server/var/tmp/.2e434fd8aaee73e1/ERF/out/f/,and then packaged it and sent it back to the attack springboard. Subsequently, the attack traces such as infiltration tools and user data uploaded during the process of stealing secrets were quickly removed by special tools.

  The Office of Specific Invasion Operations (TAO) of the National Security Agency of the United States used the same method to attack and control another China infrastructure business server at 23: 22 on January 10th, 8: 41 on January 29th, 22: 00 on March 28th and 23: 58 on June 6th, respectively, and illegally queried, exported and stole the user information of many identity-sensitive personnel in batches.

  2. Infiltrate and control the global telecommunications infrastructure

  According to the analysis, the Office of Specific Invasion Operations (TAO) of the National Security Agency (NSA) used the same combination of weapons and tools to "legally" control the telecommunications infrastructure networks in no less than 80 countries around the world. The technical team cooperated with the partners in Europe and Southeast Asian countries, successfully extracted and fixed the samples of the above weapons and tools, and successfully completed the technical analysis, which is planned to be released to the public in due course to help the world jointly resist and prevent the network penetration attack of NSA.

  Third, TAO exposed his identity during the attack.

  In the process of cyber attack on Northwestern Polytechnical University, the Office of Specific Invasion Operations (TAO) of the National Security Agency exposed many technical loopholes and made many operational mistakes. Relevant evidence further proves that the behind-the-scenes action of cyber attack on Northwestern Polytechnical University is the NSA of the United States. Here are some examples:

  (1) The attack time completely conforms to the law of work and rest time in the United States.

  The National Security Agency’s Office of Specific Invasion Operations (TAO) must use manual operation when using the tipoff activation command and remotely controlling the NOPEN Trojan. From the attack time of these two tools, the actual working time of the network attacker can be analyzed.

  First of all, according to the big data analysis of related cyber attacks, 98% of cyber attacks on Northwestern Polytechnical University are concentrated between 21: 00 and 4: 00 am Beijing time, which corresponds to 9: 00 to 16: 00 EST, and belongs to the domestic working time in the United States. Secondly, there was no cyber attack on Northwestern Polytechnical University on all Saturdays and Sundays in the United States. Thirdly, by analyzing the unique holidays in the United States, it is found that the "Memorial Day" in the United States has three days off, and the "Independence Day" in the United States has one day off. During these four days, the attacker did not carry out any attack and theft. Fourth, after a long period of close tracking of the attacks, it was found that all cyber attacks were silent during the Christmas period. Judging from the above working hours and holiday arrangements, those who attack and steal secrets against Northwestern Polytechnical University are unscrupulous and undisguised in their activities according to the schedule of working days in the United States.

  (B) Language behavior habits are closely related to the United States.

  During the long-term tracking and reverse osmosis of network attackers, the technical team found that the attackers have the following language characteristics: first, the attackers have the habit of using American English; Second, the internet devices associated with the attackers are all equipped with English operating systems and various English-language applications; Third, the attacker uses the American keyboard for input.

  (3) The working path of exposing the mistakes in weapon operation

  At 5: 36 (Beijing time) on May 16th, 20 ×××, the cyber attackers attacked Northwestern Polytechnical University again by using the springboard machine (IP:222.122.××.××) located in South Korea. When trying to invade and control a network device after the third-level infiltration of the intranet of Northwestern Polytechnical University, there was a human error when running the upload PY script tool, and the specified parameters were not modified. After the script is executed, an error message is returned, which reveals the working directory and corresponding file name of the attacker’s online terminal. From this, it can be known that the system environment of the Trojan control terminal is Linux system, and the corresponding directory name "/etc/autoutils" is the special name of TAO’s network attack weapon tool directory.

  The error message is as follows:

  Quantifier follows nothing in regex; marked by <– HERE in m/* <– HERE .log/ at https://news.cctv.com/2022/09/etc/autoutils line 4569

  (D) A large number of weapons are highly homologous to the exposed NSA weapons genes.

  Of the 41 different cyber attack weapons used in the attack on the secrets of Northwestern Polytechnical University, 16 tools are completely consistent with the TAO weapons exposed by the "shadow broker"; Although 23 tools are not exactly the same as those exposed by the "shadow broker", their genetic similarity is as high as 97%, and they belong to the same type of weapons, but their related configurations are different; The other two tools can’t correspond to the "Shadow Broker" exposure tool, but they need to be used together with other cyber attack weapons tools of TAO, so these weapons and tools obviously have homology and belong to TAO.

  (E) Some cyber attacks occurred before the exposure of "shadow brokers".

  The comprehensive analysis of the technical team found that in the tens of thousands of cyber attacks against targets in China, especially the thousands of cyber attacks launched against Northwestern Polytechnical University, some weapons used in the attack process were implanted with Trojan horses before the "shadow broker" exposed NSA weapons and equipment. According to NSA’s behavior habits, the above weapons and tools are likely to be used by TAO employees themselves.

  Fourth, TAO network attacks the IP list of weapon platform of Northwestern Polytechnical University

  During the technical analysis and traceability investigation, the technical team found a number of IP addresses of servers hosting related weapons and equipment used by TAO in the network invasion of Northwestern Polytechnical University. Examples are as follows:

  V. IP list of springboard used by TAO network to attack Northwestern Polytechnical University

  After continuous attack, the research team successfully locked the target node, multi-stage springboard, main control platform, encrypted tunnel, attack weapon and original terminal that launched the attack on Northwestern Polytechnical University, found the identity clues of the attacker, and successfully identified the true identities of 13 attackers.

Musk, who is about to be 53 years old, is said to be the father of 12 babies and still calls for "more children"

In a few days, Musk will celebrate his 53rd birthday, and there is evidence that he may be the father of 12 babies. Over the years, Musk has been contributing to the increase of the world’s population, and he has constantly called on human beings to have more children.

Bloomberg recently quoted people familiar with the matter as saying that earlier this year, the third child of American billionaire Musk and the female executive of the brain-computer interface technology company "Neural Connection" was born. According to media statistics, Musk has become the father of at least 12 children during his interaction with many women.

Neither Musk nor Chiris responded to this news.

Musk was born in South Africa on June 28th, 1971. According to media reports, the world’s richest man has been associated with at least four women.

Musk has had three marriages. In 2000, Musk got married for the first time. His wife, Justin Wilson, is a Canadian writer. Their marriage lasted eight years, during which they gave birth to six sons. Alexander, the first child, died unexpectedly at the age of 10 weeks, and then the couple gave birth to twins (Griffin Musk and Xavier Musk) and triplets (Kai, Saxon, Damia) in vitro, all boys.

In 2008, after the divorce, Musk shared the custody of the children with Justin Wilson.

Musk’s remaining two marriages are only related to one woman. In 2010, Musk married westworld actress talulah riley, and they divorced in 2012. In July 2013, the two remarried. In March 2016, the two divorced again.

There were no children in this marriage. Since then, Musk has never stepped into marriage, but the pace of having children has never stopped.

In May 2020, Musk gave birth to a son named X with Canadian singer Grimes. After they broke up, in 2022, Grimes gave birth to Musk’s daughter, nicknamed Y, through surrogacy.

During this period, Musk and Hivon Chiris also gave birth to two children. Chiris is a female executive of Musk’s "neural connection". A court document shows that Musk gave birth to twins with Chiris in November 2021. It is reported that the child was born in a test tube.

In 2023, walter isaacson, a biographer of Musk, confirmed that Musk and Grimes had a third child that had not been reported before. The child’s age has not been made public, and he is nicknamed Tau.

Earlier this year, Musk was exposed and quietly gave birth to a child with Chiris.

It is not clear how many children Musk has. According to public reports, there are 11 children who are still alive.

Musk had previously expressed concern about the decline in fertility rate around the world, especially in developed countries. In June this year, Musk said that the country was "going extinct" and called on everyone to have more children and avoid "population collapse". In addition, the Musk Foundation secretly subsidizes the American civil society organization "Encouraging Birth Movement", which is committed to encouraging birth at the economic and political levels.

Musk’s "population crisis theory" is not recognized by academic circles. According to the prediction of the United Nations, the world population will exceed the peak of 10 billion by 2100. It is generally believed in academic circles that after the world population reaches its peak, it will maintain a stable trend or decrease slowly, and there will be no so-called "population crisis" on the earth in the short term.

(Jimu News Comprehensive Global Times, The Paper)

Ministry of Public Security: In 2021, more than 6.2 million Internet Navy accounts will be shut down.

CCTV News:On January 14th, the Ministry of Public Security held a press conference to inform about the work measures and achievements of deploying public security organs across the country to carry out the "Net 2021" special action.

