注意:各項之間請以逗號分隔

例如 , 12/06/2019

例如 , 12/06/2019

注意:各項之間請以逗號分隔

例如 , 12/06/2019

例如 , 12/06/2019

排序方式:

49 結果
South Asia Industrial Webinar

2018 South Asia Industrial Webinar Series

The topics will cover system design issue and solution for Building Automation, Power Delivery and Test & Measurement. TI experts introduce the latest technology and innovation system reference design. Discover ways to enhance the time-to-market and create safer and efficient industrial systems.

工業應用;網路研討會

2018 TI 工業應用網路研討會系列

本系列研討會將包含六個主題,邀請多位技術專家針對現今最熱門的建築安全、建築自動化、電力傳輸、馬達驅動與控制、工廠自動化及測試與測量等應用領域分享實務與設計上的知識與經驗。德州儀器將展示 2018 年各種最新工業應用解決方案,協助您輕鬆打造更具智慧高效的工業系統。

Test & Measurement and Motor Drives

2019 TI 量測 x 馬達技術網路研討會系列

無論是測試與量測系統或是馬達元件,無不講究高精度與高效設計。德州儀器 ( TI ) 量測 x 馬達技術線上直播網路研討會,廣聚多位技術專家,針對測試與量測系統的資料截取系統 (DAQ)、 半導體製造設備的電壓/電流測試與電池測試設備等系統,詳細分享系統設計的實務案例。馬達專家則針對無刷 DC 馬達元件、Servo 驅動器控制模組與交流驅動功率模組,剖析節能、精準控制的設計指南。從理論介紹到實務驗證,深入剖析最新技術趨勢! 

Anti-tamper Techniques to Thwart Attacks on Smart Meters

Non-technical losses (“theft”) account for billions of dollars of revenue loss for utility providers around the world as individuals are able to hack meters to slow or stop the accumulation of energy usage statistics. This loss has driven increased requirements for enhancing the protection designed into new smart meters.  This training session will discuss different methods of attacking smart meters and how TI’s analog portfolio can be used to detect or even prevent these attacks. In one scenario magnets are used to saturate any transformers present in the system.

Anti-tamper Techniques to Thwart Attacks on Smart Meters— Hardening a meter against magnetic tamper attacks: Transformer Based High-Side Power Supplies

日期:
2017年 4月 12日

時間長度:
03:12
This module covers the advantages and disadvantages of using a transformer-based power supply to power the high-side of the AMC1304
South Asia Industrial Webinar

Demystifying circuit design with Precision DAC

The presentation addresses the Precision DAC Architecture overview, DAC spec parameters and the theory of operation & Design example. All the information is importer for engineer when work on the system design.

South Asia Industrial Webinar

Design considerations for USB type-C power delivery

The presentation addresses the design consideration of USB Type-C power delivery. USB Type-C is the new trend of Industrial, automotive and personal electronics devices. In the training, audience will be able to learn more about USB Type-C power delivery (PD) requirement and understand architecture of USB Type-C PD, AC/DC power source.

Detecting case tamper attacks using inductive switches

The first line of defense against tampering by bypassing current, reversing connections, and disconnecting leads is the meter case. Due to this, it is common for utilities to require some form of intrusion detection system to detect when someone opens a case.  In this section, we will cover how to detect someone trying to open the case of a meter.

Detecting magnetic tampering using hall-effect sensors

For anti-tampering, it is common to try to detect the presence of a strong magnet. In this section, we will cover the use of hall sensors for low-power detection of strong magnetic fields in three dimensions.  Details on our magnetic tamper detection reference design, TIDA-00839, will be provided as well as some of the design considerations that were kept in mind when creating this reference design.  

Dual active bridge DC:DC power stage for a level 3 (fast) EV charging station (pile)

日期:
2019年 6月 27日

時間長度:
01:04:25
Bi-directional, dual active bridge reference design for level 3 electric vehicle charging stations.
South Asia Industrial Webinar

Environmental sensor for building automation design

Building automation system is a communication network infrastructure that manages the building service. This training will introduce the environmental sensor black diagram, key reference design and the solution for IC temperature sensor, power saving analog temperature sensor, digital temperature sensor … etc.

Hardening a meter against magnetic tamper attacks

In this section, we will cover how to harden a meter against these magnetic tamper attacks by using shunts for current sensors. For poly-phase implementations, I will go over how to use isolated delta sigma modulators to add the necessary isolation to use shunt current sensors and create magnetically immune poly-phase energy measurement systems. The TIDA-00601 and TIDA-01094 reference designs, which show how to implement a poly-phase isolated shunt measurement system, will be discussed as well as the associated AMC1304 high-side power supplies used in these designs.

How High-Voltage Isolation Technology Works

Want to understand how high-voltage isolation technology works? Watch and learn about reliability testing for isolation. Filmed in TI's high-voltage lab, this series of videos will focus on capacitive isolation structure, working voltage reliability, withstand voltage capability, methods for testing reliability, and more.

How High-Voltage Isolation Technology Works – Capacitive Structure

日期:
2018年 3月 1日

時間長度:
06:17
Want to understand how high-voltage isolation technology works? Watch and learn about TI's capacitive isolation structure.

How High-Voltage Isolation Technology Works –Reliability Testing

日期:
2018年 3月 1日

時間長度:
09:49
Want to understand how high-voltage isolation technology works? Watch and learn about reliability testing for isolation.

How High-Voltage Isolation Technology Works –Surge Testing

日期:
2018年 3月 1日

時間長度:
07:57
Want to understand how high-voltage isolation technology works? Watch and learn about surge testing for isolation.
South Asia Industrial Webinar

Introduce high power DC/DC conversion design: comparison of PSFB and FB-LLC

The “conventional wisdom” is that the Phase Shifted Full Bridge (PSFB) topology is the best choice for high power DC/DC converter applications. However, the “conventional wisdom” has been challenged by the users who are choosing the Full Bridge LLC (FB-LLC) topology for applications where we would normally suggest the PSFB topology. The speaker provides a clear comparison between the two typologies and tries to indicate which is best in a given application.

Introduction

This section covers what is meter tampering, why is this a problem for utility providers, and some common ways a meter is tampered.

Isolated Bias Power Supply Architecture and Topology Trade-offs for HEV/EVs

日期:
2019年 7月 29日

時間長度:
28:36
Isolated Bias Power Supply Architecture and Topology Trade-offs for HEV/EVs
South Asia Industrial Webinar

Overview of commonly-used interface for industrial application

The training provides a very comprehensive introduction of the commonly-used interfaces including RS-485, RS-422, ProfiBus, RS-232, IO-Link, CAN and LIN. These interfaces are used in the application of Factory Automation and some other industrial applications. For the engineer who needs to deal with interface system design, this is a very useful training.

49 結果
arrow-topclosedeletedownloadmenusearchsortingArrowszoom-inzoom-out arrow-downarrow-uparrowCircle-leftarrowCircle-rightblockDiagramcalculatorcalendarchatBubble-doublechatBubble-personchatBubble-singlecheckmark-circlechevron-downchevron-leftchevron-rightchevron-upchipclipboardclose-circlecrossReferencedashdocument-genericdocument-pdfAcrobatdocument-webevaluationModuleglobehistoryClockinfo-circlelistlockmailmyTIonlineDataSheetpersonphonequestion-circlereferenceDesignshoppingCartstartoolsvideoswarningwiki