211 |
Impact of pole shape and proportions on flux leakage in switched-flux generatorsNel, Wynand. January 2005 (has links)
Thesis (M.S.)--University of Nevada, Reno, 2005. / "August 2005." Includes bibliographical references (leaves 118-127). Online version available on the World Wide Web.
|
212 |
A permanent-magnet switched-flux generatorQin, Ling, January 2005 (has links)
Thesis (Ph. D.)--University of Nevada, Reno, 2005. / "August 2005." Includes bibliographical references (leaves 143-154). Online version available on the World Wide Web.
|
213 |
Passively controlled variable-speed generator systemBathon, Tobias Siegfried 08 July 1999 (has links)
This thesis presents both an analysis and simulations of a passively controlled variable-speed generator system, which can be applied for renewable energy sources such as wind turbines. Parallel connected passive/external resistors and inductors are connected to the slip rings of a wound rotor induction machine to provide an acceptable speed operation range, while maintaining high efficiency of the generator system. Two generators, of 80 kW and 186 kW ratings, have been tested and compared to their simulations and good correlation has been obtained.
It is shown by both modelling and by laboratory tests that the steady-state power characteristic is well suited to the application and the efficiency compares well with similar rated machines in which either a fixed speed is required or power electronic converters provide the adjustable speed control. Thus, the tested systems are comparable in energy capture while being lower in costs and being both more robust and more reliable. In consequence, it is a more practical solution than power electronics for remote locations.
The dynamic results indicate that the generator is dynamically stable following three types of transient conditions: connections to the grid at non-synchronous speed; sudden decreases and increases in applied torque to simulate wind gusts; cyclic torque changes to demonstrate tower shadow effects. Unreasonable transients and undamped conditions have been neither predicted nor observed.
Finally, it is proposed that the external elements could be developed to be linked to the rotor circuit without slip rings enabling a complete passive and brushless system. / Graduation date: 2000
|
214 |
Turbo codes for data compression and joint source-channel codingZhao, Ying. January 2007 (has links)
Thesis (Ph.D.)--University of Delaware, 2006. / Principal faculty advisor: Javier Garcia-Frias, Dept. of Electrical and Computer Engineering. Includes bibliographical references.
|
215 |
Multichannel +/-1.16 kV arbitrary waveform generator for driving multistage ferroelectric laser-beam-deflectorMuhammad, Fikri. January 2006 (has links)
Thesis (M.E.E.)--University of Delaware, 2006. / Principal faculty advisor: Fouad Kiamilev, Dept. of Electrical and Computer Engineering. Includes bibliographical references.
|
216 |
Low density generator matrix codes for source and channel codingZhong, Wei. January 2006 (has links)
Thesis (Ph.D.)--University of Delaware, 2006. / Principal faculty advisor: Javier Garcia-Frias, Dept. of Electrical and Computer Engineering. Includes bibliographical references.
|
217 |
Sensor Fault Diagnosis for Wind-driven Doubly-fed Induction GeneratorsGálvez Carrillo, Manuel Ricardo 05 January 2011 (has links)
Among the renewable energies, wind energy presents the highest growth in installed capacity and penetration in modern power systems. This is why reliability of wind turbines becomes an important topic in research and industry. To this end, condition monitoring (or health monitoring) systems are needed for wind turbines. The core of any condition monitoring system (CMS) are fault diagnosis algorithms whose task is to provide early warnings upon the occurrence of incipient (small magnitude) faults. Thanks to the use of CMS we can avoid premature breakdowns and reduce significatively maintenance costs.
The present thesis deals with fault diagnosis in sensors of a doubly-fed induction generator (DFIG) for wind turbine (WT) applications. In particular we are interested in performing fault detection and isolation (FDI) of incipient faults affecting the measurements of the three-phase signals (currents and voltages) in a controlled DFIG. Although different authors have dealt with FDI for sensors in induction machines and in DFIGs, most of them rely on the machine model with
constant parameters. However, the parameter uncertainties due to changes in the operating conditions will produce degradation in the performance of such FDI systems.
In this work we propose a systematic methodology for the design of sensor FDI systems with the following characteristics: i) capable of detecting and isolating incipient additive (bias, drifts) and multiplicative (changes in the sensor
gain) faults, ii) robust against changes in the references/disturbances affecting the controlled DFIG as well as modelling/parametric uncertainties, iii) residual generation system based on a multi-observer strategy to enhance the isolation process, iv) decision system based on statistical-change detection algorithms to treat the entire residual and perform fault detection and isolation at once.
Three novel sensor FDI approaches are proposed. The first is a signal-based approach, that uses the model of the balanced three-phase signals (currents or voltages) for residual generation purposes. The second is a model-based approach
that accounts for variation in the parameters. Finally, a third approach that combines the benefits of both the signal- and the model-based approaches is proposed. The designed sensor FDI systems have been validated using measured voltages, as well as simulated data from a controlled DFIG and a speed-controlled induction
motor.