At the meeting, Sun Jinfeng, political commissar of the Network Security Bureau of the Ministry of Public Security, introduced that in recent years, various traditional crimes have accelerated to spread to the Internet, and cybercrime has become one of the major risks that endanger China’s data security, economic security and social security. In order to severely crack down on network crimes, ensure the healthy development of the digital economy and protect the legitimate rights and interests of the people, in 2021, the Party Committee of the Ministry of Public Security deployed a "net net" special campaign nationwide for the fourth consecutive year. In accordance with the unified deployment of the Ministry of Public Security, local public security organs have carefully organized and arranged, adhered to the strategy of "full-chain crackdown and ecological governance", focused on highlighting illegal crimes and network chaos on the Internet, in order to open the way, promote management by fighting, and promote governance by management. In the whole year, more than 62,000 cases were investigated, with a year-on-year increase of 10.7%; More than 103,000 criminal suspects were arrested, a year-on-year increase of 28.7%; More than 27,000 illegal Internet enterprises and units have been punished by administrative punishment, which has effectively maintained the security of cyberspace and the stability of online order, and effectively enhanced the people’s online security, sense of acquisition and happiness.

First, crack down on crimes against citizens’ personal information in accordance with the law. In recent years, technologies such as big data and cloud computing have not only promoted network interconnection and convergence, but also increased the risk of information leakage. In this regard, China promulgated the Data Security Law and the Personal Information Protection Law, which provided a strong legal support for the protection of personal information security. Public security organs throughout the country insist on putting the people in the highest position in their hearts, holding high the sword of law, always maintaining a high-pressure and severe crackdown on crimes against citizens’ personal information, focusing on the new trend of crimes of selling citizens’ personal information online, keeping a close eye on hidden parts such as "dark nets" and making every effort to carry out investigations. In 2021, more than 9,800 cases of infringing citizens’ personal information were investigated and more than 17,000 suspects were arrested.

The second is to severely punish hacking crimes according to law. In recent years, driven by high interests, some people steal data for profit through intelligent and covert attacks, threatening the security of enterprises and personal data, and even threatening the security of key information infrastructure. In this regard, the public security organs insisted on taking the initiative, focusing on judging and fighting in groups. In 2021, they arrested 3,309 people who carried out hacking activities and provided them with tools, money laundering and other services, and eradicated 341 gangs that produced and sold Trojan viruses and developed attack software platforms, which effectively guaranteed the security of important information systems and networks and effectively protected citizens’ personal information.

The third is to crack down on eavesdropping and stealing photos in accordance with the law. In recent years, some lawless elements illegally produce special equipment for eavesdropping and stealing photos, and sell and spread them online, which is deeply hated by the people. In this regard, the public security organs organized a special crackdown and rectification campaign. In 2021, a total of 783 criminal suspects were arrested for secretly installing eavesdropping and photo stealing equipment, 13 dens for manufacturing and selling special equipment for eavesdropping and photo stealing were destroyed, and more than 4,100 related equipment and parts were seized. More than 34,000 illegal eavesdropping and photo stealing products were removed from the e-commerce platform.

The fourth is to severely crack down on illegal crimes such as illegal black public relations and "network water army" according to law. In recent years, with the rise of "flow economy" and "fan economy", the "network water army" has gradually evolved from the initial simple posting "irrigation" to the implementation of paid post deletion, false comments, disinformation and drainage, and extortion by fake news media, misleading the public and seriously disrupting online order. In this regard, the public security organs organized and launched a special campaign to crack down on the "network water army". In 2021, more than 200 related cases were investigated, more than 2,000 criminal suspects were arrested, more than 6.2 million accounts and 1,200 websites of the "network water army" were shut down according to law, 170,000 network groups were dissolved, and a large number of forged press cards, official seals and business licenses were seized, effectively purifying the network environment.

Fifth, crack down on cheating and illegal crimes in online organization exams according to law. Examination order is related to social fairness and justice and the vital interests of the broad masses of the people. In recent years, some illegal personnel organized cheating in exams and sold cheating equipment through the Internet, which undermined the fairness and justice of exams and infringed on the legitimate interests of candidates. To this end, the public security organs kept a close eye on all kinds of national examinations and organized special campaigns to crack down on "exam-aid". In 2021, more than 430 cases were investigated, more than 1,700 criminal suspects were arrested, more than 7,100 cheating candidates were investigated, and more than 4,600 pieces of cheating equipment were collected, creating a good environment for fair competition for the majority of candidates.

The sixth is to carry out in-depth "seedling protection" actions for young people. Protecting the physical and mental health of teenagers is related to the national hope and the future of the country. Guided by "purifying cyberspace and safeguarding healthy growth", the public security organs have further promoted the "seedling protection" action. In 2021, more than 300 criminal suspects were arrested for producing and selling obscene articles for teenagers, and 16 pornographic websites involving teenagers were eradicated; More than 12,000 key websites and apps, such as arranging and checking online education and games, 852 enterprises that violate laws and regulations by administrative punishment, and 2,609 enterprises that have been rectified within a time limit; Clean up more than 400,000 pornographic and vulgar literary works and more than 1.04 million pieces of illegal and harmful information to protect the physical and mental health of young people.

The seventh is to carry out in-depth early warning, prevention and crackdown on online crimes. In recent years, some strangers have used the Internet to meet and commit crimes, endangering people’s lives and property. In this regard, the public security organs insist on grasping the early and grasping the small, actively build a violent crime prevention mechanism, and provide real-time early warning for cross-regional network-related crimes. Since 2021, 232 vicious cases such as injury, kidnapping and robbery have been successfully prevented, and 327 suspects have been arrested, which has effectively cracked down on such crimes.

Eighth, carry out the "four breaks" action of key materials of cybercrime in depth. "Black card, black number, black line and black equipment" are the four key materials for the implementation of cyber crimes, and have become an important support for all kinds of cyber criminal gangs to avoid regulatory attacks. In this regard, the public security organs launched a "four-off" campaign in an all-round way, focusing on key targets such as card merchants, number merchants, and coding and receiving platforms. In 2021, more than 13,000 such cases were investigated, more than 31,000 criminal suspects were arrested, more than 3 million black mobile phone cards were cleared, more than 10 million network black numbers were shut down, 63 coding receiving platforms were destroyed, and "cat pools" were seized.

Nine is to carry out in-depth "four treatments" of the key black products of cybercrime. Illegal "payment and settlement", "advertising promotion", "website building facilities" and "technical support" are four key black industries supporting cyber crime. In order to effectively cut off the network interest chain, the public security organs focused on these four types of black industries and further promoted the "four treatments" action. In 2021, more than 6,000 illegal payment and settlement gangs were destroyed and more than 73,000 criminal suspects were arrested. At the same time, efforts were made to identify, block and clean up the illegal information of these four types of black industries, and more than 440,000 pieces of illegal information were inspected and disposed of, effectively preventing the spread of related criminal activities.

The tenth is to carry out the "four management" action of ecological management of key basic resources in depth. "Internet TV, online games and online information publishing platform" are the key parts of illegal and harmful information breeding on the Internet. In this regard, the public security organs took the "four-management" action as the starting point, and carried out ecological management for four key basic resources, namely, "Internet TV, online games, online information publishing platforms" and "dynamic IP agents". In 2021, more than 48,000 administrative law enforcement inspections were carried out, and 3,651 illegal website platforms were punished. Together with relevant departments, 11 online games with prominent gambling and obscene information were investigated and dealt with according to law.

In the next step, the national public security organs will adhere to the guidance of the Supreme Leader’s Socialism with Chinese characteristics Thought in the new era, adhere to the overall concept of national security, adhere to the people-centered, adhere to the management of the network according to law, and always maintain a high-pressure strike-hard situation against all kinds of network crimes, thoroughly rectify the network black ash production and network chaos, continuously purify the network ecology, make every effort to create a clean and tidy network environment, strive to safeguard the legitimate rights and interests of the broad masses in cyberspace, earnestly fulfill the mission and tasks of the new era, and greet the party with excellent results.

Jinhua, Zhejiang: Please comment on the semi-annual report of procuratorial work on the spot on behalf of members.

What are the deputies concerned about?

Jinhua, Zhejiang: Please comment on the semi-annual report of procuratorial work on the spot on behalf of members.

Deputy Yu Xuewen

Representative Huang Meimei

Representative Fang Qing

Commissioner Liu Huaying.

Representative Wu Yuexiao

"The semi-annual report is very bright! I am very satisfied with Jinhua’s procuratorial work! " "The work of less arrest and cautious prosecution highlights the judicial temperature and maintains social harmony and stability, which is worthy of praise!" "The unchecked work should also increase publicity!" "Intellectual property protection should be good at leveraging!"……On August 2, the Procuratorate of Jinhua City, Zhejiang Province held a press conference. In addition to media reporters, the press conference also invited representatives of the national, provincial and municipal people’s congresses and members of Jinhua CPPCC. After listening to the briefing on the work of the hospital in the first half of the year, five deputies made comments and suggestions respectively.

