Double Revolving Field Theory of Single Phase Induction Motors

Manish Kumar Saini
Updated on 03-Nov-2023 14:11:11

48K+ Views

Operating Principle of Single-phase Induction MotorA single-phase induction motor consists of a squirrel cage rotor and a stator carrying a single-phase winding. When a single-phase AC supply is fed to the stator winding, a pulsating magnetic field (not the rotating) is produced. Under these conditions, the rotor does not rotate due to inertia. Hence, a single-phase induction motor is inherently not self-starting, but requires some auxiliary starting means.If the stator winding of a single-phase induction motor is excited and the rotor is rotated by an auxiliary means and the starting device is then removed, the motor continues to rotate in ... Read More

IEEE 802.3 and Ethernet

George John
Updated on 03-Nov-2023 13:56:49

45K+ Views

Ethernet is a set of technologies and protocols that are used primarily in LANs. It was first standardized in 1980s by IEEE 802.3 standard. IEEE 802.3 defines the physical layer and the medium access control (MAC) sub-layer of the data link layer for wired Ethernet networks. Ethernet is classified into two categories: classic Ethernet and switched Ethernet.Classic Ethernet is the original form of Ethernet that provides data rates between 3 to 10 Mbps. The varieties are commonly referred as 10BASE-X. Here, 10 is the maximum throughput, i.e. 10 Mbps, BASE denoted use of baseband transmission, and X is the type ... Read More

Remove JSON Element in JavaScript

AmitDiwan
Updated on 03-Nov-2023 13:48:38

25K+ Views

Let's say the following is our JSON string −var details = [    {       customerName: "Chris",       customerAge: 32    },    {       customerName: "David",       customerAge: 26    },    {       customerName: "Bob",       customerAge: 29    },    {       customerName: "Carol",       customerAge: 25    } ]To remove JSON element, use the delete keyword in JavaScript.ExampleFollowing is the complete code to remove JSON element −var details = [    {       customerName: "Chris",       ... Read More

Degree of Vertex of a Graph

Mahesh Parahar
Updated on 03-Nov-2023 13:39:03

44K+ Views

It is the number of vertices adjacent to a vertex V. Notation − deg(V). In a simple graph with n number of vertices, the degree of any vertices is − deg(v) = n – 1 ∀ v ∈ G A vertex can form an edge with all other vertices except by itself. So the degree of a vertex will be up to the number of vertices in the graph minus 1. This 1 is for the self-vertex as it cannot form a loop by itself. If there is a loop at any of the vertices, then it is not a ... Read More

Half Wave Rectifier

Manish Kumar Saini
Updated on 03-Nov-2023 13:14:13

31K+ Views

Half Wave Rectifier is a diode circuit which is used to transform Alternating Voltage (AC Supply) to Direct Voltage (DC Supply). A single diode is used in the HWR circuit for the transformation of AC to DC. Half Wave Rectifier circuit allows the one – half cycle of the AC Supply waveform to pass and blocks the other half cycle. Half Wave Rectifier Circuit Diagram The circuit of HWR consists of following three main components − A Diode A Transformer A Load (may be a Resistance) Working of HWR Circuit Positive ... Read More

Differences Between Digital and Analog System

Kiran Kumar Panigrahi
Updated on 03-Nov-2023 13:06:53

35K+ Views

Digital as well as Analog Systems, both are used to transmit signals from one place to another like audio/video. Digital systems use binary format as 0 and 1, whereas analog systems use electronic pulses with varying magnitude to send data. Read through this article to find out more about digital and analog systems and how they are different from each other. What is a Digital System? A system of components like a computer which uses discrete time signals to operate is called a digital system. Digital systems uses such signals that have square shaped waveforms. Digital systems first accept the ... Read More

Create a Shared Directory for All Users in Linux

Pradeep Elance
Updated on 03-Nov-2023 03:46:34

38K+ Views

When multiple users need access to the same set of directories of files then we need to create shared folders to be used by the users. In Linux there is concept of users and groups which can be given certain level of permissions that will enable them to share the data. Below are the steps how to create the shared folders where users can and update the files individually.Step 1 − Create the folder to be sharedAssuming we are setting up the shared folder from scratch, lets create the folder. The -p will create the directory and would ignore any ... Read More

The Diffie-Hellman Key Exchange

Satish Kumar
Updated on 03-Nov-2023 03:44:26

72K+ Views

What is Diffie-Hellman Key Exchange (exponential key exchange)? The Diffie-Hellman key exchange (also known as exponential key exchange) is a method for securely exchanging cryptographic keys over an insecure channel. It is a fundamental building block of many secure communication protocols, including SSL/TLS and SSH. The Diffie-Hellman key exchange works by allowing two parties (Alice and Bob) to agree on a shared secret key over an insecure channel, without any other party being able to intercept the key or learn anything about it. The key exchange involves the following steps − Alice and Bob agree on two large prime ... Read More

What is Lex?

Ginni
Updated on 03-Nov-2023 03:39:01

29K+ Views

It is a tool or software which automatically generates a lexical analyzer (finite Automata). It takes as its input a LEX source program and produces lexical Analyzer as its output. Lexical Analyzer will convert the input string entered by the user into tokens as its output.LEX is a program generator designed for lexical processing of character input/output stream. Anything from simple text search program that looks for pattern in its input-output file to a C compiler that transforms a program into optimized code.In program with structure input-output two tasks occurs over and over. It can divide the input-output into meaningful ... Read More

The Bluetooth Protocol Architecture

Moumita
Updated on 03-Nov-2023 03:33:56

49K+ Views

Bluetooth network technology connects mobile devices wirelessly over a short-range to form a personal area network (PAN). The Bluetooth architecture has its own independent model with a stack of protocols, instead of following the standard OSI model or TCP/IP model. The protocols in the Bluetooth standard can be loosely grouped into the physical layer, data link layer, middleware layer, and application layer as shown in the following diagram − Protocols in the Bluetooth Protocol Architecture Physical Layer − This includes Bluetooth radio and Baseband (also in the data link layer. ... Read More

Advertisements