IEEE Access最新文献

筛选
英文 中文
An Optimization Model for Harmonic Parameters Estimation of Transmission Lines Using Phasor Measurements 基于相量测量的输电线路谐波参数估计优化模型
IF 3.4 3区 计算机科学
IEEE Access Pub Date : 2025-04-23 DOI: 10.1109/ACCESS.2025.3563771
Leticia L. S. de Sousa;Igor D. Melo;Carlos A. Duque;Candida A. Meneghin;Paulo F. Ribeiro
{"title":"An Optimization Model for Harmonic Parameters Estimation of Transmission Lines Using Phasor Measurements","authors":"Leticia L. S. de Sousa;Igor D. Melo;Carlos A. Duque;Candida A. Meneghin;Paulo F. Ribeiro","doi":"10.1109/ACCESS.2025.3563771","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3563771","url":null,"abstract":"Transmission line parameter estimation is a critical issue for power system operation and planning studies. With the advent of synchrophasor technology, numerous new methods have been developed using PMUs (Phasor Measurement Units) based on real-time measurements from the sending and receiving ends of a transmission line. Typically, the equivalent PI section of the line is determined for the fundamental frequency only. For other harmonic orders, impedances can be measured at specific points in the electric network using a frequency scan approach. However, few studies have focused on the separate estimation of all longitudinal resistances, reactances and shunt admittances for higher harmonic orders. This paper presents a novel approach to this long-standing issue by formulating an optimization problem, where the least squares equation is minimized, subject to inequality constraints associated with the harmonic impedances of a transmission line, modeled with a quadrupole representation. The proposed optimization method allows for the estimation of line impedance parameters with reduced errors for all harmonic orders considered in the analysis. Computational simulations are carried out to demonstrate the applicability of the method, using different line models including a real Brazilian transmission line, and the impact of instrument transformers on the estimated results is also assessed.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"75373-75383"},"PeriodicalIF":3.4,"publicationDate":"2025-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10974928","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143902670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data-Driven Posture Control of Tensegrity Manipulator Based on Strut’s Inclination Angle 基于支撑倾角的张拉整体机械臂数据驱动姿态控制
IF 3.4 3区 计算机科学
IEEE Access Pub Date : 2025-04-23 DOI: 10.1109/ACCESS.2025.3563756
Kazuki Wada;Yuhei Yoshimitsu;Tufail Ahmad Bhat;Shuhei Ikemoto
{"title":"Data-Driven Posture Control of Tensegrity Manipulator Based on Strut’s Inclination Angle","authors":"Kazuki Wada;Yuhei Yoshimitsu;Tufail Ahmad Bhat;Shuhei Ikemoto","doi":"10.1109/ACCESS.2025.3563756","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3563756","url":null,"abstract":"Tensegrity structures have been utilised in soft robotics due to their flexible and lightweight nature. However, unlike traditional robots, these structures lack joint angles, which makes it challenging to use conventional angle sensors, and thus estimating the posture of the robot remains a challenge. To overcome this, we propose a data-driven approach for posture control of a redundant tensegrity manipulator using inclination angles of all struts, these angles are calculated relative to the gravitational direction. Specifically, we train a simple feedforward neural network (NN) to approximate a mapping from the inclination angles to the control inputs with a conditioning layer-wise averaged pressures. This network acts as a posture controller, mapping the desired inclination angles to the corresponding control inputs with conditioning by average pressure in the layer. The desired inclination angles corresponding to the desired posture can be obtained by demonstrating the robot in a direct teaching manner. We used the tensegrity manipulator consisting of 20 struts and 40 actuators to validate our approach. The experimental results showed that the tensegrity manipulator can reproduce the desired demonstrated postures.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"73785-73793"},"PeriodicalIF":3.4,"publicationDate":"2025-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10974957","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143896289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-Time Detection and Identification of ARP Spoofing Attacks in Microgrids 微电网中ARP欺骗攻击的实时检测与识别
IF 3.4 3区 计算机科学
IEEE Access Pub Date : 2025-04-23 DOI: 10.1109/ACCESS.2025.3563721
Kalinath Katuri;Ha Thi Nguyen;Emmanouil Anagnostou