Less arrest, more caution and more caution.

In order to strictly implement the criminal policy of less arrest and cautious prosecution and cautious detention, in mid-March this year, Jinhua City Procuratorate and the public security organs jointly issued the Guiding Opinions on Reducing Criminal Compulsory Measures in Custody (Trial), clarifying the application scope, standards and scales of compulsory measures, and establishing relevant supporting mechanisms to reduce coercive measures in custody. After the guidance was issued, the pretrial detention rate in the first half of the city decreased by 12.92% year-on-year, and showed a downward trend month by month.

"It is not only an expression of the modesty of the law, but also an effective measure to develop the’ Fengqiao experience’ in the new era. Procuratorial organs should standardize the use of the right not to approve arrest and the right not to appeal, and also perform their supervisory functions, strengthen supervision over this work, and strive to ensure fairness and justice." Yu Xuewen, deputy to the National People’s Congress, director of the village committee of Qingkeng Village, Liucheng She Town, Wuyi County, Zhejiang Province, and chairman of Zhejiang Gengxiang Organic Tea Industry (Base) Development Co., Ltd., took the lead in expressing his views on this highlight.

"It is the judicial policy of the country to arrest juvenile criminal suspects with less caution, which reflects the judicial temperature. Let the minors and parents involved in the crime understand this!" Combined with her case of participating in the procuratorial organs’ assistance and education for minors involved in crimes, Huang Meimei, a deputy to the National People’s Congress and an employee of the comprehensive department of Daoming Optics Co., Ltd., suggested that when carrying out the procuratorial work for minors, the word "caution" should be emphasized, and it is neither possible to arrest them at once nor to let them go at once. We should really make good use of this policy to save minors involved in crimes, but also prevent "deep love" from being abused.

"Help me 885"

"In terms of technology, combined with the key areas and key issues involved in the unchecked work, it is necessary to better achieve the smooth flow and feedback of front desk services and report reception and background clues; In terms of mechanism construction, it is necessary to implement the "two numbers and one yard" mechanism linked by multiple departments; In terms of publicity, in addition to being rolled out on campus, it should be extended to hospitals, education and training institutions, township streets and other places that are in close contact with minors, and the mandatory reporting system should be fully implemented to ensure all-round protection of minors. " Focusing on the procuratorial work of minors, Fang Qing, deputy of Zhejiang Provincial People’s Congress, vice chairman of Jinhua Municipal Committee of the Chinese Revolutionary Committee and principal of Jinhua jindong district Experimental Primary School, put forward three suggestions in one breath.

"Two numbers and one yard" refers to the special number of "88908585" minors’ protection telephone, "Help me 885" WeChat official account and the two-dimensional code for minors’ protection. It is the "885 Jinhua minors’ protection linkage platform" created by Jinhua Municipal Bureau of Letters and Calls, Women’s Federation, Education Bureau and Civil Affairs Bureau. The platform creates a "six-in-one" minor protection pattern of family, school, society, network, government and justice, and provides services such as legal publicity, legal consultation, family education guidance, complaints and reports, and assistance for children in distress, covering all aspects of minor work. Since it was put into operation in mid-April, "Help Me 885" WeChat official account has attracted nearly 70,000 users’ attention, and has received and sorted out more than 20 case clues.

"The procuratorial organs have put a lot of effort into the construction of this platform." "With the implementation of the’ two laws’ for minors, the protection of minors needs the joint efforts of the whole society." "We must constantly optimize and upgrade the platform, strengthen linkage, and let more people participate."……The deputies spoke in succession.

Protect the legitimate rights and interests of enterprises

Corporate protection has also become the focus of the deputies. Yu Xuewen suggested that the procuratorial organs should strengthen the legal supervision of enterprise-related cases and give full play to the functions of protest to protect the legitimate rights and interests of enterprises.

Liu Huaying, a member of Jinhua CPPCC and a partner of Guofeng Law Firm, suggested strengthening the protection of intellectual property rights in an all-round way, advising the court to apply restraining orders and occupational bans to defendants who have infringed on intellectual property rights for a long time, paying continuous attention to the new situation of intellectual property crimes committed by relying on the Internet, continuing to participate in social governance and extending procuratorial functions.

Ding Chengyi, director of the Political Department of Jinhua City Procuratorate, said that since the beginning of this year, the institute has made every effort to ensure the construction of a national innovative city, and actively escorted the development of major projects such as Jinyi Free Trade Zone and China-Europe (Yixin Europe) trains, especially strengthened the protection of intellectual property rights of enterprises, such as sinking a platform for protecting intellectual property rights, building a closed-loop judicial protection chain for intellectual property rights, and carrying out a series of activities such as escorting private entrepreneurs to develop the private economy.

Wu Yuexiao, member of the Judicial Supervision Committee of the Standing Committee of Jinhua Municipal People’s Congress and general manager of Jinzi Ham Co., Ltd., pointed out that while protecting the development of private economy, procuratorial organs should strengthen supervision and management of rights protection, protect the legitimate rights and interests of vulnerable groups and promote social harmony and stability. According to reports, in the first half of this year, Jinhua City Procuratorate safeguarded the legitimate rights and interests of vulnerable groups, launched a special campaign to help solve the problem of wage arrears, and actively communicated with the municipal social security department to obtain more than 1,400 clues about wage arrears.

The press conference also informed the city’s procuratorial organs of "doing a good job in mass letters and visits and responding to mass letters and visits": in the first half of this year, the city’s procuratorial organs accepted a total of 2,186 mass letters and visits, all of which met the requirements for reply were procedural within 7 days and 100% response to the handling process or results within 3 months, while strengthening leadership package and resolving accumulated cases. The deputies pointed out that major, difficult and complicated letters and visits should be followed up properly after the visit, and more ways should be used to explain the law, such as leadership interviews, joint visits by departments, and public hearings. It is necessary to establish an all-weather rapid response mechanism based on the 12309 procuratorial service center platform.

(Reporter Fan Yuehong &ensp; Correspondent Liu Chuanxi)

In July, Sina quoted JAC Automobile Ruifeng M3 from Nanchang 57,300.

Space must be invincible. Seating space: the seating space is large, quite comfortable and there is nothing wrong with it. There is a lot of space in front, and there is nothing wrong with crossing your legs in the middle space. The seats in the back are ok! When the whole family goes out: when going out, the carriage is too big, the air conditioner is turned on, and the temperature of the whole car is slow. It would be perfect to add two more air outlets in the back row. Luggage: It doesn’t matter how much luggage I put. I usually pull goods. The third row of seats are put down, and the trunk is basically abandoned, but there is still room for luggage at the middle side sliding door! Storage space: the storage space is ok. The front door can’t even hold a bottle of mineral water. It is estimated that the umbrella is designed, and the water cup can only be placed on the middle armrest!

Hybrid encyclopedia

Sometimes, it is more important to take every step right than to take every step well!

From the first chess piece in 2003 to the overall situation in 2021, BYD has completed the phased strategic goal, which is like the first stage of the Marvel universe that has ended. Word of mouth and box office have achieved a win-win situation. Today, let’s talk about BYD’s "DM hybrid system" (Dual Mode is dual-mode technology and BYD plug-in hybrid technology platform).

image075.jpg

Technical route overview of BYD DM hybrid system

This article is long, so you can read it according to the table of contents.

The first section: the first generation of DM hybrid system: the starting point of domestic plug-in hybrid

Section II: Second Generation DM Hybrid System: Performance Trend, 542 Strategy

Section III: Third Generation DM Hybrid System: Complementing Shortboards and Improving Performance

Section IV: BYD DM-p Hybrid System: Dual Platform Strategy

Section 5: BYD DM-i hybrid system: a master, your self-research

Section VI: Vehicles equipped with BYD DM-i hybrid system

Section VII: BYD DM dual platform strategy: phased results

The first generation DM hybrid system: the starting point of domestic plug-in hybrid

As early as 2003, BYD began to invest manpower and material resources in the research and development of plug-in hybrid system, and five years later, it launched the first generation DM hybrid system, which was installed on BYD F3DM (officially listed on December 15th, 2008). The historical significance of BYD F3DM lies in:

1. The "plug-in hybrid system" was officially brought into the mainstream market of hybrid vehicles;Compared with the Great Wall and Geely mentioned earlier, BYD’s basic hybrid technology has basically never left the concept of "plug-in hybrid system", so at least in this technical decision, there are not too many detours;

2. The technical concept of a new dual-motor architecture is mass-produced;This sentence is difficult to understand, so let’s take a look at the technical characteristics of the first generation DM hybrid system.

