power conservation
Recently Published Documents


TOTAL DOCUMENTS

147
(FIVE YEARS 25)

H-INDEX

12
(FIVE YEARS 1)

Electronics ◽  
2021 ◽  
Vol 10 (24) ◽  
pp. 3120
Author(s):  
Janusz Wozny ◽  
Zbigniew Lisik ◽  
Jacek Podgorski

The purpose of the study is to present a proper approach that ensures the energy conservation principle during electrothermal simulations of bipolar devices. The simulations are done using Sentaurus TCAD software from Synopsys. We focus on the drift-diffusion model that is still widely used for power device simulations. We show that without a properly designed contact(metal)–semiconductor interface, the energy conservation is not obeyed when bipolar devices are considered. This should not be accepted for power semiconductor structures, where thermal design issues are the most important. The correct model of the interface is achieved by proper doping and mesh of the contact-semiconductor region or by applying a dedicated model. The discussion is illustrated by simulation results obtained for the GaN p–n structure; additionally, Si and SiC structures are also presented. The results are also supported by a theoretical analysis of interface physics.


2021 ◽  
Vol 11 (20) ◽  
pp. 9711
Author(s):  
Timofey Shevgunov ◽  
Oksana Guschina ◽  
Yury Kuznetsov

This paper proposes a cyclostationary based approach to power analysis carried out for electric circuits under arbitrary periodic excitation. Instantaneous power is considered to be a particular case of the two-dimensional cross correlation function (CCF) of the voltage across, and current through, an element in the electric circuit. The cyclostationary notation is used for deriving the frequency domain counterpart of CCF—voltage–current cross spectrum correlation function (CSCF). Not only does the latter exhibit the complete representation of voltage–current interaction in the element, but it can be systematically exploited for evaluating all commonly used power measures, including instantaneous power, in the form of Fourier series expansion. Simulation examples, which are given for the parallel resonant circuit excited by the periodic currents expressed as a finite sum of sinusoids and periodic train of pulses with distorted edges, numerically illustrate the components of voltage–current CSCF and the characteristics derived from it. In addition, the generalization of Tellegen’s theorem, suggested in the paper, leads to the immediate formulation of the power conservation law for each CSCF component separately.


2021 ◽  
Vol 36 (7) ◽  
pp. 830-837
Author(s):  
Qiang Feng ◽  
Yifeng Lin ◽  
Yushan Zheng ◽  
Long Li

In this paper, an improved array factor of the concentric uniform circular array (CUCA) antenna is proposed for the orbital angular momentum (OAM) vortex beam optimization design. From the perspective of the radiation pattern’s power conservation principle, a correction factor is introduced to the conventional array factor of CUCA. Then, based on the improved array factor, by adjusting the rings’ radii parameters of the CUCA, we optimize the vortex beam’s sidelobe level through the generic algorithm (GA). Two different CUCA antenna model are calculated as examples to further illustrate the effectiveness of the improved array factor. Subsequently, an electromagnetic simulation model of two rings CUCA antenna is built at C band for generating low sidelobe vortex beam carrying OAM mode. The electromagnetic simulation model of the designed CUCA antenna is also fabricated and measured. The corresponding antenna far-field vortex beam radiation pattern and near-field vortex wave electric field distributions are measured. The simulation results and the measurement results are in good agreement. The proposed designs of antenna and OAM vortex beam regulation are expected to be used for 5G and 6G communications applications


2021 ◽  
Author(s):  
Michael Richardson ◽  
Adam Fish

A convergence of four genealogies reveals drone power. Environmentality describes the contradictory uses of drones in conservation. Humanitarianism articulates how control is enacted and challenged in human crises. Securitization examines drones in surveillance and counter-surveillance. Militarization, the use of drones in war, explains domination from above and resistance from below. While theories of governmentality dominate, an emergent materialism within drone studies emphasizes the diffusion of power and agency. A synthesis of drone governmentality and drone materialism exposes four flightways or elemental trajectories. The drone is an existential technology – a tool for enlivenment and senescence. As such, drone power migrates between biopolitics and resistance. In doing so, drone performativity generates assemblages of human and nonhuman actants entangled at material-discursive and onto-epistemological levels. Entrapment designates the consequences of increasing dependency on technologies in sociotechnical systems of life and death.


CONVERTER ◽  
2021 ◽  
pp. 689-696
Author(s):  
Yulu Cai Et al.

Aiming at the problems of the confusion of user meter data in the distribution network and the difficulty in identifying the relationship, a creative method of identifying the topological structure of the station based on the conservation of current and energy is proposed. Through the calculation of the current data relationship, a mathematical relationship model based on energy conservation is established for the topological scene of the station. After constructing the mathematical model, through a series of transformation methods, the model is transformed into a convex optimization problem. By solving the model, the topological relationship of the station is finally obtained. Through the experimental verification and analysis of real data, the model algorithm proposed in this paper has higher accuracy and higher efficiency than manual screening, and has deeper research value.


2021 ◽  
pp. 026327642110228
Author(s):  
Adam Fish ◽  
Michael Richardson

A convergence of four genealogies reveals drone power. Environmentality describes the contradictory uses of drones in conservation. Humanitarianism articulates how control is enacted and challenged in human crises. Securitization examines drones in surveillance and counter-surveillance. Militarization, the use of drones in war, explains domination from above and resistance from below. While theories of governmentality dominate, an emergent materialism within drone studies emphasizes the diffusion of power and agency. A synthesis of drone governmentality and drone materialism exposes four flightways or elemental trajectories. The drone is an existential technology – a tool for enlivenment and senescence. As such, drone power migrates between biopolitics and resistance. In doing so, drone performativity generates assemblages of human and nonhuman actants entangled at material-discursive and onto-epistemological levels. Entrapment designates the consequences of increasing dependency on technologies in sociotechnical systems of life and death.


Author(s):  
Ms Mani ◽  
Lovepreet Kaur

WSN is a distributed network that consists of great amount of sensor nodes and has the capacity of sensing, processing and transmits the partially processed and required data only. Sensor nodes have a tiny size, low cost but along with it the constraints of sensor node is they have limited memory, power source which is irreplaceable so power conservation should primarily focused by sensor network protocols. The proposed model was deals with environmental application where detection of forest fire is analyzed by taking parameters such as temperature, humidity, wind speed and time using fuzzy logic as by detecting earlier of fire in forest it helps to prevent huge loss of living organism, infrastructure and property. After detection the proposed MSA (Modified Sleep Awake) model work in prolonging lifetime of WSN in forest fire application using selective sleep awake approach. Cloud computing help to overcome the limitation of WSN such as limited storage, processing, power life processing. The resource allocation problem is the major problem for a group of cloud user requests. The scheduling algorithms are termed as NP completeness problems in which FIFO scheduling is used by the master node to distribute resources to the waiting tasks. The problem like fragmentation of resources, low utilization of the resources such as CPU utilization, network throughput, disk I/O rate. In this paper different papers are reviewed and further it is implemented in research paper.


Sign in / Sign up

Export Citation Format

Share Document