Analysis, control, and modeling of the three‐port converter without port voltage constraint for photovoltaic/battery system application

Author(s):  
Qingxin Tian ◽  
Guohua Zhou ◽  
Minrui Leng ◽  
Guodong Xu ◽  
Xianyan Fan ◽  
...  
Author(s):  
Shamim Mohammadsalehian ◽  
Farzad Sedaghati ◽  
Reyhane Eskandari ◽  
Hossein Shayeghi ◽  
Elias Shokati Asl

2019 ◽  
Vol 321 ◽  
pp. 134705 ◽  
Author(s):  
Mathilde Cazot ◽  
Gaël Maranzana ◽  
Jérôme Dillet ◽  
Florent Beille ◽  
Thibault Godet-Bar ◽  
...  

Author(s):  
Michael E. Rock ◽  
Vern Kennedy ◽  
Bhaskar Deodhar ◽  
Thomas G. Stoebe

Cellophane is a composite polymer material, made up of regenerated cellulose (usually derived from wood pulp) which has been chemically transformed into "viscose", then formed into a (1 mil thickness) transparent sheet through an extrusion process. Although primarily produced for the food industry, cellophane's use as a separator material in the silver-zinc secondary battery system has proved to be another important market. We examined 14 samples from five producers of cellophane, which are being evaluated as the separator material for a silver/zinc alkaline battery system in an autonomous underwater target vehicle. Our intent was to identify structural and/or chemical differences between samples which could be related to the functional differences seen in the lifetimes of these various battery separators. The unused cellophane samples were examined by transmission electron microscopy (TEM) and energy dispersive X-ray spectroscopy (EDS). Cellophane samples were cross sectioned (125-150 nm) using a diamond knife on a RMC MT-6000 ultramicrotome. Sections were examined in a Philips 430-T TEM at 200 kV. Analysis included morphological characterization, and EDS (for chemical composition). EDS was performed using an EDAX windowless detector.


2020 ◽  
Vol 3 (2) ◽  
pp. 182-186
Author(s):  
Lisnayani Silalahi ◽  
Anita Sindar

Data security and confidentiality is currently a very important issue and continues to grow. Several cases concerning data security are now a job that requires handling and security costs that are so large. To maintain the security and confidentiality of messages, data, or information so that no one can read or understand it, except for the rightful recipients, a data security system application with an encryption method using an algorithm is designed. The SHA-1 cryptographic hash function that takes input and produces a 160-bit hash value which is known as the message iteration is usually rendered as a 40-digit long hexadecimal number.


Sign in / Sign up

Export Citation Format

Share Document