• Keine Ergebnisse gefunden

Consistent initial values for DAE systems in circuit simulation

N/A
N/A
Protected

Academic year: 2022

Aktie "Consistent initial values for DAE systems in circuit simulation"

Copied!
32
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Consistent initial values for DAE systems in circuit simulation

D. Estevez Schwarz

Abstract

One of the di culties of the numerical integration methods for dieren- tial-algebraic equations (DAEs) is computing consistent initial values be- fore starting the integration, i.e. , calculating values that satisfy the given algebraic constraints as well as the hidden constraints if higher index prob- lems are considered.

This paper presents an approach to calculate consistent initial values for index-2 DAEs starting up from possibly inconsistent ones. Firstly, the idea is exposed for linear DAEs and then it is shown how the results can be applied to those systems arising from modied nodal analysis (MNA) in circuit simulation. This article starts up from 8] and 6]. Several denotations and results we use were introduced there in more detail.

Key words:

Consistent initial values consistent initialization dierential- algebraic equation DAE index circuit simulation modied nodal analysis MNA structural properties.

AMS Subject Classication:

94C05, 65L05.

1 Introduction

Roughly speaking, the problem of determining consistent initial values for die- rential-algebraic equations can be described as follows. For ordinary dierential equations, initial values have to be prescribed for all variables to determine a unique solution. However, dierential-algebraic equations consist of dierential equations coupled with derivative-free equations, i.e., not all components appear in dynamic form. Indeed, some of them are determined by algebraic constraints.

In Section 2 a convenient characterization of consistent initial values is intro- duced.

One approach to determine consistent initial values is to locate a selection of variables for which we may prescribe initial values and to construct a nonsingu- lar system that provides the values for the remaining ones. In this context, we have to consider two problems:

1. The selection of variables is not arbitrary.

(2)

2. The values that are assigned to the selected variables have to be chosen in such a way that the nonlinear system is solvable.

In 6] it was analyzed how to construct a nonsingular system and how to treat (1) for systems arising from circuit simulation by means of modied nodal anal- ysis, while (2) was not discussed. Nevertheless, the practical realization of that approach leads to new insights, provided that the values from (2) are suitably chosen. These results will be presented in the present paper.

To illustrate the approach before considering the special systems arising from circuit simulation, we describe the basic ideas for linear DAEs in Section 3.

Then, in Section 4 we introduce the equations of the modied nodal analysis.

The structural properties of these systems, which were pointed out in 8] and 6], are summarized in Section 5. The new results are presented in Section 6.

Since, in circuit simulation, the operating point is frequently used for starting the integration, it is separately analyzed in Section 6.1. In Section 6.2 the approach is described for a more general case. In practice, the values obtained in the Sections 6.1 and 6.2 can be calculated by solving relatively small linear systems as described in Section 6.3.

Finally, in Section 7 it is shown how this approach may be combined with an initialization strategy that takes into account possible initialization preferences of the user of a simulation package.

2 About consistent initial values for DAEs

We consider dierential-algebraic equations, i.e. , equations of the form

f(x0 x t) = 0 (2.1)

wheredxdf0 is singular. In this article,dxdf0 is assumed to have a constant nullspace.

Note that, if we dene a projectorQontokerdxdf0 andP :=I;Q, then equation (2.1) may be written as

f(Px0 x t) = 0:

Denition 2.1

A vector x0 2Rm is a consistent initial value of (2.1) if there exists a solution of (2.1) that fullsx(t0) =x0.

Taking into account that the singularity of dxdf0 implies that (2.1) contains some algebraic equations, a consistent initial value has to full precisely those alge- braic equations. Moreover, the dierentiation of these algebraic equations may lead to further algebraic equations, called hidden constraints, which a consistent initial value has to full, too. This fact is closely related to the index concept.

Actually, we are also interested in the corresponding values of the derivatives appearing in the DAE, i.e., in the values ofPx0 if P is dened asP :=I;Q for a projectorQontokerdxdf0.

(3)

Denition 2.2

A vector(x0 Py0) is a consistent initialization of (2.1) ifx0 is a consistent initial value and (x0 Py0) fulls the equation f(Py0 x0 t0) = 0.

For simplicity, we will rst present the approach for linear dierential-algebraic equations (DAEs). In the course of the article, it will be shown how it can be extended to those quasi-linear systems obtained by modied nodal analysis (MNA).

3 An overview of the approach for linear DAEs

For a short outline of the main ideas presented in this article, the tractability index and the spaces related to its denition are introduced.

Consider a linear DAE of the form:

Ax

0+Bx=q(t) (3.1)

whereAis singular.

For the tractability index we deneN := kerAandS:=fz: Bz2imAg.