The design concept of "the first generation DM hybrid system" is mainly energy-saving. Through the structure of double motors and single-speed reducer with a 1.0-liter self-priming three-cylinder engine, three driving modes are realized: pure electric, extended range, hybrid (including direct drive) and three driving modes. The structure of "the first generation DM hybrid system" belongs to the classic "P1P3 motor architecture";

The first generation DM hybrid system also has four basic driving modes:

Pure electric mode:The "engine" is not started, the "clutch" is disengaged, and the "drive motor" drives the vehicle;

Series mode (extended range mode):The "engine" starts to drive the "generator" to generate electricity and supply it to the "battery", and the "drive motor" drives the vehicle;

Parallel mode:The "engine" is started and the "clutch" is coupled. At this time, the "generator" and the "driving motor" do work at the same time to jointly drive the vehicle.

Kinetic energy recovery mode:The "clutch" is disconnected and the "drive motor" recovers kinetic energy.

In addition, the "first generation DM hybrid system" is a special working condition during cruising, and two cruising modes are also designed:

Cruise direct drive mode:Clutch coupling, engine direct-drive vehicle, generator and drive motor do not do work;

Cruise power generation mode:The engine is started, the generator generates electricity to charge the battery, and the clutch is combined to drive the vehicle, while the drive motor does not do work.

Working principle of the first generation DM hybrid system. gif

Working principle of the first generation DM hybrid system (moving picture)

The maximum power of the first generation DM hybrid system is 50kW for the engine, 25kW for the generator and 50kW for the drive motor. The whole system is matched with each other, and the power consumption of pure electricity is 16kWh/100km, and the fuel consumption of comprehensive working conditions is 2.7L/100km. Interestingly, although the "first generation DM hybrid system" is a plug-in hybrid system, it is the same as a pure electric vehicle.Equipped with fast charging interface, you can charge 50% in 10 minutes.

However, the "first generation DM hybrid system" is not without its shortcomings, such as:

1. Poor transmission smoothness:Because the chain drive is adopted between the "output shaft" and the "main reducer", it has high cost, easy wear, poor transmission stability and extra vibration and noise;

2. Low upper power limit:Moreover, due to the cost at that time, the two "motors" and "engines" were equipped with low power (when the power was sufficient, the maximum total power was about 80kW), and the acceleration time per 100 kilometers was 10.5s, so the power was weak. In addition, because the "drive motor" is directly connected to the "output shaft", the maximum speed is limited by the maximum speed of the "motor";

3. High car price:BYD F3DM is about 80,000 more expensive than the fuel version.

I wonder if you can see the similarity between the two.

However, we have to deny the historical significance of the "First Generation DM Hybrid System". This hybrid architecture, which was earlier than the "Honda i-MMD Hybrid System" (listed in 2012), not only affects the future of BYD, but also is a milestone of the whole hybrid car industry. Moreover, the technical concept of the "First Generation DM Hybrid System" is still glowing up to now. In the "BYD DM-i Hybrid System" since then,

The second generation DM hybrid system: performance trend, 542 strategy

The main idea of "the first generation DM hybrid system" is energy saving, but in terms of power, it is really unacceptable to many consumers. Therefore, the "Second Generation DM Hybrid System" released in 2013 has embarked on another concept-Performance trend.

Schematic diagram of the second generation DM hybrid system (Tang DM 2015)

Since the concept has changed, the whole structure has been naturally adjusted: the strategy of using the motor has been changed from the original P1P3 motor structure to the combination of P3P4 motor structure, and the whole hybrid system is the combination of P3 motor +P4 motor+engine, so BYD’s "three engines and four wheels" powertrain was born.

Schematic diagram of the second generation DM hybrid system (Tang DM 2015)

Based on the structure of the second-generation DM hybrid system, its driving modes can be roughly divided into the following categories:

Pure electric mode:"Battery" power supply, "P3 motor" and "P4 motor" jointly drive the car;

Series mode (extended range mode):The "engine" drives the "P3 motor" to generate electricity through the power generation gear of the gearbox, and the "P4 motor" drives the vehicle, and more electricity is stored in the "battery". However, judging from the powertrain composition of the front axle,There is no "series mode" in the "second generation DM hybrid system"In addition, to enter the "series mode", several harsh conditions must be met:

1. The power is less than 5%;

2. The vehicle speed is less than 15km/h and kept for 5 seconds;

3. After entering the mode, the vehicle speed still cannot exceed 20km/h, otherwise it will exit.

Parallel mode:That is, the "engine" and the front and rear two "motors" work at the same time. In this mode, the effect of timely four-wheel drive is realized, but it can be subdivided into two states:

Driving power generation:The "engine" drives the "front wheel" through the "transmission" and drives the "P3 motor" to generate electricity, while the "P4 motor" adjusts the output power according to the working conditions. At this time, from the powertrain of the front axle, it is a mode of "engine direct drive";

Driving without generating electricity:The "engine" drives the "front wheel" through the "transmission" but does not generate electricity. The output power of the "P3 motor" and "P4 motor" is adjusted according to the working conditions only to ensure the strongest power.

Parking power generation:The "engine" drives the "P3 motor" to generate electricity through the "power generation gear" of the transmission.

The second-generation DM hybrid system is the BYD Qin DM (model 2014) for the first time. The power system of this vehicle consists of a 1.5Ti in-cylinder direct injection engine (maximum power of 113kW), a 6-speed dry powershift (DT35) and a P3 motor (peak power of 110kW), and the acceleration of 100 kilometers is 5.9 seconds.

BYD Tang DM(2015 model) with "542" printed under the A-pillar.

Since then, BYD has improved the "second-generation DM hybrid system", continued to increase the power, and installed this system on the "BYD Tang DM" (2015 model). The main changes are as follows:

1. "Engine" upgrade:1.5T (maximum power 113kW) is upgraded to 2.0T (maximum power 151kW/320N·m););

2. The "transmission" changed from "dry" to "wet";When the 6-speed dry "powershift" is replaced by the 6-speed wet "powershift", the sense of power interruption is further weakened, and the ability to adjust the efficient working area of the "engine" is enhanced;

3. Add "P4 motor":Add a P4 motor with the same peak power (110kW) as P3 motor.

Tail logo of BYD Tang DM(2015 model)

The overweight "three-engine four-wheel drive" hybrid system can output nearly 400kW of power, and the comprehensive torque can reach 800N·m, which realizes the acceleration of SUV for 4.9 seconds. In order to intuitively let consumers know that "BYD Tang DM" (2015 model) can run for 5 seconds, so BYD directly put "『4.9s』" on the tail label of the car.

image009.gif

Working principle of the second generation DM hybrid system (moving picture)

But for the "second-generation DM hybrid system", the most deadly sentence is nothing more than "a dragon with electricity, a caterpillar without electricity". There are actually several reasons behind this sentence:

1. Weak feed:As mentioned earlier, from the hybrid powertrain of the front axle, the "second generation DM hybrid system" has no "series mode", that is to say, there is no "P1 motor" or "P0 motor", and there is no "generator" with continuous power supply, so it is impossible to maintain the power for a long time. The power can’t be maintained, and oil will be used if there is no power, which also leads to the decline of fuel economy of the overall hybrid system;

2. "P3 motor" has low efficiency in some working conditions:Because the P3 motor is located at the output shaft of the transmission, it does not accept the speed regulation of the transmission, but only adjusts the speed through the fixed reduction gear. Therefore, at high speed, the efficiency is low, and the torque provided to the wheels will also be drastically reduced. In addition, when the vehicle speed is low, the P3 motor is running at a low speed and cannot charge the battery with high power.

Let’s find fault together. See the difference?

However, the "second generation DM hybrid system" also has a milestone significance from the technical concept, which has made BYD’s."542 strategy"(5 stands for acceleration within 5 seconds per 100 kilometers, 4 stands for full-time electric four-wheel drive, and 2 stands for fuel consumption within 2 liters per 100 kilometers), and the hybrid technology is separated from the traditional logic of pure fuel saving, just as this series has always reminded everyone that "fuel saving is not the whole of hybrid car technology". In addition, the "second generation DM hybrid system" also laid a solid foundation for the "BYD DM-p hybrid system".

The Third Generation DM Hybrid System: Complementing Shortboards and Improving Performance

Time has come to 2018, and the BYD Tang DM equipped with the "third generation DM hybrid system" has been rejuvenated. From the architecture of the hybrid system, the "third generation DM hybrid system" inherits most of the characteristics of the "second generation DM hybrid system", but it also brings a big improvement.

