Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Engineering

Numerical Modeling Of Periodic Composite Media For Electromagnetic Shielding Application, Dagang Wu, Rui Qiang, Ji Chen, Ce Liu, Marina Koledintseva, James L. Drewniak, Bruce Archambeault Jul 2016

Numerical Modeling Of Periodic Composite Media For Electromagnetic Shielding Application, Dagang Wu, Rui Qiang, Ji Chen, Ce Liu, Marina Koledintseva, James L. Drewniak, Bruce Archambeault

James K. Wu, M.D.

This paper describes a methodology to extract effective electrical properties for periodic composite medium. The extraction algorithm is based on a periodic finite-difference time-domain (FDTD) method. The results are compared with conventional mixing theories and 3D Fourier series expansion methods. Two results show satisfactory agreement. With the extracted effective permittivity and conductivity, one can readily use these parameters to study electrical properties of composite materials with arbitrary micro-geometry and the shielding effects of using composite materials.


A Unified Topological Approach To Electromagnetic Environmental Effects Protection, George H. Baker, J. Philip Castillo, Edward F. Vance Jun 1995

A Unified Topological Approach To Electromagnetic Environmental Effects Protection, George H. Baker, J. Philip Castillo, Edward F. Vance

George H Baker

The presentation recommends an approach for unifying electronic system protection designs for a wide spectrum of electromagnetic environments. A general electromagnetic topological construct is developed as the basis for a consistent shielding and terminal protection methodology. Spectral characteristics of multiple interfering electromagnetic sources, both internal and external, are described. Effects addressed include EMI/EMC, lightning, nuclear EMP, and RF weapons. Protection practices for individual effects are discussed and means for integrating these into a single protection topology.