Professional Documents
Culture Documents
by
A THESIS SUBMITTED
IN PARTIAL FULFILLMENT OF THE
REQUIREMENTS FOR THE DEGREE OF
MASTER OF SCIENCE
IN
ELECTRICAL ENGINEERING
May 1966
ABSTRACT
1. Introduction
3. Special Techniques
Appendices
Acknowledgments
Bibliography
1.
1.1 INTRODUCTION
been the object of intensive research during the past half century.
At first, analysis was carried out for specific networks with procedures
this decade which laid the foundation for the analysis and program
second, the well developed mathematical field [4] of linear graph theory
,!
of the through and across variables”, as Koenig [11] so quaintly
required of the user is no more than that required to g-ive the computer
program.
3.
which has been developed can be broken down into four basic operational
problem.
a multiple core load (CHAIN) job for processing. Each of the above
are stored on the IBM 1301 disk file. The user of the program will
need to be concerned only with the first and last links of the chain,
The first link, GENIN, is a compiler for the GENA network analysis
language. This link processes all input data, analyzes it for errors
in grammar and logic, and prints diagnostic information for the user.
Any error in the input language causes the deletion of execution. The
to assimilation of the input data, this link reduces the input connec¬
subsequent links.
1
GENA is an acronym for ^General Electrical Network Analyzer.
4.
for the complete solution of the network problem. In the event that
were formed in ACTR and solves the complex equations which result
when we let s = ju). The solution of this set of equations for the
2
state variables gives us all the information which is necessary for
calculation, the desired voltages and currents are stored for later
forward and back solutions are recursively executed until the variation
made, whichever occurs first. Note that there has been no return to
the equation forming link, as would have been required if the impe¬
2
This concept is discussed in greater detail in Section 2.1.
5.
The last link, GENOUT, controls the output for GENA. The pro¬
impedances, etc.).
time for AC analyses (in comparison with ECAP) and program flexibility
as well as the ease with which the equations can be formed. However,
x] = [A] x] + f]
formulations.
with a digital computer. In many ways, the linear graph and state
the classical solution methods is greater than that for the state
5 loop equations
4 node equations
2 state variables
introduction [12].
9.
4 loop equations
3 node equations
5 state variables
Figure 2.
10.
ANALYSIS PROBLEM
the tree.
(4) If the tree is not yet complete, then choose such inductors
tree.
ductor currents, since tree voltages and cotree currents may be arbi¬
entries in the circuit and cut-set matrices will always be zero. This
The four basic matrix equations which are used in the analysis
are:
V ^V V Capacitor
V - tV V Resistor
V
SP
E K. V.
1 i
i
Proportionality
SP
= z J.1 I.1 Relations 4)
cotree and tree, respectively. The matrices B and S are the fun¬
V
GC B
21 B
22 B B 0 V 0
23 24 SG
V
LC + B B B B B V = 0
31 32 33 34 35 CT
V
ISG B
41 B
42 B B
44 B V 0
43 V 45 RT
V 0
ISP B
51 B
52 B
53 B
54 B
55 V L
LT
«ac xso exs. V
la)
1
See Appendix I for a discussion of notational conventions.
12.
MM
I
VSP S
11 S
12 S S
14 S 0
13 15
I
VSG
S
21 S
22 S S S I 0
23 24 25 GC
I + S S S S S = 0
CT 31 32 33 34 35 I
LC
I
RT
0 S
42 S
43 S
44 S
45 I 0
SG
I
LT
0 0 S
53 S
54 S
55_ I
SP
0
2a)
I D 0 V
CT CT CT
V 0
LC
oat
D
LC hz
ms
p» cxn
D 0 v
cc cc
II 0
I D
LT
"LT„
•* =39
V D
RT RT 0 I
RT
I 0 D V
GC GC GC
CE. as «s
K V + K V + K V + K v + K V +
SP 11 CT 12 RT 13 LT 21 cc 22 GC K
23 V
LC
J I + J I + J I + J I + J I +
SP 11 CT 12 RT 13 LT 21 cc 22 GC J
23 I
LC
variables.
the state variables, the network analysis program solves only state
each term in particular matrices which are formed during the equation
capacitors.
