نتایج جستجو برای: power sharing
تعداد نتایج: 568195 فیلتر نتایج به سال:
This paper presents 10-bit, 1.5 MS/s, 2.5V, Low Power Pipeline analog to digital converter using capacitor coupling techniques. A capacitance coupling foldedcascode amplifier effectively saves the power consumption of gain stages of ADC in a 0.25 μm CMOS technology. The ADC also achieves Low power Consumption by the sharing an op-amp between two successive pipeline stage further reduction of po...
This paper presents multi-step capacitor switching methods for SAR ADCs based on precharge with floating capacitors and charge sharing. The proposed switching methods further reduce the transient power of the split monotonic switching method (an improved version of the monotonic switching method). Compared to the split monotonic switching, adding charge sharing achieves around 50% reduction in ...
The droop current sharing method is analyzed, and a general design procedure is proposed. It is shown that the current-sharing accuracy of N+1 power supplies is a function of the output-voltage set-point accuracy, the slope of the outputvoltage droop, and gains of the control loop. It was found that to achieve a current sharing accuracy of 10% the output voltage of the paralleled power supplies...
With increasing influence of variable speed wind turbines in power systems, the equivalent inertia of network is reduced. Accordingly, after the occurrence of disturbance in system, the frequency fluctuations in power systems increase. To overcome this problem, a supplementary control loop is added to the converter of the variable speed wind turbine in order to share the inertia of this type of...
A secret-sharing scheme enables a dealer to distribute a secret among n parties such that only some predefined authorized sets of parties will be able to reconstruct the secret from their shares. The (monotone) collection of authorized sets is called an access structure, and is freely identified with its characteristic monotone function f : f0; 1gn ! f0; 1g. A family of secret-sharing schemes i...
A secret-sharing scheme enables a dealer to distribute a secret among n parties such that only some predefined authorized sets of parties will be able to reconstruct the secret from their shares. The (monotone) collection of authorized sets is called an access structure, and is freely identified with its characteristic monotone function f : f0; 1gn ! f0; 1g. A family of secret-sharing schemes i...
Peer-to-peer (P2P) model has been actively and widely used for file sharing in Internet. While many research efforts have been made to improve its performance, some organizations have expressed their serious concerns to P2P applications in Internet, such as copyright violations, information leaking, and inefficient usage of Internet resources. Instead of presenting my subjective views to these ...
Register files (RF) are known to consume about 20% of the power inside a processor. Embedded systems, due to area and timing constraints, generally have small register files, which can cause significant register pressure. This work explores how having a map-table or a map-vector can decrease the power dissipation in the processor. The distribution of register writes and sharing of commonly occu...
This article proposed a harmonic suppression scheme that used dc-dc converter as an active injector to cancel voltage harmonics on the HVdc bus within hybrid power generation centre (HPGC). A permanent magnet synchronous generator and battery are considered supply common through their dedicated ac-dc converters respectively HPGC. We simplified mathematical models of from converters. Thereafter,...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید