Browser-based software tools for power converters

被引:0
|
作者
Hamar, Janos [1 ]
Funato, Hirohito [2 ]
Ogasawara, Satoshi [2 ]
Dranga, Octavian [3 ]
机构
[1] Budapest Univ Technol & Econ, Dept Automat & Appl Informat, Goldmann Gyorgy 3, H-1111 Budapest, Hungary
[2] Utsunomiya Univ, Dept Elect & Elect Engn, Ogasawara & Funato Lab, Utsunomiya, Tochigi 321, Japan
[3] James Cook Univ, Sch Engn, Townsville, Qld 4811, Australia
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The main objective of the paper is to present new browser-based, interactive software tools for modeling of various power electronics circuits. The static and dynamic operation, including the continuous and discrete time linearization of widely applied de-dc converter cells are discussed in the first part of the paper. The second part focuses on the basics of the pulse-width-modulation and its application in one-phase sinutsoidal inverters. The interactive tools provide numerous excellent opportunities for industrial and academic education. Another application field of numerous embedded interactive software components is their utilization as fast, real-time model-building tools.
引用
收藏
页码:473 / +
页数:2
相关论文
共 50 条
  • [1] Browser-Based Accessibility Evaluation Tools for Beginners
    McHale, Nina
    [J]. JOURNAL OF WEB LIBRARIANSHIP, 2011, 5 (04) : 334 - 343
  • [2] Browser-based attacks on Tor
    Abbott, Timothy G.
    Lai, Katherine J.
    Lieberman, Michael R.
    Price, Eric C.
    [J]. PRIVACY ENHANCING TECHNOLOGIES, 2007, 4776 : 184 - 199
  • [3] Assisting End-User Development in Browser-Based Mashup Tools
    Chowdhury, Soudip Roy
    [J]. 2012 34TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2012, : 1625 - 1627
  • [4] Browser-Based CPU Fingerprinting
    Trampert, Leon
    Rossow, Christian
    Schwarz, Michael
    [J]. COMPUTER SECURITY - ESORICS 2022, PT III, 2022, 13556 : 87 - 105
  • [5] Effects and Combination of Tailored Browser-Based and Mobile Cognitive Software Training
    Gabele, Mareike
    Thoms, Andrea
    Schroeer, Simon
    Husslein, Steffi
    Hansen, Christian
    [J]. MULTIMEDIA MODELING, MMM 2022, PT II, 2022, 13142 : 279 - 291
  • [6] Browser model for security analysis of browser-based protocols
    Gross, T
    Pfitzmann, B
    Sadeghi, AR
    [J]. COMPUTER SECURITY - ESORICS 2005, PROCEEDINGS, 2005, 3679 : 489 - 508
  • [7] Why browser-based predictive maintenance?
    Fillion, E
    [J]. PULP & PAPER-CANADA, 2003, 104 (01) : 23 - +
  • [8] Browser-Based Intrusion Prevention System
    Erete, Ikpeme
    [J]. RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2009, 5758 : 371 - 373
  • [9] A Browser-Based Kerberos Authentication Scheme
    Gajek, Sebastian
    Jager, Tibor
    Manulis, Mark
    Schwenk, Joeg
    [J]. COMPUTER SECURITY - ESORIC 2008, PROCEEDINGS, 2008, 5283 : 115 - +
  • [10] A first look at browser-based cryptojacking
    Eskandari, Shayan
    Leoutsarakos, Andreas
    Mursch, Troy
    Clark, Jeremy
    [J]. 2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2018), 2018, : 58 - 66