Denition 3.1

The DAE (3.1) is called index-1-tractable if the matrix A1:=

A+BQis nonsingular for a constant projector QontoN.1

Remarks:

1. The matrixA1 is nonsingular if and only ifN\S =f0g. 2. The denition does not depend on the choice of the projectorQ.

For the denition of the index two we deneN1:= kerA1andS1:=fz: BPz2 imA1gforP := (I;Q).

Denition 3.2

The DAE (3.1) is called index-2-tractable if 1. it is not index-1-tractable,

2. A2:=A1+BPQ1 is nonsingular for a projectorQ1 ontoN1.2

Remarks:

1. The matrixA2is nonsingular if and only ifN1\S1=f0g. 2. The denition does not depend on the choice of the projectorQ1.

Denition 3.3

In the following, the canonical projectorQ1:=Q1A;12 BP onto

N

1 alongS1 is considered.

1cf. 10].

2cf. 10].

(4)

In the index-2 case the spaceN\Srepresents all the components that are deter- mined neither by a dierential nor by an algebraic equation. These components can be determined only by inherent dierentiation.

Furthermore, for index-2 equations hidden constraints appear if we derive a part of the system's equations. This implies that an initial value has to be chosen in such a way that not only the system's equations, but, additionally, the hidden constraints have to be fullled.

An ecient approach3 to calculate a consistent initialization for index-2 DAEs attl consists in solving the system4:

Ayl+Bxl = q(tl) (3.2)

PP

1(xl;) +PQ1yl;PQ1A;12 q0(tl) +Qyl = 0 (3.3) for an arbitraryandP1:=I;Q1.

Note thatPP1(xl;) = 0 xes the dynamic components,PQ1yl=PQ1A;12 q0(tl) describes the hidden constraints, andQyl= 0 precisely xes the values we are not interested in, obtaining a nonsingular system.

The results presented in 8] imply that, for nonlinear circuits, this approach has the disadvantage that the projectorsPP1andPQ1depend on the solution.

Nevertheless, in 6] it was pointed out how the method could be reformulated in terms of other constant projectors.

In this article we will suppose that we already know values (xl yl) that full the equations of the system (3.1) attlthat are not necessarily consistent5, i.e., which probably do not full the hidden constraints.6 Without loss of generality, we also assume thatQyl= 0 is fullled.

We denote by (xl yl) the consistent value we obtain from (3.2) - (3.3) by setting

:=xl and dene:

x

+l :=xl;xl y

l+=yl;yl: (3.4)

From (3.2) - (3.3) it follows that:

Ay

+l +Bx+l = 0 (3.5)

PP

1 x

+l +PQ1y+l +PQ1yl;PQ1A;12 q0(tl) +Qyl = 0 (3.6) i. e., we can calculate the value (x+l yl+) from that system. Note that (3.6) implies

PP

1 x

+l = 0 (3.7)

PQ

1 y

l+ = PQ1A;12 q0(tl);PQ1yl (3.8)

Qy

l+ = 0: (3.9)

3cf. 7]. Note that this approach can also be extended to some nonlinear cases.

4We introduce the indexlto distinguish the values at an arbitrary timetlfromt0, which represents the time we start the integration process.

5These values may be known from an integration process.

6In the following we consider only the index-2 case, because in the index-1 case a value that ful ls the system's equations is automatically consistent.

(5)

The task of determining values for (x+l yl+) by making use of (3.5) - (3.6) may look very similar to the direct computation of (xl yl) from (3.2) - (3.3), but, in fact, if we know a description of theN\S-components and/or the expressions for the equations corresponding to (3.8) and (3.9), the calculation costs can be reduced considerably.

From the equations (3.5) - (3.9) it can be deduced thatx+l 2N\S. This follows because (3.5) impliesx+l 2S and, if we multiply (3.5) byPQ1A;12 , we obtain

PQ

1 x

+l = 0. Taking into account (3.7), x+l 2N has to be given.

This property will be of special interest with regard to circuit simulation.

Remarks

1. At rst glance, this approach seems not to be very helpful, because a value that fulls the system's equations has to be given a priori. Fortunately, in circuit simulation we can take advantage of the structural properties that guarantee the existence of the DC operating point to compute such a value.

2. The circuit simulation by means of MNA leads to quasi-linear DAEs. The described projectors, spaces and index denitions of the tractability in- dex can be extended to nonlinear systems (cf. 10]). The denitions for the equations arising from circuit simulation by means of modied nodal analysis were discussed in detail in 8]. There it was proved that, under certain restrictions on the controlled sources (see Tables 5.1 and 5.2), the spaceN\S is constant and theN\S-component appears only in linear relations of the DAE. Therefore, the above approach can be successfully extended.