!,
of pseudo-topological” matrices which describe the interaction of the
S
1
* S
35J11 35J12 S
35J13
N = - + S45J12 S
S
45J11
1
45J13
S S
55J12 1 + S55J13
55J11
S + S + S35J23
S
31 + S
35J21 32 35J22 S
33 S
34
X S
45J21
S
42 + S
45J22 S
43 + S
45J23 S
44
S
S
55J21 55J22 S
53 + S
55J23 S
54
(3) The inverse will exist except when the SJ .term on the
network.
voltage source we similarly restrict the input to the tree and the
sufficient for the writing of the state equations for a network, they
conductance currents;
resistor voltages;
16. .
formed to form the final matrix is such that each of the offending
which would not occur if the graph were nonseparable, thus allowing
If we have been able to form the state equations for the network
and ILC.
17.
Introduction
material is included.
matrix to the incidence matrix can be seen clearly through the use of
class modulo-3 which allow similar relation of the incidence and funda
Computational Procedure
incidence matrix for a directed graph, the user must prepare the data
in such a way that the first N columns of the incidence matrix corres
used. The present algorithm will allow the user to find the fundamental
physical reason for not allowing column operations other than exchange
criterion used for the preliminary list requires all voltage sources
other elements are placed in the tree with the following priorities:
those elements which cannot be tree branches are moved to leading posi¬
that the least desirable elements will always be those which are shifted
from the tree to the cotree. It is of interest to note that the re¬
row of the incidence matrix (the datum node row). We then convert
this reduced matrix to our new number base, with the following corres¬
pondences:
19.
-1
10 10 10
otherwise, search the column below the diagonal until the first non-
2
zero entry is found. Add this row to the diagonal row.
of the diagonal row. Note that the maximum number of additions of the
iv) . Examine the next diagonal term and repeat the above steps.
The resultant diagonal will consist of both l*s and 2!s. The
,,
final reduction to a unity matrix is simple, since any 2n term of the
M
diagonal can be changed to a ln by adding the row to itself. As a
maindering process, the resultant sums are carried as decimal sums until
If the diagonal element and all terms below it are zero, then the
column is not a tree branch, and the reduction fails. This property
able to do this because of the congruence relation between the two number
bases.
further, there is no round-off error. The reader will note that the
coded in FORTRAN.
procedure reported by So does not provide the user with a direct method
from the incidence matrix. The reader should note the logical connection
3 '
For a network of 20 nodes and 100 branches, the incidence, matrix
was formed, the proper tree was found, and the fundamental cut-set
matrix and its derived cut-set matrix. The beauty of the present
procedure.
22.
A DISCUSSION OF TECHNIQUES.
following section.
this method seemed quite powerful, since there would be no need for
was developed [1] and then implemented on the IBM 7040. Several
the AC problem.
since the major programming effort has been directed toward the
solution, except for the actual solution of the state variables, will
and variable extraction will be done in the same manner. The solution
for the analysis technique are that a simple triad relation (such as
Ohm's law) exist between the through and across variables. If the
Pi anning.
25 .
The following table gives the basic notational scheme which is used
in this thesis.
type (R,L,G,C) and the second denotes the position of the element
in the network (tree or cotree). Note that the second subscript has
not been specified in the case of voltage and current sources since
1
The standard notation for the fundamental cut-set or circuit matrix
equations
system, we have
have,
2
{[A]2 + CD [I] 3 X2] = -0) {[A] [B] + [C]} Fx]
hand side of equation (4), we may solve for X2]• Note that we may
X ]
l =
l [A]X ]
2 + [B]F ]
1 IC] F ]
2 • (5)
ACKNOWLEDGEMENTS
Thanks are also due Drs. 0. S. Burrus and L. E. Davis for their
BIBLIOGRAPHY