2014
DOI: 10.14738/tmlai.25.430
|View full text |Cite
|
Sign up to set email alerts
|

Ultra-fast Lithium cell charging architecture for Mission Critical Applications

Abstract: This research presents design and implementation of the ultra-fast parallel lithium charging architecture with an embedded algorithm using an active PWM charge pump supported by a hybrid control mechanism consisting of Temperature, humidity and current sensors. The new architecture guaranties the ultra-fast parallel charging cycles of lithium cells without lifespan reduction due to possible overheat side effects in mission critical applications.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2015
2015
2015
2015

Publication Types

Select...
6

Relationship

6
0

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 5 publications
0
7
0
Order By: Relevance
“…While the nonsafety applications are supported through a different set of protocols. The Network, Transport layer services for the nonsafety applications in VANET are supported or provided by IPV6, TCP, and UDP [27]- [29]. …”
Section: Layered Architecture For Vanetmentioning
confidence: 99%
“…While the nonsafety applications are supported through a different set of protocols. The Network, Transport layer services for the nonsafety applications in VANET are supported or provided by IPV6, TCP, and UDP [27]- [29]. …”
Section: Layered Architecture For Vanetmentioning
confidence: 99%
“…The attacks that are common to the WEP protocol are: Korek Chopchop Attack: In this form of attack, the attacker can decrypt the last s bytes of the plaintext of an encrypted packet by transmitting s* 128 number of packets on the network [13] [14]. This attack does not show the root key as shown in figure.…”
Section: Common Attacks On Wepmentioning
confidence: 99%
“…The WPA Encryption Process is explained in Figure 5 below. Figure 5 explains the WPA encryption process, where a Temporal Key Integrity Protocol (TKIP) is used by WPA for data encryption [12]- [14] [18]. This eliminated the use of the same key in encryption, a different key is generated randomly for every data packet, and a 128-bit key is used to encrypt the data packet.…”
Section: Wireless Wpa (W)mentioning
confidence: 99%
“…E-Government: Using the state's duty is to fulfill against citizens and services with citizens, state that the duties and responsibilities of the electronic communications and computing environments in a continuous and safe execution of the M state experienced in the real-life state for more efficient operation of e-government in terms of accessibility wireless internet infrastructure mobile applications are moving to laptops [14] [15]. The development of service models is shown on the Figure 1 below.…”
Section: M-governmentmentioning
confidence: 99%