Schematic diagram of the third generation DM hybrid system structure

That is, at the P0 position in the front section of the "engine", it was added."BSG motor"(P0 motor), this "BSG motor" with a maximum power of 25kW mainly plays several roles:

With the addition of P0 motor, series connection can be realized (theoretical state).

1. Feed functionBy realizing "series connection" in a small power range, the shortcomings of the "second generation DM hybrid system" are made up.

2. Start the "engine"When the "engine" is started, the "BSG motor" intervenes to increase the speed of the "engine" in advance, so as to avoid the ignition of the "engine" in the low-speed area with insufficient combustion and large vibration, and realize the rapid and smooth start and stop of the "engine";

3. Adjust the "engine" speedIn the process of shifting gears, BSG motor can adjust the "engine" to reach the specified speed, thus improving the shift smoothness during driving.

Byd Tang DM(2018 model)

In addition to P0 motor, the third generation DM hybrid system is also equipped with a more powerful P4 motor, which has been increased from the maximum power of the previous generation of 110 kW/250 N m to 180 kW/380 N m. Therefore, the acceleration of 100 kilometers has also been increased from the original 4.9 seconds to 4.3 seconds (BYD Tang DM is 4.5 seconds).

The third generation DM hybrid system has further become a family bucket.

Another major upgrade of the third-generation DM hybrid system is the electronic control system. Through the integration of motor and electronic control equipment, the high-voltage 3-in-1 technology and drive 3-in-1 technology are finally realized, which greatly improves the performance, reduces the weight and reduces the volume. In addition, in addition to the "three-engine four-wheel drive" with oversized cups, BYD also enriched the collocation of the "third-generation DM hybrid system", and introduced the combination of "two-engine four-wheel drive" (P0 motor +P4 motor) and "two-engine front drive" (P0 motor +P3 motor), which were installed on the "BYD Song MAX DM" and other vehicles.

BYD DM-p Hybrid System: Dual Platform Strategy

In June 2020, BYD released the dual-platform strategy of DM hybrid system, namely "DM-p" and "DM-i".

"p" means "『powerful』"Inherited the structural design concept of the second and third generation "DM hybrid system" that pursues power and speed, and meets the consumers who pursue speed;

"I" means "『intelligent』"It inherits the structural design concept of the first generation of "DM hybrid system" that pursues energy saving and high efficiency, and satisfies consumers who pursue car economy.

Among them, the "BYD DM-i hybrid system" has changed greatly from the first generation. We will start later. Let’s take a look at the "BYD DM-p hybrid system" with relatively small structural changes.

The first batch of Han DM equipped with DM-p (June DM(2020)

Since the previous generation has added the 25kW BSG motor, I personally think that the design of BYD DM-p hybrid system takes the optimization of 『NVH』 and ride comfort as the core goal of the upgrade. So we can see:

1. 7-speed powershift.Compared with the previous 6-speed "powershift", the speed ratio difference is reduced and the ride comfort is improved. At the same time, the "transmission" uses more "ball bearings" to replace the original "cone bearings", reducing the friction area and improving the noise;

2. Redesigned powertrainThe engine (1.5T or 2.0T) and the intake and exhaust system of BYD DM-p hybrid system have been optimized and upgraded. For example, the 1.5T engine optimizes the bearing bush to reduce the clearance and friction. At the same time, optimize the "chain" to reduce the noise caused by the "engine" driving the "BSG motor", and for example, put the "CRV valve" outside to reduce the noise caused by the pressure relief of the "supercharger".

image005.gif

Principle of BYD DM-p hybrid system (moving picture)

Of course, the working mode of BYD DM-p hybrid system is relatively complete. Take the structure of "three engines and four wheels" as an example, including:

Pure electric mode: Suitable for commuting in urban road conditions, with pure battery life up to 100km;;

Series mode: "Engine" and "generator" are connected in series to generate electricity, and "drive motor" drives them;

Parallel modeThe "engine" and "driving motor" are driven together, and the acceleration of 100 kilometers is 4.5 seconds;

Cruise modeThe "engine" drives and generates electricity, the expressway runs at a constant speed, and the "engine" drives in a high efficiency range, which not only ensures power but also realizes economy and fuel saving;

Kinetic energy recovery mode: The "engine" and the "motor" of the front and rear axles simultaneously recover kinetic energy.

One more thing to mention here, we can see that the model equipped with BYD DM-p hybrid system has been able to achieve a pure battery life of 100km (battery capacity of 21.5kWh), which is also a bright spot in the strategy of "BYD DM dual platform". So, I will take a good look at how many surprises BYD DM-i hybrid system has brought.

Byd DM-i hybrid system: a master, you are in self-research

If the design concept of the first-generation DM hybrid system is energy-saving and fuel-saving, then the BYD DM-i hybrid system is sublimated. By adding a high-power motor and a high-capacity battery, the engine becomes an auxiliary component of power, and finally the effect of "using more electricity and less oil" is achieved.

Schematic diagram of disassembly of BYD DM-i hybrid system

The biggest advantage of BYD DM-i hybrid system is not the complicated structure, but the core control systems such as engine control system, motor control system and battery management system have been independently developed, including but not limited to:

"Xiaoyun Engine":1.5L and 1.5Ti "special engines for plug and mix";

"EHS system":A "hybrid special transmission" that inherits the design concept of "first generation DM hybrid system";

"Blade battery":High discharge rate and flexible collocation of "hybrid special power blade battery".

Next, let’s take a look at these core components separately.

1. "Xiaoyun Engine": Born only for high efficiency.

At present, there are two types of "engines" in Xiaoyun series, which focus on economy respectively."1.5L Special Engine for Plug-in and Mixing"(hereinafter referred to as "1.5L engine") and high performance, configured on C-class "DM-i" models."1.5Ti special engine for plug and mix"(hereinafter referred to as "1.5Ti engine").

Showcase of Xiaoyun 1.5Ti plug-in hybrid engine

The "1.5Ti engine" has a "compression ratio" of 12.5. The technical highlight is that its "turbocharger" adopts a "variable cross-section" design, which enables the "turbocharger" to supercharge in a wider speed range, thus ensuring the supercharging effect at low speed and not affecting the exhaust pressure at high speed.

Showcase of Xiaoyun 1.5L plug-in hybrid engine

The "1.5L engine" can be said to be "the masterpiece of BYD in the field of hybrid engines", and it has truly been "born for electricity". Compared with the traditional "engine", its overall structure has been greatly adjusted, and finally it has achieved a thermal efficiency of 43.04%. Digging into its technical principle, we can see that:

Schematic diagram of variable valve timing technology

Atkinson cycle ("Miller cycle"):By delaying the closing time of the intake valve through the variable valve timing technology, the energy consumption of the compression stroke in the four-stroke is reduced, and the expansion stroke remains unchanged, so that the mixed gas can do more work, improve the utilization rate of the mixed gas energy and reduce the exhaust loss. This technology can be seen in many "hybrid engines", and most OEMs will call this cycle "Atkinson cycle". The story is in "Really?" Now the "Atkinson" of hybrid cars is fake? I have explained it in detail in the article, so I won’t go into details here;

Conceptual diagram of compression ratio

15.5 Superhigh "Compression Ratio":Generally speaking, we think that the greater the compression ratio, the more work the engine does (that is, the greater the compression ratio, the higher the efficiency of the engine). The "1.5L engine" is designed with an ultra-high "compression ratio" of 15.5: 1, which also reflects its goal of efficiency first. Of course, as far as the compression ratio is concerned, BYD’s Xiaoyun Engine is definitely the best in the industry.

Schematic diagram of EGR valve working principle

Efficient "EGR" technology:In order to improve the overall efficiency of the "engine", an efficient "exhaust gas recirculation system" is essential. By optimizing the "exhaust gas recirculation system", BYD has increased the "EGR rate" to 25%, reducing the intake loss of the "engine" under medium and low load conditions, and also reducing the emission of nitrogen oxides. The "low-pressure water-cooled EGR technology" of Geely’s "Hybrid Special Engine" ("DHE15") mentioned earlier has the same technical logic;

Hybrid special engine after slimming

Cancel the traditional "gear train" and adopt "split cooling technology";Compared with the traditional engine, the biggest change of the 1.5L engine is to cancel the gear train of the engine, including the mechanical compressor, mechanical vacuum pump, mechanical steering booster pump and mechanical water pump. But for the sake of efficiency, the electric water pump is combined with the electronic double thermostat to realize the separate cooling of the cylinder block and the cylinder head.

Showcase of two Xiaoyun plug-in hybrid engines

Generally speaking, this "1.5L engine" (peak power 81kW/ peak torque 135N·m) aiming at hybrid efficiency has achieved the goal of 43.04% thermal efficiency theoretically through many technical optimizations such as 15.5 ultra-high compression ratio, Atkinson cycle, efficient EGR, low friction and cancellation of traditional gear train.

