共查询到20条相似文献,搜索用时 31 毫秒
1.
This study presents a means to probe the electric-field distribution in a microstrip resonator using the existing power/ground pins. The strength of the electric-field could be correlated with the reflection coefficient. Physical mechanism for the position-depended reflection effect is interpreted from the perspective of probe coupling. An application of this method is demonstrated through three phases: determining the maximum field of a microstrip resonator, shaping the geometry at the field bulk, and detuning the resonant frequency of a power distribution network. The results reveal that this approach can be employed to achieve a resonance-free operating environment. 相似文献
2.
针对离散系统的分析和设计中所涉及到的等阻尼比问题,本文探讨了Z平面上的等阻尼比线,给出了Matlab仿真图形,介绍了等阻尼比线在离散系统的分析和设计中的应用。 相似文献
3.
4.
5.
文中首先介绍了配电网的发展概况,阐述了我国配电网发展面临的挑战和配电自动化技术,剖析了配电技术应用中存在的问题和解决办法。 相似文献
6.
电压互感器、电流互感器和三相功率表结合使用,扩大了功率表的量限,并提出了公共变比的概念,解决了互感器变比不一致时三相功率的正确计量。 相似文献
7.
8.
MIC2536是MICREL公司生产的一种性能价格比很高的双路USB功率分配开关。它具有两个独立的控制通道。可广泛应用于带有UAB板的总线电源集线器、USB总线电源对接系统、笔记本型PC机和个人数字助理(PDAs)、通用型电源适配器、PC板的热插拔以及浪涌电流的限制等应用场合。文中介绍了MIC2536的主要特色、引脚功能和工作原理,给出了由它组成的一个二端口总线电源集线器的应用电路。 相似文献
9.
《Microwave Theory and Techniques》1969,17(10):778-785
This paper describes a mathematical analysis for determining the microwave current distribution in a barretter in a rectangular waveguide. This distribution, when used with another analysis which calculates substitution error for any given current distribution, provides a missing step necessary for the calibration of microwave and millimeter-wave barretters for absolute power measurements. 相似文献
10.
11.
The challenging tolerance problem in fault diagnosis of analog circuit remains unsolved. To diagnose the soft-fault with tolerance effectively, a novel diagnosis approach based on the ratio of normal variables and the slope fault model was proposed. Firstly, the approximate distribution function of the ratio of normal variables was deduced and the basic approximate conditions were given to improve the approximation accuracy. The conditional monotonous and continuous mapping between the ratio of normal variables and the standard normal variable was proved. Based on the aforementioned proved mapping, the estimation formulas of the range of the ratio of normal variables were deduced. Then, the principle of the slope fault model for linear analog circuit was presented. After the contrastive analysis of the typical methods of handling tolerance based on the slope fault model, the ratio of normal variables and the slope fault model were combined and a test-nodes selection algorithm based on the basic approximate conditions of ratio of normal variables was designed, by which the computation can be reduced greatly. Finally, experiments were done to illustrate the proposed approach and demonstrate its effectiveness. 相似文献
12.
简述了密钥分配成功率理论,分析了影响无线网络环境下的密钥分配成功率的不利因素,并有针对性地提出提高密钥分配成功率的有效措施。.通过仿真结果表明,该措施能够提高无线网络环境下的密钥分配成功率。 相似文献
13.
量子加密算法及其安全性 总被引:1,自引:1,他引:1
信息加密被认为是现代通信最重要的技术之一。量子计算机的出现将使已有的加密算法(如RSA算法)的安全性受到严重的挑战。讨论依赖于量子力学原理的量子加密算法,并证明它们的安全性。同时给出加密算法在概率克隆存在情况下安全性的讨论。 相似文献
14.
讨论了4种用于描述加速寿命试验中失效分布参数和环境条件之间关系的失效物理模型。针对阿伦尼斯模型,探讨了加速寿命试验中的参数估计方法,构建了参数的极大似然估计(MLE)方程组,解得加速寿命试验中失效分布参数的MLE值,进而通过转化,借助于标准正态分布表获得其寿命指标的近似值,并通过一个实例介绍了其具体应用。 相似文献
15.
16.
为增强分布估计算法(EDA)的局部优化能力,将细菌的觅食(BF)行为,即细菌的趋化性运动引入到分布估计算法中,提出一种基于细菌觅食行为的分布估计算法BF-EDA。通过8个Benchmark函数来测试算法性能,并与常规EDA、粒子群优化(PSO)和HPSO-TVAC算法进行实验比较,结果表明BF-EDA算法在优化解的质量和收敛速度方面具有较好的性能。进一步,为克服传统的基于梯度信息优化方法的缺点,将BF-EDA应用于预测控制的非线性滚动优化阶段,以优化求解被控系统的最优控制序列。曲线跟踪实验结果表明,基于BF-EDA的预测控制算法具有良好的控制品质。 相似文献
17.
18.
孙前来 《电气电子教学学报》2008,30(6):58-60
为了适应自动化及相关专业实践教学的需要,我们实现了KSD-1型小功率直流位置随动系统的数字化改造,并用于自动化专业的实践教学环节。通过使用计算机及数据采集装置取代系统原有模拟控制回路,实现了随动系统的硬件改造。利用VB和Matlab,借助于ActiveX控件.编制相关控制软件,可以方便地修改控制系统参数,且以图形化方式直观的显示实验结果。近年来的教学实践表明该系统在培养学生的实践动手能力、创新能力和综合能力等发面是有效的。 相似文献
19.
针对TD+GSM共分布系统出现的TD信号弱的问题,以运城移动工程为案例,采取了诸多行之有效的技术措施,使通信质量得到了充分保障. 相似文献
20.
We devise a simple modification that essentially doubles the efficiency of
the BB84 quantum key distribution scheme proposed by Bennett and Brassard.We also
prove the security of our modified scheme against the most general eavesdropping attack
that is allowed by the laws of physics. The first major ingredient of our scheme
is the assignment of significantly different probabilities to the different polarization
bases during both transmission and reception, thus reducing the fraction of discarded
data. A second major ingredient of our scheme is a refined analysis of accepted data:
We divide the accepted data into various subsets according to the basis employed and
estimate an error rate for each subset separately. We then show that such a refined data
analysis guarantees the security of our scheme against the most general eavesdropping
strategy, thus generalizing Shor and Preskills proof of security of BB84 to our
new scheme. Until now, most proposed proofs of security of single-particle type quantum key distribution schemes have relied heavily upon the fact that the bases are
chosen uniformly, randomly, and independently. Our proof removes this symmetry
requirement. 相似文献