This website uses cookies to ensure you have the best experience. Learn more

Electrical Thevenin And Norton Essay

862 words - 4 pages

Basic Circuit Analysis
Name
Institutional analysis

Abstract
This report is about an experiment that is done to verify Thevenin’s theorem and Norton’s theorem. The verification is done by first determining the resistance of a circuit of resistances by determining the nodal voltages and nodal currents using Partsim Software. The measured currents and voltages are the used to determine the equivalent resistance of the circuit that is the used to determine the Thevenin voltage, Thevenin resistance and also the Norton circuit.
Introduction
Thevenin theorem states that it is possible to represent any linear power supply by using an ideal voltage source and single resistance that is connect ...view middle of the document...

Objective
The objective of this experiment was to establish the nodal voltage and the nodal currents in the given circuit using the Partsim software. From the measured nodal voltages and current, the Thevenin equivalent circuit and the Norton’s equivalent circuit were to be determined.
Procedure
The circue.it shown below was designed in Partsim which is an online software. Once the circuit was draw, the value of the R5 was determined by the student number. The supply voltage was taken to be 12V.

The basic circuits from the software was the used to determine the nodal currents and nodal voltages. An additional resistor was added to the design so as to ease the process of measuring the nodal and voltage and nodal currents. Once the parameters were measured and noted, they were used to calculate the overall equivalent resistance for resistors that are connected as bridge. The calculated resistance was then used to calculate the equivalent Thevenin circuit and equivalent Norton circuits (Leach, 1976).

Results
The source voltage was found to be 12V. A 1kΩ resistors was added to the design so that the nodal voltage and nodal current would be easily determined. The voltage at node R1 was found to be 10V. The results were summarised by the figure shown below.

Discussion
The voltage at resistor R1 node was found to be 10V. The addition of the 1kΩ led drop in voltage from the supply. This shows that the voltage drop across resistor is 2V and the remaining 10 voltage is fed to the resistor network that is comprises of R1, R2, R3, R4, and R5 (Leach, 1976).
The voltage drop across resistor R5 is given by
VR5 =...

Other Papers Like Electrical Thevenin And Norton

Electromagnetic Induction Essay

2622 words - 11 pages called the magnetic flux. Faraday attributed the electrical effects to a changing magnetic flux. The necessity of motion to produce a current is due to the fact that electromagnetic induction involves a time-varying magnetic field. The same effects can be produced by moving the coil toward and away from a motionless magnetic source. In either case, the key to producing the current is certainly the motion of the magnet or the wire. The magnetic

Us Pharmaceuticals of Korea Essay

3431 words - 14 pages Application Questions 554 Reference Notes 556 Case 15.1: Snow White Paper Company (1) – Managing Inbound Logistics 558 Case 15.2: Snow White Paper Company (3) – Handling Outbound Transport 559 Case 15.3: Norton India Ltd. – Managing Distribution Channels and Logistics 560 Case 15.4: Atlas India Ltd. – Setting up a Logistics System 562 Case 15.5: Healthcare Equipment Company – Clearing Import Consignments 565 16. International Sales and Distribution

Financial Project

5070 words - 21 pages , Wozniak assisted Jobs with the technical side of his job. Unbeknownst to either of them, this was the beginning of a partnership that would form the beginnings of Apple Computer Company. STEVE WOZNIAK AND STEVE JOBS Steve Wozniak’s passion for electronics stemmed from his father’s career as an engineer at Lockheed Martin (Wozniak, 2006). Wozniak formally studied electrical engineering at the University of Colorado at Boulder and De Anza

Definitions

3118 words - 13 pages [edit] Contemporary cybernetics began as an interdisciplinary study connecting the fields of control systems, electrical network theory, mechanical engineering, logic modeling,evolutionary biology and neuroscience in the 1940s. Electronic control systems originated with the 1927 work of Bell Telephone Laboratories engineer Harold S. Black on usingnegative feedback to control amplifiers. The ideas are also related to the biological work of Ludwig

Network Design Proposal

3120 words - 13 pages to an electrical rope and outlet for force. This undermines the portability point of interest of remote systems in numerous associations and homes. For any wired system associated with the Internet, firewalls are the essential security thought. Wired Ethernet center points and switches don't bolster firewalls. Be that as it may, firewall programming items like Zone Alarm can be introduced on the PCs themselves. Broadband switches offer equal