2. "EHS system": the core of BYD DM-i hybrid system

After talking about Xiaoyun Engine, there is another core of BYD DM-i Hybrid System: Hybrid Special Transmission, which BYD calls EHS System or E-CVT.

The structure of "EHS system" is "series-parallel double motors" structure, and its working principle inherits the design concept of "first generation DM hybrid system" with "electric drive as the center" and has been carried out.Overall optimization

1. Different from the first-generation DM hybrid system, BYD DM-i hybrid system juxtaposes two high-speed motors that can reach 16,000 rpm, thus reducing the volume of the whole hybrid special transmission by about 30% and the weight by about 30%;

2. The "engine" is directly connected to the "generator" (P1 motor or ISG motor), connected to the "reduction gear" through the "clutch", and finally goes to the "output shaft". The "drive motor" (P3 motor) directly passes through the "reduction gear", and finally "power" also flows to the "output shaft", which is more efficient and fuel-efficient.

Schematic diagram of EHS system structure

According to the power of the drive motor, the current EHS system consists of three versions:

· 「EHS132」:The peak power of "generator" is 75kW, and that of "driving motor" is 132kW;;

· 「EHS145」:The peak power of "generator" is 75kW, and that of "driving motor" is 145kW;;

· 「EHS160」:The peak power of "generator" is 90kW, and that of "driving motor" is 160kW.

When the three EHS systems are adapted to the vehicle models, different Xiaoyun engines will be adopted:

"EHS 132" and "EHS145" adopt 1.5L "Xiaoyun Engine";

EHS 160 adopts Xiaoyun 1.5Ti Xiaoyun Engine.

image010.gif

Schematic diagram of working principle of BYD DM-i hybrid system (moving picture)

And "BYD DM-i hybrid system" also has the common working mode of hybrid system:

Pure electric mode:When starting and driving at low speed, the "drive motor" is powered by the "battery" to drive the vehicle;

Series mode:The "engine" drives the "generator" to generate electricity, and the electric energy is output to the "driving motor" through "electronic control" to directly drive the "wheels". When driving at low or medium speed or accelerating, if the "SOC value" is high, the vehicle control strategy will switch the drive to pure electric mode and stop the "engine". If the SOC value is low, the control strategy will make the engine work in the best efficiency area of oil consumption, and at the same time, the surplus energy will be converted into electric energy through the generator and temporarily stored in the battery, so that it is not easy to lose electricity under all working conditions.

Parallel mode:When the driving power demand of the whole vehicle is relatively high (such as overtaking at high speed or driving at ultra-high speed), the "engine" will be out of economic power, and at this time, the control system will let the "battery" intervene at an appropriate time to provide electric energy to the "drive motor" and form a parallel mode with the "engine";

Kinetic energy recovery mode:When braking, kinetic energy is recovered by "driving motor";

Engine direct drive mode:When cruising at high speed, the power of the engine is directly applied to the wheels through the clutch module in the EHS system, so that the engine is locked in the high-efficiency area. At the same time, in order to avoid the waste of the energy of the engine, the generator and the driving motor are on standby at any time, and when the power of the engine is surplus, they intervene in time to convert the energy into electric energy and store it in.

Schematic diagram of BYD flat wire motor

As mentioned earlier, from the complexity of structure and working principle, the "EHS system" may not be so amazing, but there are several key technologies behind this system, including but not limited to:

"Flat wire motor":The "motor" in "EHS system" adopts flat wire winding technology. According to official data, the highest efficiency of "motor" reaches 97.5%, the rated power is increased by 32%, the high-efficiency interval (the interval with efficiency greater than 90%) accounts for 90.3%, and the mass power density reaches 5.8 kW/kg.

The fourth generation "IGBT system" developed by ourselves;According to official data, the comprehensive efficiency of BYD’s "electronic control" is as high as 98.5%, and the "electronic control" high-efficiency area (that is, the area where the "electronic control" efficiency exceeds 90%) accounts for as high as 93%, which greatly reduces the loss of electronic control and improves efficiency.

image017.gif

Schematic diagram of manufacturing process of BYD’s fourth generation IGBT (moving picture)

Generally speaking, the core of EHS system is to make the engine focus on the best efficiency range and play more role as the motor.

3. "Blade Battery": BYD’s wayward capital

According to the official news, the blade battery used in BYD DM-i hybrid system should be slightly different from the blade battery used in pure electric vehicles. The official name is "hybrid special power blade battery", which makes me sigh that the main engine factory that can make its own battery is qualified for willfulness, and its special features are as follows:

Schematic diagram of BYD blade battery

The voltage of a single "battery" reaches 20V;Each battery is connected in series with several (presumably 6) soft package winding batteries, so that the voltage of a single battery can reach more than 20V, ensuring that the battery can still have enough voltage to ensure the driving efficiency of the motor when the power is low.

"Battery pack" can be flexibly matched:A single "battery pack" consists of 10 to 20 "blade batteries", in other words, the power will be between 8.3 and 21.5 kWh, that is, the theoretical pure battery life can be set between 50 and 120 km. Therefore, BYD can match "battery packs" with different capacities on different levels of vehicles;

Simplified structure and high space utilization;This is actually the common feature of BYD’s blade batteries. For example, the batteries are arranged vertically, so that the sampling wires, wires and data wires of the batteries can be placed on one side, thus reducing the structural complexity and improving the unit energy density of the battery pack.

Longitudinal arrangement of hybrid special power blade batteries

Of course, the analysis of the characteristics of other "blade batteries", such as the "discharge rate" and secondary packaging technology of "batteries", will not be expanded here, and we will open a separate article to explain it in detail. In a word, "blade battery" is as important as "Xiaoyun engine" and "EHS system" for the whole BYD DM-i hybrid system, which is indispensable and extremely important.

Byd Qin plus DM-i equipped with BYD DM-I hybrid system

To sum up the BYD DM-i hybrid system in one sentence, I think it can be said as follows:A self-developed hybrid system based on electricity has three core hybrid technologies and four main hybrid modes to create a driving experience with low fuel consumption and high comfort.

Vehicles equipped with BYD DM-i hybrid system

After talking about the technology of BYD DM-i hybrid system, let’s take stock of which BYD models have been or have been confirmed to be equipped with BYD DM-i hybrid system:

1. The Four Heavenly Kings who have officially served.

Qin PLUS DM-i

Official comprehensive endurance: 1245km

Price: 108,800-148,800 yuan

Qin PLUS DM-i is BYD’s first DM-i model, which was officially launched in March last year. In terms of appearance, Qin PLUS DM-i is based on the latest "『Dragon Face』" design concept, and at the same time, it incorporates new design elements. At present, this does represent the design ideas of some BYD models.

In terms of power, Qin PLUS DM-i is equipped with a 1.5L engine+drive motor, the maximum power of the engine is 81kW, and the drive motor has two kinds of power: the maximum power of the low power version is 132kW, and the zero acceleration is 7.9s;; The maximum power of the high-power version is 145kW, and the acceleration is 7.3s.

In terms of battery life, Qin PLUS DM-i is equipped with two blade batteries with different capacities of 8.32kWh and 18.32kWh. The corresponding pure electric cruising range is 55km and 120km respectively, and the minimum fuel consumption is 3.8L/100km.

Applicable people: the price is close to the people, the lowest electricity loss and fuel consumption, suitable for users who are mainly economical and comfortable.

Song PLUS DM-i

Official comprehensive endurance: 1200km

Price: 149,800-202,800 yuan

Song PLUS DM-i is BYD’s first SUV equipped with DM-i, which was officially launched in March last year like Qin plus DM-I. In terms of appearance, the new car is only slightly modified than Song PLUS, equipped with a larger blackened air intake grille, and the "Song" logo has been moved to chrome trim. Compared with the current Song PLUS model, the body height of the Song PLUS DM-i is reduced by 10mm, and the rest are the same.

In terms of power, the Song PLUS DM-i is equipped with a 1.5L engine+drive motor. The maximum power of the engine is 81kW, and the drive motor has two kinds of power: the maximum power of the low-power version is 132kW, and the zero acceleration is 8.5s;; The high-power version has a maximum power of 145kW and an acceleration of 7.9s. The top four-wheel drive version is equipped with a 1.5T engine, with a maximum power of 102kW, two drive motors of 145kW and 120kW, and an acceleration of 5.9s at zero speed.

In terms of battery life, Song PLUS DM-i is equipped with two blade batteries with different capacities of 8.3kWh and 18.3kWh. The corresponding pure electric cruising range is 51km and 110km (four-wheel drive version is 100km), and the minimum fuel consumption is 4.4L/100km and 4.5L/100km respectively.

