Modeling Of Transfer Function Characteristic of Rlc-Circuit
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 1
Abstract
Abstract: The performances of a transfer function characteristic of RLC-circuit is investigated and modeled inthis paper. The ever increasing demand for electronics has led to the continuous search for the most readilyavailable means of providing better performance of the system. The method of analyzing RLC circuit is neverconstant and since the resistor (R), inductor (L), and the capacitor (C) are use in every electronic system, aproper understanding of system is necessary to know what happen to system when any of parameter is alter. Thedesign methodology employed in this work involves: the modeling of the equation of the RLC circuit, developingappropriate algorithms to imitate the real life behavior of an RLC circuit, Appling matlab codes in the m-fileand carrying out analysis of the designed RLC circuit in the Matlab GUI. Result obtained showed good properbehavior of the system when the input parameters were varied.
Authors and Affiliations
B. O. Omijeh , s. K. Ogboukebe
A Self-Organizing Cooperation for Autonomous Agents Based onImmune Network
Abstract: In order to solve the cooperation of autonomous agent systems,an artificial immune networkcooperation algorithm is proposed,which is based on Jerne’s idiotypic immune network hypothesis. A sheepdogherdi...
A Trust Based Replica Detection System for Node Replication in Mobile Sensor Networks
Abstract: Nowadays, Mobile Wireless Sensor Networks (MWSN) has become most popular and is used to solve challenging problems as industrial sensing and environmental monitoring. MWSN are always ready to be attack by...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Networks
While routing Wireless Sensor nodes in the Multi-hop network ,nodes may undergo some attacks such as sink hole attack, worm hole attack, Sybil attack etc., by the attackers through identity deception. So, to &n...
Pseudonym Based Security Architecture for Wireless Mesh Network
Abstract : Wireless Mesh Network (WMN) is a wireless network with mesh topology and is expected to be widespread due to the advantages such as low deployment cost, easy maintenance, robustness, scalability, reliable serv...
Software Development Process by a Logical Approach to Quantify the Throughput by Balancing Time and Cost
Abstract: Q-SPIM is an organized advance and incessant progress to enhance software organization’s ability throughput quality software that balances time and cost [2]. Such a model developed is verified and validated by...