Electrothermal Circuit Design With Heat Flow Control—Synchronous Buck Converter Case Study

Author(s):  
Ercan M. Dede ◽  
Chi-Ming Wang ◽  
Yanghe Liu ◽  
Paul Schmalenberg ◽  
Feng Zhou ◽  
...  
Author(s):  
Hung-Sung Lin ◽  
Ying-Chin Hou ◽  
Juimei Fu ◽  
Mong-Sheng Wu ◽  
Vincent Huang ◽  
...  

Abstract The difficulties in identifying the precise defect location and real leakage path is increasing as the integrated circuit design and process have become more and more complicated in nano scale technology node. Most of the defects causing chip leakage are detectable with only one of the FA (Failure Analysis) tools such as LCD (Liquid Crystal Detection) or PEM (Photon Emission Microscope). However, due to marginality of process-design interaction some defects are often not detectable with only one FA tool [1][2]. This paper present an example of an abnormal power consumption process-design interaction related defect which could only be detected with more advanced FA tools.


Energies ◽  
2021 ◽  
Vol 14 (12) ◽  
pp. 3385
Author(s):  
Erickson Puchta ◽  
Priscilla Bassetto ◽  
Lucas Biuk ◽  
Marco Itaborahy Filho ◽  
Attilio Converti ◽  
...  

This work deals with metaheuristic optimization algorithms to derive the best parameters for the Gaussian Adaptive PID controller. This controller represents a multimodal problem, where several distinct solutions can achieve similar best performances, and metaheuristics optimization algorithms can behave differently during the optimization process. Finding the correct proportionality between the parameters is an arduous task that often does not have an algebraic solution. The Gaussian functions of each control action have three parameters, resulting in a total of nine parameters to be defined. In this work, we investigate three bio-inspired optimization methods dealing with this problem: Particle Swarm Optimization (PSO), the Artificial Bee Colony (ABC) algorithm, and the Whale Optimization Algorithm (WOA). The computational results considering the Buck converter with a resistive and a nonlinear load as a case study demonstrated that the methods were capable of solving the task. The results are presented and compared, and PSO achieved the best results.


Resources ◽  
2021 ◽  
Vol 10 (4) ◽  
pp. 31
Author(s):  
Stanislav Jacko ◽  
Roman Farkašovský ◽  
Igor Ďuriška ◽  
Barbora Ščerbáková ◽  
Kristína Bátorová

The Pannonian basin is a major geothermal heat system in Central Europe. Its peripheral basin, the East Slovakian basin, is an example of a geothermal structure with a linear, directed heat flow ranging from 90 to 100 mW/m2 from west to east. However, the use of the geothermal source is limited by several critical tectono-geologic factors: (a) Tectonics, and the associated disintegration of the aquifer block by multiple deformations during the pre-Paleogene, mainly Miocene, period. The main discontinuities of NW-SE and N-S direction negatively affect the permeability of the aquifer environment. For utilization, minor NE-SW dilatation open fractures are important, which have been developed by sinistral transtension on N–S faults and accelerated normal movements to the southeast. (b) Hydrogeologically, the geothermal structure is accommodated by three water types, namely, Na-HCO3 with 10.9 g·L−1 mineralization (in the north), the Ca-Mg-HCO3 with 0.5–4.5 g·L−1 mineralization (in the west), and Na-Cl water type containing 26.8–33.4 g·L−1 mineralization (in the southwest). The chemical composition of the water is influenced by the Middle Triassic dolomite aquifer, as well as by infiltration of saline solutions and meteoric waters along with open fractures/faults. (c) Geothermally anomalous heat flow of 123–129 °C with 170 L/s total flow near the Slanské vchy volcanic chain seems to be the perspective for heat production.


2013 ◽  
Author(s):  
Aimen Amer ◽  
Rolando di Primio ◽  
Robert Ondrak ◽  
Vikram Unnithan

2021 ◽  
Author(s):  
Michael Hardcastle ◽  
Ryan Holmes ◽  
Frank Abbott ◽  
Jesse Stevenson ◽  
Aubrey Tuttle

Abstract Connacher Oil and Gas has deployed Flow Control Devices (FCDs)on an infill well liner as part of a Steam Assisted Gravity Drainage (SAGD) exploitation strategy. Infill wells are horizontal wells drilled in between offsetting SAGD well pairs in order to access bypassed pay and accelerate recovery. These wells can have huge variability in productivity, based on several factors: variable initial temperature due to variable steam chamber development and initial mobility variable injectivity from day one limiting steam circulation and stimulation significant hot spots during production that limit drawdown of the well and oil productivity FCDs have shown great value in several SAGD schemes and are becoming common throughout SAGD applications to manage similar challenges in SAGD pairs, but their application in infill wells is less prevalent and presents a novel challenge to design and evaluate performance. This case study will examine the theory, operation, and early field results of this field trial. Density-based FCDs designed for thermal operations were selected to minimize the impact of viscous fluids commonly encountered early in cold infill well production. The design also limited steam outflow during the stimulation phase, where steam is injected in order to initiate production of the well. Distributed Temperature Sensing (DTS) data, pressures and rates are utilized to analyze the impact of the FCDs towards conformance of the well in the early life. The value of FCDs has led to further piloting of this technology in a second group of nine infill wells, where further value is to be extracted using slimmer wellbores.


2020 ◽  
Vol 116 (19) ◽  
pp. 191902
Author(s):  
Ercan M. Dede ◽  
Ziqi Yu ◽  
Paul Schmalenberg ◽  
Hideo Iizuka

Author(s):  
Saadia Kedjar ◽  
Abdelkamel Tari ◽  
Peter Bertok

With the advancement of web services technology, security has become an increasingly important issue. Various security standards have been developed to secure web services at the transport and message level, but application level has received less attention. The security solutions at the application level focus on access control which cannot alone ensure the confidentiality and integrity of information. The solution proposed in this paper consists on a hybrid model that combines access control (AC) and information flow control (IFC). The AC mechanism uses the concept of roles and attributes to control user access to web services' methods. The IFC mechanism uses labels to control how the roles access to the system's objects and verify the information flows between them to ensure the information confidentiality and integrity. This manuscript describes the model, gives the demonstration of the IFC model safety, presents the modeling and implementation of the model and a case study.


Sign in / Sign up

Export Citation Format

Share Document