3. In 6] it was already pointed out how to transcribe topologically the equa- tions that describe the hidden constraints analogously to (3.8) with the aid of constant projectors. Nevertheless, the topological initialization pre- sented there is nally based on the idea of xing only the dynamic com- ponents and calculate the values for the remaining variables by means of the system's equations. This approach has the advantage that no specic (xl yl) has to be given, but the disadvantage that the obtained values depend on the choice of the variables for which initial values have been prescribed.

4. In the course of this article it will be shown that an electrical explanation for the rearrangement from (xl yl) to (xl yl) can be given.

4 The MNA equations

Let us analyze the DAE system obtained by the application of the MNA from lumped networks containing nonlinear and possibly time-variant resistances, capacitances, inductances, independent voltage and current sources, and some specic controlled sources.

(6)

We denote byqandthe charge associated with the capacitances and the uxes associated with the inductances, byjLandjV the current vector of inductances and voltage sources and byethe vector of node potentials.

On the other hand, i(), and v() represent functions of current and voltage sources. In this paper, we will assume special prerequisites for the controlled sources.

Analogously to 8], n-terminal resistances, capacitances and inductances are completely described by (n;1) currents entering the (n;1) terminals and then (n;1) branch voltages across each of these (n;1) terminals and the reference terminaln.

To write down the MNA 7 equations, we split the reduced incidence Matrix A into the element-related incidence matrices A = (ACALARAVAI), where

AC, AL, AR, AV, and AI describe the branch-current relation for capacitive branches, inductive branches, resistive branches, branches of voltage sources and branches of current sources, respectively.

If we dene

C(u t) := @q(u t)

@u q

0t(u t) := @q(u t)

@t

L(j t) := @(j t)

@j

0t(j t) :=@(j t)

@t

the DAE system we obtain from networks by the conventional MNA reads

ACC(ATCe t)ATCde

dt

+ACqt0(ATCe t) +ARr(ATRe t)

+ALjL+AVjV +AIi() = 0 (4.1)

L(jL t)djL

dt

+0t(jL t);ATLe = 0 (4.2)

ATVe;v() = 0: (4.3) Later on we will also needG(u t) :=@r@u(ut).

We rst analyze the network with respect to the conventional MNA and, af- terwards, extend the results to the systems obtained by charge-oriented MNA.

These systems are8:

ACdq

dt

+ARr(ATRe t) +ALjL+AVjV +AIi() = 0 (4.4)

d

dt

;ATLe= 0 (4.5)

ATVe;v() = 0 (4.6)

q;qC(ATCe t) = 0 (4.7)

;L(jL t) = 0: (4.8)

7A detailed discussion on how we set up the system's equations can be found in 8] and 12].

8cf. again 8] and 12].

(7)

Analogously to 8] and 6], we suppose that the capacitance matrixC(ATCe t), inductance matrix L(jL t), and conductance matrix G(ATRe t) of all capaci- tances, inductances and resistances, respectively, are positive denite9.

We will also make use of the fact that the reduced incidence matrix (ACALARAV) has full row rank and thatAV has full column rank, because cutsets of current sources only and loops of voltage sources only are forbidden (cf. 18], 8]).

5 Index analysis and consistent initialization for circuit simulation

5.1 Some denitions and results

In this section we repeat some of the results presented in 8] and 6] concerning the index of the DAE system and the expressions for the hidden constraints in terms of appropriate projectors. To this end, we need the following denitions and results.

Denition 5.1

To characterize the topological properties of the network, we dene the projectors QC,QV;C, QV;C, and QR;CV onto kerATC, kerATVQC, kerQTCAV, and kerATRQCQV;C, respectively.

Note thatQCRV :=QCQV;CQR;CV is a projector onto ker(ACARAV)T. The complementary projectors will be denoted byP :=I;Q, with the cor- responding subindices.

Denition 5.2

1. An L-I cutset is a cutset consisting of inductances and/or current sources only.

2. A C-V loop is a loop consisting of capacitances and voltage sources.

In 8] , 18] the following was shown to hold:

Lemma 5.3

1. If the network does not contain L-I cutsets, then QCRV = 0.

2. If the network does not contain C-V loops, then QV;C= 0.

In this article, we suppose that the controlled sources that form part of the network full the conditions exposed below in the Tables 5.1 and 5.2.

Regarding equations (5.3), (5.5), and (5.7) from Table 5.2, the assumptions made for the controlled current sources imply that

QTCRVAIi((ACAVAR)Te jL jV t) =QTCRVAItit (5.9)

9Of course, the same restriction on the positive de niteness of the conductance matrix from Corollary 2.2 of 8] can be made here. Therefore, for the resistances with incidence nodes that are connected to each other by capacitances and/or voltage sources, no positive de niteness of the corresponding conductance matrix has to be assumed.

