排序方式: 共有14条查询结果,搜索用时 507 毫秒
1.
Das Ashmi Chakraborty Dwari Santanu Bage Amit 《Wireless Personal Communications》2018,98(4):3477-3503
Wireless Personal Communications - This paper presents method of moment based analysis of E Plane and H-Plane T-junctions to find the field distributions on different transverse and longitudinal... 相似文献
2.
In this paper, an optimal control technique for n-phase permanent-magnet (PM) machines under various open circuit faults is presented. Under the fault conditions, the currents in the healthy phases are controlled to compensate phase loss and to produce the required output torque. The proposed control technique ensures continuous operation of the machines while producing minimum torque ripples and minimum stator ohmic loss. The control technique is based on the instantaneous power balance theory. To set the summation of the phase currents equal to zero, a constraint is incorporated in the derivation of the control technique. A five-phase PM machine is considered to demonstrate the proposed open circuit fault-tolerant control strategy. Simulation and experimental results are provided for validation. 相似文献
3.
Sarkar Manas Mishra Shivangi Daniel Anitha Dwari Santanu 《Wireless Personal Communications》2019,104(1):269-286
Wireless Personal Communications - This paper presents a study of a class of iris localization algorithms in the presence of blurring. The effect of blurring is a serious problem in most image... 相似文献
4.
5.
6.
Kumar Rajesh Dwari Santanu Kanaujia Binod Kumar 《Analog Integrated Circuits and Signal Processing》2022,111(3):313-323
Analog Integrated Circuits and Signal Processing - This paper presents an Ultra-wideband, high-efficiency Class-E power amplifier (PA) using a current source tuner and microstrip inter-digital... 相似文献
7.
Kumar Rajesh Dwari Santanu Kanaujia Binod Kumar Kumar Sandeep Song Hanjung 《Analog Integrated Circuits and Signal Processing》2021,107(3):497-510
Analog Integrated Circuits and Signal Processing - This paper presents a high-efficiency Class $${\mathrm{FF}}^{-1}$$ DPA using the quad-mode coupled technique for new configurable front-end 5G... 相似文献
8.
Mukesh Kumar Khandelwal Binod Kumar Kanaujia Santanu Dwari Sachin Kumar A.K. Gautam 《AEUE-International Journal of Electronics and Communications》2014,68(10):951-957
A wide band Microstrip antenna is proposed for Ku band applications with defected ground structure. A circular shape defect is integrated in the ground plane. A novel equivalent circuit model is proposed for Microstrip patch antenna with defected ground structure. Accurate design equations are presented for the wideband Microstrip antenna and theoretical analysis is done for the proposed structure. The proposed antenna has an impedance bandwidth of 56.67% ranging from 9.8 GHz to 17.55 GHz, which covers Ku-band and partially X-band. The antenna shows good radiation characteristics within the entire band, and has a gain ranging from 5 dBi to 12.08 dBi. Minimum isolation between co-polar and cross-polarization level of 20 dB and 15 dB is achieved in H-plane and E-plane respectively. The simulation of the proposed antenna is done on HFSS v.14, and measured results of fabricated antenna are in good agreement with the theoretical and simulated results. 相似文献
9.
Sandeep Kumar Binod Kumar Kanaujia Santanu Dwari Ganga Prasad Pandey Dinesh Kumar Singh Anil Kumar Gautam 《Wireless Personal Communications》2017,96(4):5185-5201
Now a days, the communication between different nodes in a Mobile Ad hoc Network (MANET) is not guarded. Various encryption mechanisms are used to protect the communication between nodes. Link failures and packet dropping due to unfaithful nodes are becoming one of the main opposition for the trusted detection of malicious nodes. A failure can occur either due to channel errors or harmful nodes in network. These attacks may have the intention of modifying the routing protocol so that the data transmission through a specific node controlled by the attacker disturbs the network topology. Thus it deteriorates the performance of network. Mutual association of dropped packets is capitalized for synthesizing the suspicious nodes in MANET. The algorithm proposed is using an efficient cryptosystem with cipher text list validator scheme and a communal auditing scheme for the validation of certificate received from individual nodes. For constructing the framework, the proposed algorithm with five phases has a network setup phase, data routing phase, communal auditing phase, error node detection phase and a data receiver phase. This framework makes the MANET node build a safe routing topology by effectively judging the harmful nodes as well as the unfaithful information accepted from supplementary nodes. 相似文献
10.
Das Ashmi Chakraborty Dwari Santanu Biswal Sonika Priyadarsini 《Wireless Personal Communications》2019,107(3):1431-1442
Wireless Personal Communications - In this paper, we propose modulation and coding scheme level drop scheme for LTE evolved multimedia broadcast/multicast service (eMBMS) by transmitting additional... 相似文献