共查询到20条相似文献,搜索用时 171 毫秒
1.
为了满足红外气体检测对高性能激光器驱动电源的要求,文中采用PID控制算法,设计并研制了一款高稳定的DFB激光器驱动电源。其硬件主要包括信号产生模块、压控恒流源模块、电路保护模块,具备输出电流保护功能。信号产生模块主要通过DDS产生正弦波,再通过比较器产生方波,同时采用DA转换技术实现直流波、三角波、锯齿波的输出。控制方案上采用PID算法,通过深度负反馈控制,实现高稳定电流输出。利用此驱动电源对中心波长为1 563.09 nm的DFB激光器进行驱动实验。结果表明,所研制的驱动电源具有输出波形类型、幅度和频率三者数控可调的功能,电流幅度范围为0~1 A;正弦、方波频率范围为1 Hz~1 MHz,三角、锯齿、直流波频率范围为1 Hz~100 Hz,频率分辨率为1 Hz;输出电流线性度为99.93%,长时间输出电流稳定度为0.019 7%。 相似文献
2.
设计了一种用于降压型DC-DC开关电源转换器的锯齿波振荡器。利用电压前馈方法和固定充放电时间方法,实现了锯齿波幅度随电源电压线性变化且频率固定的锯齿波振荡器,抑制了电源电压突变时的输出电压过冲。基于0.18 μm BCD工艺进行设计和仿真。仿真结果表明,该锯齿波振荡器产生的锯齿波频率为2.73 MHz。在2.7~5.5 V电源电压、-55 ℃~125 ℃温度范围内,频率偏移在±6%以内。振荡幅度在0.576~1.470 V范围内随电源电压线性变化。 相似文献
3.
4.
5.
在这种D类音频放大器中,三角波用来调节开关频率,并产生一个脉宽调制(PWM)信号来控制高频全桥驱动器(HIP4080A)的栅极输出,以驱动一对半桥(HIP2060)FET(参见附图)。目标是要引出一种位于V-和地电源总线之间中心点上的高度线性的三角波。这可通过使用一种定时器电路(ICM755)来实现。ICM7555在最高达1.0MHz的可变频率范围上产生一个12Vp-p方波,然后通过集成电路变换成三角波输出。该电路由运算放大器(HA5221)和电阻器电容器网络组成。该发生器产生高频线性三角波,用… 相似文献
6.
压电陶瓷驱动器三角波频率特性 总被引:1,自引:0,他引:1
给出了三角波驱动信号下d31悬臂梁式驱动器的工作特性和频率特性。由于三角波包含了许多频率为基频奇数倍的谐波分量,当某一信号的谐波频率接近驱动器的共振频率时,该频率的三角波就会引起驱动器的谐振。因此,可以通过采用对扫描反馈电压的波形进行快速傅里叶分析法(FFT)来获得压电陶瓷驱动器的共振频率,而且,可以获得避开驱动器谐振点的驱动器设计原则,即:fr<0.6fk。此外,本试验压电陶瓷驱动器输出波形的延迟和非线性度与其驱动三角波频率的关系为:随频率增加,延迟不断增大;频率较低时,非线性度很大,而且随频率增大而增大,当频率在80~120Hz时,非线性度出现极大值,此后,非线性度随频率增大而减小。 相似文献
7.
8.
将集成式D类全桥电路引入超声电源中,采用IR2110芯片驱动MOSFET构成全桥式逆变主电路,实现逆变降压和输出电压控制。驱动电路以脉宽调制电路为核心,运用555芯片产生三角波信号,并将产生的三角波信号转化为不同偏置的两路三角波信号;然后分别与相应端口输入的正弦波信号进行比较调制,得到两路PWM波,提高了电路的动态响应并实现频率的可调性。 相似文献
9.
10.
线性频率调制连续波(LFMCW)雷达具备测距精度高、无盲区等优点,有着广泛的应用。分析了典型的锯齿波和三角波LFMCW雷达的基本工作原理,并以锯齿波为例,分析了各种干扰源的情况。 相似文献
11.
The relation between the power of the Brillouin signal and the strain is one of the bases of the distributed fiber sensors of temperature and strain. The coefficient of the Bfillouin gain can be changed by the temperature and the strain that will affect the power of the Brillouin scattering. The relation between the change of the Brillouin gain coefficient and the strain is thought to be linear by many researchers. However, it is not always linear based on the theoretical analysis and numerical simulation. Therefore, errors will be caused if the relation between the change of the Brillouin gain coefficient and the strain is regarded as to be linear approximately for measuring the temperature and the strain. For this reason, the influence of the parameters on the Brillouin gain coefficient is proposed through theoretical analysis and numerical simulation. 相似文献
12.
Three alternative schemes for secure Virtual Private Network (VPN) deployment over the Universal Mobile Telecommunication
System (UMTS) are proposed and analyzed. The proposed schemes enable a mobile node to voluntarily establish an IPsec-based
secure channel to a private network. The alternative schemes differ in the location where the IPsec functionality is placed
within the UMTS network architecture (mobile node, access network, and UMTS network border), depending on the employed security
model, and whether data in transit are ever in clear-text, or available to be tapped by outsiders. The provided levels of
privacy in the deployed VPN schemes, as well as the employed authentication models are examined. An analysis in terms of cost,
complexity, and performance overhead that each method imposes to the underlying network architecture, as well as to the mobile
devices is presented. The level of system reliability and scalability in granting security services is presented. The VPN
management, usability, and trusted relations, as well as their behavior when a mobile user moves are analyzed. The use of
special applications that require access to encapsulated data traffic is explored. Finally, an overall comparison of the proposed
schemes from the security and operation point of view summarizes their relative performance.