Applicable people: compact SUV, suitable for users with space needs, and a performance version is available.

Tang DM-i

Official comprehensive endurance: 1050km

Price: 192,800-219,800 yuan

The third DM-i model was Tang DM-i, which was officially launched during the Shanghai Auto Show last year. In terms of appearance, Tang DM-i kept the design idea of "『Dragon Face』". Compared with Qin and Song Hui, it is sharper and more atmospheric, and the roof design of the suspended roof is also in line with the aesthetics of current consumers.

In terms of power, Tang DM-i is equipped with a 1.5T engine+drive motor, the maximum power of the engine is 102kW, and the drive motor has two kinds of power: the maximum power of the low-power version is 145kW, and the zero acceleration is 8.7s;; The high-power version has a maximum power of 160kW and an acceleration of 8.5s.

In terms of battery life, Tang DM-i is equipped with blade batteries with different capacities of 9.98kWh and 21.5kWh, corresponding to the pure electric cruising range of 52km and 112km respectively, and the minimum fuel consumption is 5.3L/100km and 5.5L/100km respectively.

Suitable crowd: medium-sized SUV with seven large seats and higher configuration, which is also suitable for users with space needs.

Song Pro DM-i

Official comprehensive endurance: 1090km

Price: 135,800-160,800 yuan

Song Pro DM-i is the latest DM-i model, which was officially launched in late December last year. Appearance, Song Pro DM-i followed BYD’s family-style design language and adopted the design concept of "『Dragon Face』". The proportion of front grille increased from 60% to 75%, D-pillar "Long Lin" decoration was added, and a new color scheme of "Kirin Brown+Sky Grey" was added to the interior, which improved the overall look and feel.

In terms of power, Song Pro DM-i is equipped with a 1.5L engine+drive motor. The maximum power of the engine is 81kW, and the drive motor has two kinds of power: the maximum power of the low-power version is 132kW, and the zero acceleration is 8.5s;; The high-power version has a maximum power of 145kW and an acceleration of 7.9s.

In terms of battery life, Song Pro DM-i is equipped with two blade batteries with different capacities, 8.3kWh and 18.3kWh, corresponding to the pure electric cruising range of 51km and 110km respectively, and the minimum fuel consumption is 4.4L/100km and 4.5L/100km respectively.

Applicable people: the price is more close to the people than Song PLUS DM-i, and it is suitable for users who value cost performance and have space needs.

2. "Four New Stars" who are eager to try.

New Tang DM-i

Official comprehensive endurance: estimated 1200km

Pre-sale price: unpublished

In terms of appearance, the new Tang DM-i has been slightly adjusted. The mesh grille has been changed into a Long Lin-shaped decoration, and the logo of Xiao Zhuan "Tang" on the decorative strip has been branded to the center of the chrome-plated decorative strip. The overall design is still the well-known Dragon Face 3.0 design.

In terms of power, the new Tang DM-i will be equipped with a 1.5T engine and a drive motor, with the maximum power of 102kW for the engine and 160kW for the drive motor. In addition, the new car will also provide a four-wheel drive high-performance version, equipped with two drive motors of 160kW and 200kW, with a zero-acceleration of only 4.3s.

In terms of battery life, the new Tang DM-i will be equipped with a blade battery with a capacity of 45.8kWh, which corresponds to a pure electric cruising range of 252km and 215km, and the minimum fuel consumption is 5.6L/100km and 6.5L/100km, respectively. These two cars are likely to correspond to two-wheel drive models and four-wheel drive models. It is worth mentioning that the pure battery life of 252km is also the strongest existence of plug-in hybrid models in China.

Applicable people: Compared with the current Tang DM-i, it is also suitable for users with performance requirements.

Han DM-i

Official comprehensive endurance: estimated 1300km

Pre-sale price: unpublished

In terms of appearance, the front air intake design has changed slightly, and the taillights have been replaced with a new style. The length, width and height of Han DM-i are 4975/1910/1495mm and the wheelbase is 2920mm respectively. Compared with the current Han DM model, the body length is 15mm longer, and the rest are the same.

In terms of power, Han DM-i is equipped with a 1.5T engine+drive motor, and the maximum power of the engine is 102kW. The standard battery life is equipped with a driving motor with a maximum power of 145kW, the ultra-long battery life version is 160kW, and the four-wheel drive high-performance version is equipped with two driving motors of 160kW and 200kW respectively, with a zero-speed acceleration of 3.7s s.

In terms of battery life, Han DM-i will be equipped with blade batteries with different capacities of 18.3kWh and 37.6kWh, respectively, and the corresponding pure electric cruising range is 121km and 242km (performance version is 202km). Among them, the minimum fuel consumption of the model equipped with 18.3kWh battery is 4.2L/100km.

Applicable people: users who have high requirements for the rear space and prefer the driving sense of cars, and have performance versions to choose from.

Song MAX DM-i

Official comprehensive endurance: 1090km

Pre-sale price: 146,800-173,800 yuan

In terms of appearance, the Song MAX DM-i has hardly changed much compared with the Song MAX, and it still provides two different versions, 6-seat and 7-seat. However, it is worth mentioning that on two of the models, the new car is equipped with a "cabin roof" configuration, and the height of 1880mm allows children to walk freely in the car.

In terms of power, the Song MAX DM-i will be equipped with a 1.5L engine and a driving motor, with the maximum power of 81kW for the engine and 132kW for the driving motor, and the acceleration at zero speed is 7.9s.

In terms of battery life, the Song MAX DM-i will be equipped with two blade batteries with different capacities of 8.3kWh and 18.3kWh. The corresponding pure electric cruising range is 51km and 105km respectively, and the minimum fuel consumption is 4.4L/100km. Among them, the 105km version supports fast charging, and it takes only 30 minutes to charge the power from 30% to 80%.

Applicable crowd: large space, low floor, more friendly to users of family cars.

Destroyer 05 DM-i

Official comprehensive endurance: estimated at 1090km

Pre-sale price: or 120,000-160,000 yuan

This player is special, not belonging to the above-mentioned BYD Dynasty series, but belonging to BYD Ocean series, with a slightly higher positioning than Qin PLUS DM-I.. In terms of appearance, destroyer 05 adopted the design concept of "marine aesthetics". All the transverse trims on the front of the new car form a plane together with the brand-new LED headlights, which looks very unique.

In terms of power, destroyer 05 will adopt the same powertrain as Qin PLUS DM-i, equipped with a 1.5L engine and a drive motor. The maximum power of the engine is 81kW, and the drive motor has two kinds of power: the maximum power of the low-power version is 132kW, and the zero-speed acceleration is 7.9s;; The maximum power of the high-power version is 145kW, and the acceleration is 7.3s.

In terms of battery life, destroyer 05 will be equipped with two kinds of blade batteries with different capacities, corresponding to the pure electric cruising range of 55km and 120km respectively, and the minimum fuel consumption is 4.4L/100km. Among them, the 120km version supports 17kW fast charging, and it only takes 25 minutes to charge from 30% to 80%.

Applicable people: it has a higher positioning than Qin PLUS DN-i, and is suitable for users who are more exquisite.

BYD DM Dual Platform Strategy: Phased Achievements

On January 3, 2022, BYD announced the sales data for 2021: In 2021, 730,093 passenger cars were sold, among which 272,935 vehicles equipped with BYD DM hybrid system were sold. With the appearance of many models equipped with "BYD DM-i hybrid system", it is believed that the sales of BYD DM models will increase steadily.

The beginning of recycling: an overview of the technical route of BYD DM hybrid system

When we review the course of BYD’s DM hybrid system, we will find that BYD’s DM dual-platform strategy is a staged victory after nearly 20 years of technology accumulation:

image001.gif

Architectural changes of BYD DM hybrid system in past dynasties (moving picture)

Finally, I summarized the basic parameters and architecture of each generation of "DM hybrid system", and summarized the characteristics and historical significance of each generation:

Parameters & Architecture of the First Generation DM Hybrid System (for reference only)

The "first generation DM hybrid system" determined the hybrid architecture with the design concept of fuel economy, but it failed to open the market due to the factors of "engine", "three power" technology and manufacturing cost at that time. It should be said that the historical significance of the "first generation DM hybrid system" is greater than its market significance.

Parameters & Architecture of the Second Generation DM Hybrid System (for reference only)

The "second generation DM hybrid system" is an attempt by BYD to build a "high-performance hybrid system". Although there are obvious problems in energy consumption and feed capacity, it has raised the upper limit of the performance of this price hybrid model, which has strong industrial significance.