Financial Crisis Term Paper

4200 words - 17 pages . . 8.) Levin, Carl. "Wall Street and the Financial Crisis: The Role of Investment Banks (Sen. Carl Levin)." TheHill. The Hill, 27 Apr. 2010. Web. 03 May 2015. . 9.) Lewis, Michael (2011). Boomerang – Travels in the New Third World. Norton. ISBN 978-0-393-08181-7. 10.) Marshall, John. The Financial Crisis in the US: Key Events, Causes, and Responses. London: House of Commons Library, 2009. Web. . 11.) Smith, Yves. "The IMF's Big

Principles of Information Security

3241 words - 13 pages -mail programs prove to be fertile ground for computer viruses unless suitable controls are in place. The current software marketplace has several established vendors, such as Symantec Norton Anti-Virus and McAfee VirusScan, that provide applications to assist in the control of computer viruses. Among the most common types of information system viruses are the macro virus, which is embedded in automatically executing macro code used by word

Principles Of Information Security

3291 words - 14 pages ground for computer viruses unless suitable controls are in place. The current software marketplace has several established vendors, such as Symantec Norton Anti-Virus and McAfee VirusScan, that provide applications to assist in the control of computer viruses. Among the most common types of information system viruses are the macro virus, which is embedded in automatically executing macro code used by word processors, spread sheets, and database

Computer System Security

3291 words - 14 pages ground for computer viruses unless suitable controls are in place. The current software marketplace has several established vendors, such as Symantec Norton Anti-Virus and McAfee VirusScan, that provide applications to assist in the control of computer viruses. Among the most common types of information system viruses are the macro virus, which is embedded in automatically executing macro code used by word processors, spread sheets, and database

International Economies Theory

4241 words - 17 pages by Industry, 2002 Printing Furniture Apparel Wood Products Fabricated Metals Petroleum and Coal Transportation Equipment Machinery Chemicals Computer and Electronics Electrical Equipment and Appliances 5% 7% 8% 8% 14% 18% 28% 33% 36% 38% 38% Source: A. B. Bernard, J. B. Jensen, S. J. Redding, and P. K. Schott, “Firms in International Trade,” Journal of Economic Perspectives 21 (Summer 2007), pp. 105–130. CHAPTER 8 Firms in the

Freedom And Responsibility

2141 words - 9 pages Built within the Constitution of the United States are specifically defined freedoms that are guaranteed to all citizens. Conversely, with every constitutional freedom there comes a corresponding responsibility. On September 25, 1789, the state legislature’s twelve proposed amendments were transmitted by congress, the first two dealing with congressional representation and congressional pay. The following numbers three through twelve were

Related Essays

Andrew Tsai Essay

920 words - 4 pages , CA Jan. 2000 - Dec. 2000 Systems Analyst Analyzed competitive company's backup software such as Connected Online, Duocor, HotData, Norton Ghost, NovaStor, Power Quest Second Chance and Data Keeper, Retrospect Express, and Veritas Backup.Developed Graphical User Interface (GUI) for company's backup products.Performed analysis of software on different platforms. Created technical documentation for company backup software such as manuals, and

Landlord Tenant Law Essay

1538 words - 7 pages the wall, damaging the drywall and electrical socket. Roger Renter moved his items away from the leak but did nothing to mitigate the damages from the leaking roof. Larry Landlord came to Roger Renter's apartment to investigate the leak and found damage from not only the leak but also from the thrown baseball bat. Roger Renter states that the baseball bat damage was a direct result of Larry Landlord's inability to fix the leak. The first

Hidden Female Subordination In The 1950s

2597 words - 11 pages career and the children´s well-fare, but also that these women were ashamed to talk out loud about the disillusions in this prescribed role. ”`We´ve never had it so good`, became the slogan of the time” (Birmingham Feminist history Group 80) Feeling infantile guilty, surrounded by a dozen of electrical devices in her new kitchen, and prone to the male opinion, a woman wouldn´t dare to complain about her unsatisfied feelings or to express her urge

Medical Model And Psychodynamic Model Of Abnormality

2564 words - 11 pages criticism of psychosurgery is that the theoretical basis of the treatment is not well established and pre frontal lobotomies are known to cause severe side effects such as numbing of emotions. Electric Convulsive Therapy is also a form of treatment that the medical model use when the brain needs electrical stimulation, the therapist would apply mild electric shocks to specific parts of the brain. Because anti-depressants take 10-14 days to have an