Christos Xenakis received his B.Sc. degree in computer science in 1993 and his M.Sc. degree in telecommunication and computer networks in
1996, both from the Department of Informatics and Telecommunications, University of Athens, Greece. In 2004 he received his
Ph.D. from the University of Athens (Department of Informatics and Telecommunications). From 1998–2000 was with the Greek
telecoms system development firm Teletel S.A., where was involved in the design and development of advanced telecommunications
subsystems for ISDN, ATM, GSM, and GPRS. Since 1996 he has been a member of the Communication Networks Laboratory of the University
of Athens. He has participated in numerous projects realized in the context of EU Programs (ACTS, ESPRIT, IST). His research
interests are in the field of mobile/wireless networks, security and distributed network management. He is the author of over
15 papers in the above areas.
Lazaros Merakos received the Diploma in electrical and mechanical engineering from the National Technical University of Athens, Greece, in
1978, and the M.S. and Ph.D. degrees in electrical engineering from the State University of New York, Buffalo, in 1981 and
1984, respectively. From 1983 to 1986, he was on the faculty of Electrical Engineering and Computer Science at the University
of Connecticut, Storrs. From 1986 to 1994 he was on the faculty of the Electrical and Computer Engineering Department at Northeastern
University, Boston, MA. During the period 1993–1994 he served as Director of the Communications and Digital Processing Research
Center at Northeastern University. During the summers of 1990 and 1991, he was a Visiting Scientist at the IBM T. J. Watson
Research Center, Yorktown Heights, NY. In 1994, he joined the faculty of the University of Athens, Athens, Greece, where he
is presently a Professor in the Department of Informatics and Telecommunications, and Director of the Communication Networks
Laboratory (UoA-CNL) and the Networks Operations and Management Center. His research interests are in the design and performance
analysis of broadband networks, and wireless/mobile communication systems and services. He has authored more than 150 papers
in the above areas. Since 1995, he is leading the research activities of UoA-CNL in the area of mobile communications, in
the framework of the Advanced Communication Technologies & Services (ACTS) and Information Society Technologies (IST) programmes
funded by the European Union (projects RAINBOW, Magic WAND, WINE, MOBIVAS, POLOS, ANWIRE). He is chairman of the board of
the Greek Universities Network, the Greek Schools Network, and member of the board of the Greek Research Network. In 1994,
he received the Guanella Award for the Best Paper presented at the International Zurich Seminar on Mobile Communications. 相似文献
13.
14.
文中针对单相无刷直流电机结构设计及驱动方式展开研究,推导出电机理想工况下的基本方程,根据工程实际需求并结合无刷直流电机的设计原则确定该电机的设计方案。利用设计方案设计一台额定功率38 W,额定转速750 rpm的单相无刷直流电机,并分析了渐变气隙对电机起动性能和齿槽转矩的影响,确定了最优气隙长度。通过对比单极性绕组和双极性绕组形式的优缺点确定绕组形式,结合传统电机设计公式确定绕组匝数。文中利用有限元法初步验证了设计方案的合理性。根据电机动态数学模型在Simulink环境中搭建了电机系统的模型,仿真得到电机的转速、转矩变化曲线,结果与理论分析吻合良好,验证了电机设计方案的合理性和电机模型的有效性。 相似文献
15.
针对RFID树型防碰撞算法中时隙数多、数据通行量大等问题,提出了一种改进的多叉树防碰撞算法,阅读器准确检测碰撞位并向标签反馈碰撞位信息,标签对阅读器已知的ID位进行屏蔽,把ID号转换成连续碰撞的序列号.阅读器利用屏蔽位信息和标签返回的碰撞位编码信息,对标签进行分层分类搜索.通过对标签ID进行屏蔽,阅读器和标签间仅发送对方不知道的碰撞位信息.该算法减少了碰撞时隙和识别时隙,避免了空闲时隙,减少了阅读器和标签间的数据通信量.理论分析和仿真结果表明,该算法减少了系统的时隙总数和数据通信量,提高了阅读器的识别效率. 相似文献
16.
17.
The anisotropic growth of one-dimensional or filamental crystals in the form of microwires and nanowires constitutes a rich domain of epitaxy and newly enabled applications at different length and size scales. Significant progress has been accomplished in controlling the growth, morphology, and properties of semiconductor nanowires and consequently their device level performance. The objective of this review is two-fold: to highlight progress up to date in nanowire doping and to discuss the remaining fundamental challenges. We focus on the most common semiconductor nanowire growth mechanism, the vapor-liquid-solid growth, and the perturbation of its kinetic and thermodynamic aspects with the introduction of dopants. We survey the origins of dopant gradients in nanowire growth and summarize quantification techniques for dopants and free-carrier concentrations. We analyze the morphological changes due to dopants and the influence of growth droplet seeds on composition and morphology and review growth aspects and alternatives that can mitigate these effects. We then summarize some of the remaining issues pertaining to dopant control in nanowires. 相似文献
18.
19.
20.
This paper presents a unified treatment of various important signal processing techniques for the extraction of the instantaneous envelope and phase of a real signal. These techniques include Complex Demodulation, Hilbert Transformation, In-Phase and In-Quadrature Filtering, Phase-Locked Loop Demodulation, and Peak Amplitude and Zero-Crossing Detection. The salient points in the mathematical theory and implementation of these techniques are outlined, as well as their interrelationships via the theory of analytic signals. The advantages and limitations of each of these techniques are elaborated upon, and Complex Demodulation is shown to be the most effective and flexible method from an implementation point of view. The relation of the above techniques to Fourier spectrum analysis is elucidated, and an example is presented of applying Complex Demodulation for the quantification of time nonstationarities in the electrographic morphology of an EEG waveform. 相似文献