{"title":"Real-Time Detection and Identification of ARP Spoofing Attacks in Microgrids","authors":"Kalinath Katuri;Ha Thi Nguyen;Emmanouil Anagnostou","doi":"10.1109/ACCESS.2025.3563721","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3563721","url":null,"abstract":"The integration of smart devices and advanced communication infrastructure has turned power systems into cyber-physical systems (CPS), introducing cyber vulnerabilities. One such vulnerability arises from the use of the address resolution protocol (ARP), which is commonly employed in power systems’ information technology (IT) infrastructure to assign internet protocol (IP) addresses to devices such as relays, controllers, and meters. Due to the lack of authentication in ARP, attackers can exploit it to infiltrate substation automation systems (SAS). To detect and locate ARP spoofing attacks, a novel network intrusion detection system (NIDS) was developed using Snort3, TShark, and Python scripts to monitor ARP broadcast messages. This detection method was tested on a dedicated, real-time multi-agent CPS testbed, where a microgrid is simulated as the physical layer using a real-time digital simulator (RTDS), while the cyber layer consists of a multi-agent control implemented in a graphical network simulator (GNS3) together with Raspberry Pi devices. The real-time operator’s view is developed in Grafana visualization, mimicking the real-world microgrid operation. Two common practical ARP attacks, known as man-in-the-middle (MITM) and false data injection (FDI) attacks, were conducted to evaluate the performance of the proposed NIDS method. Both MITM and FDI attacks were implemented using IT network testing tools, such as Ettercap and the Scapy library in Python. The results have shown that the proposed NIDS system can detect, localize, and publish the IP address of the attacker in both MITM and FDI attack scenarios. In addition, the impact analysis results indicated that for an identical malicious payload, the FDI attack is more severe when compared to MITM due to the intermittent nature of false data injection.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"72427-72441"},"PeriodicalIF":3.4,"publicationDate":"2025-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10975017","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143896505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Relationships Among e-Voting, e-Auction, e-Cheque, and e-Cash 电子投票、电子拍卖、电子支票和电子现金之间的关系
IF 3.4 3区 计算机科学
IEEE Access Pub Date : 2025-04-23 DOI: 10.1109/ACCESS.2025.3560552
Yun-Xing Kho;Swee-Huay Heng;Syh-Yuan Tan;Ji-Jian Chin
{"title":"Relationships Among e-Voting, e-Auction, e-Cheque, and e-Cash","authors":"Yun-Xing Kho;Swee-Huay Heng;Syh-Yuan Tan;Ji-Jian Chin","doi":"10.1109/ACCESS.2025.3560552","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3560552","url":null,"abstract":"This paper illustrates how a transformation technique can be used to demonstrate the relationship among e-voting, e-auction, e-cheque, and e-cash, even though they serve distinct purposes. Initially, we examine the definitions of e-cheque and e-cash schemes, along with their respective security models. Subsequently, we develop a systematic framework to transform e-cheque into e-cash, supported by formal proof demonstrating the security of the conversion. As a corollary, we further exemplify this integration with a generic transformation framework to obtain e-cash from e-voting directly by combining an existing transformation of e-voting into e-cheque and the transformation of e-cheque into e-cash which we established earlier. We apply our transformation framework to Li et al.’s transformed e-cheque scheme and Li et al.’s e-voting scheme to obtain a concrete, secure e-cash scheme that is IND-CCEA, IND-CIA, and EUF-CIA as an instance. Finally, we examine how our result contributes to the integration and relationship between e-voting, e-auction, e-cheque, and e-cash systems.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"71773-71791"},"PeriodicalIF":3.4,"publicationDate":"2025-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10975145","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143883350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Mapping and 3D Perception Using Voxel Grid and Modified Artificial Potential Fields for Indoor Locomotion 基于体素网格和修正人工势场的室内运动动态映射和三维感知
IF 3.4 3区 计算机科学
IEEE Access Pub Date : 2025-04-23 DOI: 10.1109/ACCESS.2025.3563484
Trihastuti Agustinah;Yurid Eka Nugraha;Aqil Rabbani Nurhadi;Vincentius Charles Maynad
