Elimination of electromagnetic interference to receivers and sensitive equipment generated by switching systems
Adler, Richard W.
MetadataShow full item record
Recently installed equipment in naval receiving sites such as digital telephone switching systems, uninterruptible power supplies, laser printers etc., induce Electromagnetic Interference (EMI) into recetver systems, thus limiting the performance of the receiving site. EMI is injected into receiver systems by conducted, inductive and capacitive paths associated with poor compartment shielding, grounds, or cable shielding. In this thesis, the MITEL SX-20 automatic digital telephone switching system is studied as an EMI source. Temporal and spectral properties of EMI generated by the MITEL SX-20 system are examined over a frequency range of 0 to 100 MHz. The effectiveness of a Barrier, Filter and Ground architecture in containing/eliminating the generated EMI is tested under various operating conditions. Possible solutions are proposed for similar EMI sources.
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Ramp, Steven R.; Tang, Tswen Yung; Duda, Timothy F.; Lynch, James F.; Liu, Antony; Chiu, Ching-Sang; Bahr, Frederick L.; Kim, Hyoung-Rok; Yang, Ying-Jang (IEEE, 2004-10);A moored array of current, temperature, conductivity, and pressure sensors was deployed across the Chinese continental shelf and slope in support of the Asian Seas International Acoustics Experiment. The goal of the ...
Shi, Ronghua; Se, Xi Yang Ronald (Monterey, CA; Naval Postgraduate School, 2019-09);Verification of data-plane software is limited to verifying point properties such as bounded packet processing time or not misinterpreting malformed packet headers, which usually are chosen to illustrate the merits of some ...
Sawyer, Darren Antwon (Monterey, California: Naval Postgraduate School, 1992-09);The most widely used mechanism for access control to information systems is passwords. Passwords can be machine-generated using a list of words stored in a memory bank, machine-generated using a sophisticated algorithm to ...