6,775 research outputs found

    Parameterized partial element equivalent circuit method for sensitivity analysis of multiport systems

    Get PDF
    This paper presents a new technique to perform parameterized sensitivity analyses of systems that depend on multiple design parameters, such as layout and substrate features. It uses the electromagnetic (EM) method called partial element equivalent circuit to compute state space matrices at a set of design space points. These EM matrices are interpolated as functions of the design parameters. The proposed interpolation scheme allows the computation of the derivatives of the matrices, which are needed to perform the sensitivity analysis. An extensive study of the required stability and passivity properties of the system involved in the parameterized sensitivity analysis is presented. Pertinent numerical results demonstrate the robustness, accuracy, and efficiency of the proposed methodology

    Complex Bifurcation from Real Paths

    Get PDF
    A new bifurcation phenomenon, called complex bifurcation, is studied. The basic idea is simply that real solution paths of real analytic problems frequently have complex paths bifurcating from them. It is shown that this phenomenon occurs at fold points, at pitchfork bifurcation points, and at isola centers. It is also shown that perturbed bifurcations can yield two disjoint real solution branches that are connected by complex paths bifurcating from the perturbed solution paths. This may be useful in finding new real solutions. A discussion of how existing codes for computing real solution paths may be trivially modified to compute complex paths is included, and examples of numerically computed complex solution paths for a nonlinear two point boundary value problem, and a problem from fluid mechanics are given

    Sensitivity of a Barotropic Ocean Model to Perturbations of the Bottom Topography

    Get PDF
    In this paper, we look for an operator that describes the relationship between small errors in representation of the bottom topography in a barotropic ocean model and the model's solution. The study shows that the model's solution is very sensitive to topography perturbations in regions where the flow is turbulent. On the other hand, the flow exhibits low sensitivity in laminar regions. The quantitative measure of sensitivity is influenced essentially by the error growing time. At short time scales, the sensitivity exhibits the polynomial dependence on the error growing time. And in the long time limit, the dependence becomes exponential

    Structure and stability of the compressible Stuart vortex

    Get PDF
    The structure and two- and three-dimensional stability properties of a linear array of compressible Stuart vortices (CSV; Stuart 1967; Meiron et al. 2000) are investigated both analytically and numerically. The CSV is a family of steady, homentropic, two-dimensional solutions to the compressible Euler equations, parameterized by the free-stream Mach number M_∞, and the mass flux _ inside a single vortex core. Known solutions have 0 < M_∞ < 1. To investigate the normal-mode stability of the generally spatially non-uniform CSV solutions, the linear partial-differential equations describing the time evolution of small perturbations to the CSV base state are solved numerically using a normal-mode analysis in conjunction with a spectral method. The effect of increasing M_∞ on the two main classes of instabilities found by Pierrehumbert & Widnall (1982) for the incompressible limit M_∞ → 0 is studied. It is found that both two- and three-dimensional subharmonic instabilities cease to promote pairing events even at moderate M_∞. The fundamental mode becomes dominant at higher Mach numbers, although it ceases to peak strongly at a single spanwise wavenumber. We also find, over the range of ε investigated, a new instability corresponding to an instability on a parallel shear layer. The significance of these instabilities to experimental observations of growth in the compressible mixing layer is discussed. In an Appendix, we study the CSV equations when ε is small and M_∞ is finite using a perturbation expansion in powers of ε. An eigenvalue determining the structure of the perturbed vorticity and density fields is obtained from a singular Sturm–Liouville problem for the stream-function perturbation at O(ε). The resulting small-amplitude steady CSV solutions are shown to represent a bifurcation from the neutral point in the stability of a parallel shear layer with a tanh-velocity profile in a compressible inviscid perfect gas at uniform temperature

    Enforcing passivity of parameterized LTI macromodels via Hamiltonian-driven multivariate adaptive sampling

    Get PDF
    We present an algorithm for passivity verification and enforcement of multivariate macromodels whose state-space matrices depend in closed form on a set of external or design parameters. Uniform passivity throughout the parameter space is a fundamental requirement of parameterized macromodels of physically passive structures, that must be guaranteed during model generation. Otherwise, numerical instabilities may occur, due to the ability of non-passive models to generate energy. In this work, we propose the first available algorithm that, starting from a generic parameter-depedent state-space model, identifies the regions in the frequency-parameter space where the model behaves locally as a non-passive system. The approach we pursue is based on an adaptive sampling scheme in the parameter space, which iteratively constructs and perturbs the eigenvalue spectrum of suitable Skew-Hamiltonian/Hamiltonian (SHH) pencils, with the objective of identifying the regions where some of these eigenvalues become purely imaginary, thus pinpointing local passivity violations. The proposed scheme is able to detect all relevant violations. An outer iterative perturbation method is then applied to the model coefficients in order to remove such violations and achieve uniform passivity. Although a formal proof of global convergence is not available, the effectiveness of the proposed implementation of the passivity verification and enforcement schemes is demonstrated on several examples
    corecore