{"title":"Dynamic Mapping and 3D Perception Using Voxel Grid and Modified Artificial Potential Fields for Indoor Locomotion","authors":"Trihastuti Agustinah;Yurid Eka Nugraha;Aqil Rabbani Nurhadi;Vincentius Charles Maynad","doi":"10.1109/ACCESS.2025.3563484","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3563484","url":null,"abstract":"This paper proposes an advanced 3D indoor navigation system for a mobile robot. The proposed method integrates RTAB-Map with Voxel Grid Filters and Joint Probabilistic Data Association (JPDA) to generate surrounding environment map efficiency. Additionally, the local path planner combines pure pursuit with a modified Artificial Potential Field (APF) method to improve navigation capability. It generates steering commands and desired velocities and adjusts the attractive potential force equation to maintain balance and operational efficiency. This modification improves safety, pedestrian avoidance, and comfort by minimizing unnecessary rotations while ensuring smooth navigation. The proposed system improves the locomotion ability by reducing roll, pitch, and yaw fluctuations by approximately 30% compared to traditional APF methods. Voxel grid filtering enhances computational efficiency, reducing processing time per iteration by up to 73% - from 0.247 seconds (raw LiDAR) to 0.067 seconds (voxel size of 0.9) - while maintaining obstacle detection accuracy. The integration of JPDA ensures safe multi-target detection, with minimum safe distances of 0.94 meters from dynamic actors and a Threat Level Index (TLI) peaking at 0.24. In a scenario comparing two robots with different map knowledge, the robot with map knowledge reached the waypoint 20% faster, following an efficient path. However, despite lacking prior knowledge, the second robot reached the waypoint, demonstrating the system’s adaptability. These quantitative results confirm the proposed method’s capability to enhance safety, efficiency, and human comfort, making it suitable for real-time indoor navigation in dynamic environments.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"71288-71305"},"PeriodicalIF":3.4,"publicationDate":"2025-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10974978","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143888398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vision-Based Measurement for Quality Control Inspection Integrated Into a Die-Casting Process in Industry 4.0 Era 工业4.0时代压铸过程中基于视觉的质量控制检测
IF 3.4 3区 计算机科学
IEEE Access Pub Date : 2025-04-23 DOI: 10.1109/ACCESS.2025.3563800
Romulo Gonçalves Lins;Reinaldo Eduardo Dos Santos;Ricardo Gaspar
{"title":"Vision-Based Measurement for Quality Control Inspection Integrated Into a Die-Casting Process in Industry 4.0 Era","authors":"Romulo Gonçalves Lins;Reinaldo Eduardo Dos Santos;Ricardo Gaspar","doi":"10.1109/ACCESS.2025.3563800","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3563800","url":null,"abstract":"High-pressure die casting (HPDC) is a widely adopted manufacturing process in the automotive industry, renowned for producing complex metal components with high precision and surface quality. However, HPDC is inherently susceptible to defects such as shrinkage, high porosity, and filling irregularities, which can compromise product integrity and escalate production costs through increased rework and material waste. Although effective, traditional Statistical Process Control (SPC) methods require significant statistical expertise and are often cost-prohibitive for smaller manufacturers, limiting their widespread adoption. This study introduces and validates a tailored Vision-Based Measurement (VBM) system designed to automate real-time quality control within HPDC processes, enabling 100% inspection coverage without human intervention. Utilizing a COGNEX IS7600M camera and advanced image processing techniques, including Hough Transform and Sobel edge detection, the VBM system accurately measures the critical dimensions of a metallic clamping fork, a key automotive component. The system is integrated into the manufacturing workflow using the RAMI 4.0 architectural model, ensuring seamless communication with existing software applications used in the production process. Experimental validation involved assessing measurement uncertainty and implementing SPC charts, demonstrating enhanced process stability and a significant reduction in Non-Pass Rates (NPR) from 147 to 63, representing an approximately 57% decrease. A Failure Mode and Effects Analysis (FMEA) highlighted substantial reductions in direct and indirect defect detection and handling costs, resulting in financial savings of R<inline-formula> <tex-math>${$}$ </tex-math></inline-formula>2,179.50 per batch by minimizing rework and material waste. Additionally, the VBM system reduced inspection time from several minutes per component to approximately 7.7 seconds, lowering labor costs. Financial analysis revealed considerable cost savings, underscoring the system’s economic viability. This research demonstrates that integrating a VBM system into HPDC improves measurement accuracy and process control while offering significant financial benefits, making it a robust solution for enhancing quality control in the context of Industry 4.0.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"75043-75066"},"PeriodicalIF":3.4,"publicationDate":"2025-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10975033","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143902701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Audio-in-Image Steganography Using Analysis and Resynthesis Sound Spectrograph 利用声谱分析和再合成技术进行声像隐写