In addition, in this work we propose a discrete-time multiple input multiple output (MIMO) regulator for each power converter, namely for the rotor side converter (RSC) and for the grid side converter (GSC). In particular, for RSC
control, we propose a modified feedback linearization technique to obtain a linear time invariant (LTI) model dynamics for the compensated DFIG. The novelty of this approach is that the compensation does not depend on highly uncertain parameters such as the rotor resistance. For GSC control, a LTI model dynamics
is derived using the ideas behind feedback linearization. The obtained LTI model dynamics are used to design Linear Quadratic Gaussian (LQG) regulators. A single design is needed for all the possible operating conditions.
|
218 |
Design and development of a controller for a brushless doubly-fed automotive alternator systemJavadekar, Virendra S. 31 January 1992 (has links)
The loads on the electrical systems of automobiles are projected
to increase significantly in the near future. This will result in a
requirement for improved efficiency over the present-day car
alternators. An alternative scheme proposed at Oregon State
University employs a Brushless Doubly-Fed Machine (BDFM) as an
alternator.
This thesis begins with a study and characterization of the
existing car alternator system. The configuration of the proposed
scheme is discussed. In the proposed configuration, the power
winding of the machine generates the bulk of the power and the
control winding provides the excitation. The power winding feeds a
power rectifier, which in turn charges the battery in an automobile.
The control winding is supplied through an inverter. Issues related to
inverter and rectifier design are discussed. A 3-phase pulse width
modulated inverter and a bridge rectifier were developed and tested
for performance. A PSPICE simulation model for the rectifier was
developed and results are compared with laboratory tests. A Voltage
Regulator Circuit (VRC) and an Efficiency Maximizer Unit (EMU) for
the system are designed and developed. A prototype alternator system
is tested and the principle of efficiency maximization is verified.
Finally. the comparative performance of the the existing and the
proposed system is discussed and some recommendations for further
improvements in the prototype system are made. / Graduation date: 1992
|
219 |
Leakage Resilience and Black-box Impossibility Results in CryptographyJuma, Ali 31 August 2011 (has links)
In this thesis, we present constructions of leakage-resilient cryptographic primitives, and we give black-box impossibility results for certain classes of constructions of pseudo-random number generators.
The traditional approach for preventing side-channel attacks has been primarily hardware-based. Recently, there has been significant progress in developing algorithmic approaches for preventing such attacks. These algorithmic approaches involve modeling side-channel attacks as {\em leakage} on the internal state of a device; constructions secure against such leakage are {\em leakage-resilient}.
We first consider the problem of storing a key and computing on it repeatedly in a leakage-resilient manner. For this purpose, we define a new primitive called a {\em key proxy}. Using a fully-homomorphic
public-key encryption scheme, we construct a leakage-resilient key proxy. We work in the ``only computation leaks'' leakage model, tolerating a logarithmic number of bits of polynomial-time computable leakage per computation and an unbounded total amount of leakage.
We next consider the problem of verifying that a message sent over a public channel has not been modified, in a setting where the sender and the receiver have previously shared a key, and where the adversary controls the public channel and is simultaneously mounting side-channel attacks on both parties. Using only the assumption that pseudo-random generators exist, we construct a leakage-resilient shared-private-key authenticated session protocol. This construction tolerates a logarithmic number of bits of polynomial-time computable leakage per computation, and an unbounded total amount of leakage. This leakage occurs on the entire state, input, and randomness of the party performing the computation.
Finally, we consider the problem of constructing a large-stretch pseudo-random generator given a one-way permutation or given a smaller-stretch pseudo-random generator. The standard approach for doing this involves repeatedly composing the given object with itself. We provide evidence that this approach is necessary. Specifically,
we consider three classes of constructions of pseudo-random generators from pseudo-random generators of smaller stretch or from one-way permutations, and for each class, we give a black-box impossibility result that demonstrates a contrast between the stretch that can be achieved by adaptive and non-adaptive black-box constructions.
|
220 |
Leakage Resilience and Black-box Impossibility Results in CryptographyJuma, Ali 31 August 2011 (has links)
In this thesis, we present constructions of leakage-resilient cryptographic primitives, and we give black-box impossibility results for certain classes of constructions of pseudo-random number generators.
The traditional approach for preventing side-channel attacks has been primarily hardware-based. Recently, there has been significant progress in developing algorithmic approaches for preventing such attacks. These algorithmic approaches involve modeling side-channel attacks as {\em leakage} on the internal state of a device; constructions secure against such leakage are {\em leakage-resilient}.
We first consider the problem of storing a key and computing on it repeatedly in a leakage-resilient manner. For this purpose, we define a new primitive called a {\em key proxy}. Using a fully-homomorphic
public-key encryption scheme, we construct a leakage-resilient key proxy. We work in the ``only computation leaks'' leakage model, tolerating a logarithmic number of bits of polynomial-time computable leakage per computation and an unbounded total amount of leakage.
We next consider the problem of verifying that a message sent over a public channel has not been modified, in a setting where the sender and the receiver have previously shared a key, and where the adversary controls the public channel and is simultaneously mounting side-channel attacks on both parties. Using only the assumption that pseudo-random generators exist, we construct a leakage-resilient shared-private-key authenticated session protocol. This construction tolerates a logarithmic number of bits of polynomial-time computable leakage per computation, and an unbounded total amount of leakage. This leakage occurs on the entire state, input, and randomness of the party performing the computation.
Finally, we consider the problem of constructing a large-stretch pseudo-random generator given a one-way permutation or given a smaller-stretch pseudo-random generator. The standard approach for doing this involves repeatedly composing the given object with itself. We provide evidence that this approach is necessary. Specifically,
we consider three classes of constructions of pseudo-random generators from pseudo-random generators of smaller stretch or from one-way permutations, and for each class, we give a black-box impossibility result that demonstrates a contrast between the stretch that can be achieved by adaptive and non-adaptive black-box constructions.
|
Page generated in 0.0749 seconds