Parameters & Architecture of the Third Generation DM Hybrid System (for reference only)

With the continuous improvement of BYD’s technology in "Three Electricity", the practicability of "the third generation DM hybrid system" has been greatly improved, especially the hybrid solution with high-power "BSG motor", which has surprised many colleagues.

Parameters & Architecture of BYD DM-p Hybrid System (for reference only)

The BYD DM-p hybrid system is a milestone of BYD’s phased solidification of the "three motors+powershift" hybrid scheme. Under the two technical guarantees of "high power motor+large capacity battery", the vehicles equipped with BYD DM-p hybrid system have made another qualitative leap in NVH, power switching smoothness and energy consumption.

Byd DM-i hybrid system parameters & architecture (for reference only)

Of course, "BYD DM-i hybrid system" is the trump card of BYD in the field of hybrid technology at present, and its economy and practicality are self-evident. As summarized before, the most valuable point of BYD DM-i hybrid system is that BYD has the ability to develop and manufacture key components such as battery, electronic control and electronic control chip.

Parameter list of BYD DM hybrid system in past dynasties (for reference only)

If you want to ask me: "Is the current BYD DM hybrid system good? My answer is: After nearly 20 years of development, BYD DM Hybrid System has developed into a school of its own in terms of technology and production, and it is quite mature. As for whether to recommend people to buy it, I still have those two sentences:

So, we have got a car equipped with BYD DM-i hybrid system. As for which car, please look forward to it ~ ~ Keke ~ ~

Hongqi Guoli, a large car with the highest cost performance, is on fire.

Today’s automobile market is full of flowers, and there are so many choices that consumers don’t have to be confined to a certain level when buying a car. Today, Xiaobian picked a car in a large car and introduced it to everyone. It is. Let’s get to know each other.

First of all, from the appearance, the front face of the Red Flag National Gift looks very fashionable and generous, equipped with a straight waterfall air intake grille, which makes people unforgettable. At the same time, the front headlights present a dynamic and lively design style, which is a bit more full. The car is equipped with LED daytime running lights, front fog lights, automatic opening and closing, adaptive far and near light, automatic steering, delayed closing and so on. Coming to the side of the car, the size of the car body is 5980MM*2090MM*1710MM. The car adopts round and lovely lines, and the car body looks very delicate. With large-sized thick-walled tires, the shape is eye-catching. In the rear part, the rear of the car echoes the front face from a distance, and the taillights are very sporty. Coupled with the unique exhaust pipe, the shape is relatively cold.

In terms of interior, the front face of Hongqi Guoli looks very avant-garde and very simple and generous. Made of leather and wood, it feels good. From the central control point of view, the design of the center console is reasonable, which makes the interior style impressive and has a certain sense of science and technology. The dashboard and seats give people a good feeling, too. Let’s take a look. The dashboard of this car presents a cold design style and looks very tough. The car uses leather seats, equipped with auxiliary seat with memory electric adjustment, seat with memory electric adjustment and other functions, and the comfort is acceptable.

Hongqi Guoli matches the automatic manual transmission (AT) gearbox, with an acceleration time of 7.9s per 100 kilometers, which has good power performance and is completely OK for daily use.

The space in the back row of the Red Flag National Gift is still spacious, and there is a certain margin in the head and legs, which can be said to be more than enough for daily use. In addition, the car is equipped with night vision system, fatigue reminder, anti-lock braking system (ABS), LED daytime running lights, brake assist (EBA/BAS, etc.) main driving airbag, rear window sunshade, co-pilot airbag, knee airbag and side airbag curtain.

This car performs well in terms of space and configuration. As for the design, everyone has everyone’s aesthetics. If you have plans to buy a car, Xiao Bian thinks it can be included in the alternative list.

Deep blue SL03: The price starts from 124,900 yuan, leading the new trend of pure electric vehicles.

I. Overview

Deep Blue SL03, as a new pure electric vehicle released by Chang ‘an Deep Blue, has quickly stood out in the pure electric vehicle market with its innovative technology, rich configuration and reasonable price since its listing on August 25th, 2023, leading a new round of trend.

Second, the price and configuration

The price range of Deep Blue SL03 is 124,900 yuan, and the maximum price is 217,900 yuan. This price positioning fully considers the market acceptance, and also shows Changan Deep Blue’s profound understanding of cost control and market competition. In terms of configuration, Deep Blue SL03 is even more generous, and has launched a variety of configuration versions to meet the needs of different consumers.

Third, the technical characteristics

The technical characteristics of deep blue SL03 are mainly reflected in its all-electric properties, high efficiency and high performance. This is due to its two core technologies: the super-collector drive of the Force and the intelligent range extension of the Force. As the latest achievement of the new height of electric drive efficiency in Changan Automobile’s pioneering industry, the Force Super Collector Drive is highly integrated with seven core components such as motor, motor controller and reducer. Compared with the traditional "three-in-one" electric drive system, it has lower weight, smaller volume and higher efficiency, up to 95%. At the same time, the electric drive also adopts the industry’s first micronucleus high-frequency pulse heating technology, which solves the problem that trams are difficult to use in winter.

IV. Appearance and Interior

Deep blue SL03 also has bright spots in appearance and interior design. Its design is fashionable and elegant, with smooth lines and a sense of science and technology. As for the interior, Deep Blue SL03 adopts high-quality materials and fine craftsmanship, creating a comfortable and luxurious atmosphere. At the same time, Deep Blue SL03 is also equipped with leading technologies such as the first intelligent vehicle domain controller "Changan Smart Core" and iBC digital battery housekeeper system in China, which brings users a smarter and more convenient car experience.

V. Market impact

The listing of Deep Blue SL03 not only provides consumers with a better and more affordable choice of pure electric vehicles, but also further promotes the development of the pure electric vehicle market. With its innovative technology and rich configuration, Deep Blue SL03 has strong competitiveness in the market and won wide recognition from consumers.

To sum up, Deep Blue SL03 has successfully led the new trend of pure electric vehicles with its reasonable price, rich configuration, advanced technology and fashionable design. In the future, with the continuous progress of technology and the continuous expansion of the market, Deep Blue SL03 is expected to continue to glow in the pure electric vehicle market, bringing more high-quality travel choices to consumers.

Changan Auchan X5 PLUS in Suzhou is on sale! The latest offer is 71,900, so don’t miss it.

[car home Suzhou Preferential Promotion Channel] is carrying out preferential promotion activities. Consumers in Suzhou can enjoy a maximum discount of 20,000 yuan, and the minimum starting price has dropped to 71,900 yuan. If you are interested in this car, please click "Check the car price" in the quotation form to get a higher discount.

苏州地区长安欧尚X5

Changan Auchan X5 PLUS adopts a dynamic front face design with a wide air intake grille, which shows the sense of output and fashion. The overall style presents the characteristics of youthfulness and sportiness, and the body lines are smooth and full of vitality. Sharp headlights and daytime running lights are used in the front part, which further enhances the visual impact of the vehicle.

苏州地区长安欧尚X5

Changan Auchan X5 PLUS has a body size of 4540*1860*1620mm and a wheelbase of 2715mm. It has smooth side lines and creates a dynamic visual effect. The front and rear wheel tracks are 1580mm and 1570mm respectively. With 225/55 R18 tires, the fashionable rim design is adopted to enhance the sense of movement of the whole vehicle.

苏州地区长安欧尚X5

The interior style of Changan Auchan X5 PLUS is simple without losing the sense of science and technology. The center console adopts a 10.25-inch central control screen, which provides rich entertainment and navigation functions and brings convenient operation experience to drivers. The leather steering wheel feels comfortable and supports manual adjustment up and down and back and forth to meet the individual needs of different drivers. The seat is made of fabric. The main driver’s seat has the functions of front and rear, backrest and height adjustment, while the co-pilot’s seat has the functions of front and rear and backrest adjustment. At the same time, the rear seat supports proportional tilting, which provides the possibility for flexible use of the interior space. In addition, the car is equipped with a USB interface and a Type-C interface, which is convenient for passengers to charge electronic equipment.

苏州地区长安欧尚X5

Changan Auchan X5 PLUS is equipped with a 1.5T turbocharged engine with a maximum power of 138kW(188 HP) and a peak torque of 300N·m, which is full of power. Matching it is a 7-speed wet dual-clutch gearbox, which ensures efficient power transmission and smooth driving experience.

The owner of car home said: "Look at the car, look at the brand, look at the configuration. When I saw Auchan X5PLUS, its fashionable sports and youthful style attracted me. The 100,000-class SUV is not only beautiful in appearance design, but also relatively complete in configuration. The 540 panoramic image has a built-in 360 driving recorder, the design of triple screen, high-tech navigation, voice control system and active braking system, which is more convenient for me as a novice. "