IF 3.4 3区 计算机科学
IEEE Access Pub Date : 2025-04-23 DOI: 10.1109/ACCESS.2025.3563781
A. Aravind Krishnan;Yukta Ramesh;Udbhav Urs;Megha Arakeri
{"title":"Audio-in-Image Steganography Using Analysis and Resynthesis Sound Spectrograph","authors":"A. Aravind Krishnan;Yukta Ramesh;Udbhav Urs;Megha Arakeri","doi":"10.1109/ACCESS.2025.3563781","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3563781","url":null,"abstract":"Steganography is the practice of concealing secret information within a non-secret medium, such as an image or audio file, to prevent detection by unauthorised observers. Currently, there is a shortage of solutions for audio-in-image storage, with a complete absence of methods that do not rely on deep learning approaches. This is problematic because learning models often plateau at a certain level of accuracy, making further improvements difficult. Audio steganography, like other forms of steganography, is vulnerable to data malleability and requires solutions that offer customisable security features while maintaining robustness. This paper presents a novel approach for audio-in-image steganography involving the analysis and resynthesis of sound spectrographs (ARSS). This framework ensures efficient and secure data storage using a simplistic, multi-channel, and non-lossy approach to embed an audio spectrograph in a high-resolution image file. It allows for minimal pre-processing and post-processing to conceal one or more sound spectrographs within a single cover image while focusing on maintaining high fidelity in sound resynthesis during retrieval. Referred to as ASA, this proposed approach achieves a mean PSNR value of 42.54 dB for the stego-image and 45.02 dB for the reconstructed image, outperforming most existing methods while also offering high storage efficiency and infrastructure for additional security measures.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"75180-75189"},"PeriodicalIF":3.4,"publicationDate":"2025-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10974927","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143902671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Privacy in IoT Networks: A Comparative Analysis of Classification and Defense Methods 增强物联网网络中的隐私:分类与防御方法的比较分析
IF 3.4 3区 计算机科学
IEEE Access Pub Date : 2025-04-23 DOI: 10.1109/ACCESS.2025.3563799
Ahmet Emre Ergun;Ozgu Can;Murat Kantarcioglu
{"title":"Enhancing Privacy in IoT Networks: A Comparative Analysis of Classification and Defense Methods","authors":"Ahmet Emre Ergun;Ozgu Can;Murat Kantarcioglu","doi":"10.1109/ACCESS.2025.3563799","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3563799","url":null,"abstract":"The rapid proliferation of Internet of Things (IoT) devices has led to a substantial increase in network packet traffic, raising significant privacy concerns. Although traffic encryption is employed to protect the privacy of IoT devices, attackers can still leverage Machine Learning (ML) and Deep Learning (DL) techniques to classify device types by analyzing packet characteristics, such as size and timing. The main challenges in the state of the art are the lack of effective methods for exposing privacy violations in encrypted IoT traffic, and the absence of robust defense mechanisms to mitigate privacy breaches caused by network traffic analysis. Considering these challenges, this study presents two key contributions: (i) a novel vector-based classification method that enhances device-type identification from encrypted IoT traffic using advanced ML and DL techniques, and (ii) a robust defense mechanism based on Differential Privacy (DP) and advanced padding techniques against traffic analysis attacks. Therefore, the study examines privacy risks associated with sequential IoT device data and evaluates the effectiveness of ML algorithms using two datasets. The results demonstrate that the proposed vector-based classification method significantly improves the attacker’s classification accuracy, even when privacy-preserving techniques, such as padding, are used to obscure device-type classification. For this purpose, the study evaluates eXtreme Gradient Boosting (XGBoost), Long Short-Term Memory (LSTM), and Gated Recurrent Unit (GRU) for IoT traffic classification, achieving an accuracy rate of 99.61% with XGBoost, 96.74% with LSTM, and 96.94% with GRU. Additionally, the Decision Tree (DT), Random Forest (RF), k-Nearest Neighbors (kNN), and GRU classification algorithms are also evaluated and compared with the XGBoost and LSTM classifiers for the proposed attack model. As a defense mechanism, DP is applied using the Fourier Perturbation Algorithm (FPA) to optimize padding strategies while maintaining network efficiency. A comparative analysis with state of the art padding techniques, including Adaptive Packet Padding (APP), and the proposed DP-based defense mechanism demonstrates that the proposed defense approach achieves a superior privacy-utility balance. The findings reveal that while padding techniques reduce classification accuracy, the novel vector method significantly enhances attack performance, underscoring the need for stronger defense strategies. Consequently, this study addresses a critical gap in the literature by providing a comprehensive evaluation of privacy risks, classification robustness, and the effectiveness of DP-based defense in IoT network traffic. Thus, the proposed research provides practical insights for enhancing privacy preservation while maintaining network performance, thereby contributing to the development of more secure IoT communication frameworks.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"71611-71646"},"PeriodicalIF":3.4,"publicationDate":"2025-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10974975","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143888431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Common-Ground Bridgeless Unity Power Factor Single-Phase Rectifier 共地无桥统一功率因数单相整流器
IF 3.4 3区 计算机科学
IEEE Access Pub Date : 2025-04-23 DOI: 10.1109/ACCESS.2025.3563831
Ivo Barbi;Hugo Rolando Estofanero Larico
{"title":"Common-Ground Bridgeless Unity Power Factor Single-Phase Rectifier","authors":"Ivo Barbi;Hugo Rolando Estofanero Larico","doi":"10.1109/ACCESS.2025.3563831","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3563831","url":null,"abstract":"A common AC and DC ground bridgeless power converter topology is presented that performs the near-unity power factor function with low harmonic distortion of a single-phase rectifier with sinusoidal input line voltage. The operation principle and design-oriented analysis are presented, along with the transfer functions and closed-loop input current control strategy. A non-optimized experimental prototype was developed and tested in the laboratory to validate the operating principle and the results of theoretical analysis. The distinctive feature of the proposed rectifier is that it eliminates the leakage current that circulates through the parasitic capacitances existing between the power semiconductor and heatsink, which causes common-mode electromagnetic interference in conventional boost-based PFC rectifiers.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"72269-72278"},"PeriodicalIF":3.4,"publicationDate":"2025-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10974977","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143896234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Broadening Misalignment Tolerance Using Broadside Coupled Wedge-Waveguide to Microstrip Inline Transition for MMIC Packaging 利用宽侧耦合楔形波导到微带线内过渡扩大MMIC封装的误差容限
IF 3.4 3区 计算机科学
IEEE Access Pub Date : 2025-04-23 DOI: 10.1109/ACCESS.2025.3563629
Hafeez-Ur-Rehman;Ha Il Song;Sean Park;Jae-Hyung Jang
{"title":"Broadening Misalignment Tolerance Using Broadside Coupled Wedge-Waveguide to Microstrip Inline Transition for MMIC Packaging","authors":"Hafeez-Ur-Rehman;Ha Il Song;Sean Park;Jae-Hyung Jang","doi":"10.1109/ACCESS.2025.3563629","DOIUrl":"https://doi.org/10.1109/ACCESS.2025.3563629","url":null,"abstract":"A broadside aperture coupling was utilized instead of end-wall aperture coupling for millimeter wave inline waveguide-to-microstrip transition (WMT), allowing a larger misalignment tolerance of ±250 um in the vertical direction and ±300 um in the horizontal direction within the insertion loss degradation of 0.1 dB. Additionally, a simple wedge waveguide configuration eliminated the necessity for complex taper or ridge waveguide sections. It simplifies manufacturing and testing procedures by eliminating the need for E-plane or H-plane splits. Furthermore, the transition exhibits broadband and low-loss performance. The fractional bandwidth reached as high as 44%, while the insertion loss of the back-to-back transition was measured at 8.5 dB, which includes the loss from the 1-meter-long waveguide (5.5 dB). The transition is well-suited for microwave and sub-millimeter frequencies due to its low loss, broad bandwidth, compact design, and ease of integration with MMICs.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"72477-72485"},"PeriodicalIF":3.4,"publicationDate":"2025-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10975053","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143896558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信