(8)

If we consider the element-related splitting of QV;C, i. e.,

QV;C= ( QV;C)t

( QV;C)contr:

then we can summarize the prerequisites we assume for the controlled volt- age sources as follows:

QTV;Cv(ATe dq(ATCe t)

dt

jL jV t) = QTV;Cvt(t) (5.1)

v(ATe dq(ATCe t)

dt

jL jV t) = v(ATCe jL t) (5.2) for a suitable functionvand for a vectorvt(t) that contains the functions of independent voltage sources and zeros instead of the functions of controlled voltage sources. Analogously as in 8] and 6], in the following we will drop the index *.

Table 5.1: Condition for controlled voltage sources

is always fullled. Thus, we generally assume that the controlled sources do not form part of the C-V loops or L-I cutsets.

To shorten denotations we write

i((ACAVAR)Te jL PV;CjV t) (5.10) when we do not distinguish between (5.4), (5.6), and (5.8).10

Lemma 5.4

The matrices

H

1(ATCe t) := ACC(ATCe t)ATC+QTCQC

H

2 := QTCAVATVQC+QTV;CQV;C

H

3 := ATVQCQTCAV + QTV;CQV;C

H

4(ATCe t) := QTV;CATVH1;1(ATCe t)AVQV;C+ PTV;CPV;C

H

5(jL t) := QTCRVALL;1(jL t)ATLQCRV +PTCRVPCRV

H

6 := QTV;CATVAVQV;C+ PTV;CPV;C

H

7 := QTCRVALATLQCRV +PTCRVPCRV

are nonsingular.11

10These assumptions can be transcribed into topological criteria analogously as it was done in 8]. The result would be similar, with the only dierence that now the branch potentials of branches that form part of L-I cutsets would not be allowed to control controlled current sources.

11cf. 8], 6].

(9)

For controlled current sources we suppose that at least one of the following characterizations holds:

(a)

QTCRVAIi(ATe dq(ATCe t)

dt

jL jV t) = QTCRVAItit (5.3)

i(ATe dq(ATCe t)

dt

jL jV t) = ia(ATCe ATVe jL t) (5.4) for a suitable functionia.

(b)

QTCAIb = 0 (5.5)

i(ATe dq(ATCe t)

dt

jL jV t) = ib((ACAVAR)Te jL PV;CjV t)(5.6) for a suitable functionib.

(c)

QTV;CQTCAIc = 0 (5.7)

i(ATe dq(ATCe t)

dt

jL jV t) = ic((ACAVAR)Te jL t) (5.8) for a suitable functionic.

Table 5.2: Conditions for controlled current sources In 8] the following result was obtained:

Theorem 5.5

Consider lumped electric circuits satisfying the assumptions of the Tables 5.1 and 5.2. Then it holds:

1. If the network contains neither L-I cutsets nor controlled C-V loops, then the conventional MNA leads to a DAE system with index-1 and the con- straints are only the explicit ones:

QTCARr(ATRe t) +ALjL+AVjV

+AIaciac((ACARAV)Te jL t) = 0 (5.11)

ATVe;v(ATCe jL t) = 0: (5.12) 2. If the network contains L-I cutsets or C-V loops, then the conventional MNA leads to a DAE system with index-2. With regard to the constraints, we distinguish the following three possibilities.

(a) If the network does not contain an L-I cutset (but contains controlled C-V loops), then the constraints are the explicit ones, (5.11) and

(10)

(5.12), and, additionally, the hidden constraint:

QTV;CATVH1;1(ATCe t)PTC

ACqt0(ATCe t) +ARr(ATRe t) +ALjL

+AVjV +AIi((ACARAV)Te jL PV;CjV t)

+ QTV;Cdvt

dt

= 0:(5.13) (b) If the network does not contain controlled C-V loops, but contains

L-I cutsets, the constraints are the explicit ones, (5.11) and (5.12), and, additionally, the hidden constraint:

QTCRV ALL;1(jL t);ATLe;0t(jL t)+AItdit

dt

= 0: (5.14) (c) If the network contains L-I cutsets and C-V loops, then the con- straints are the explicit ones, (5.11) and (5.12), and the hidden ones (5.13) and (5.14).

Remark:

In 8] it was proved that the hidden constraint (5.13) resulted from

QTV;CATVdedt

= QTV;Cdvt

dt

(5.15) and that (5.14) arose from

QTCRV ALdjL

dt

+AItdit

dt

= 0: (5.16)

For the sake of simplicity, we will sometimes drop the arguments of the H matrices in the following and write a dot if they are not constant.

In 6] it was shown that a splitting of the system can be performed in such a way that consistent initial values can be calculated successively as described below.

Corollary 5.6

Let the values(PCe0 jL0) be given. If the network contains con- trolled sources that full the conditions of the Tables 5.1 and 5.2, we can deter- mine consistent initial values for the system (4.1)-(4.3) gradually.

We split e0 =PCe0+QCPV;Ce0+QCQV;CPR;CVe0+QCQV;CQR;CVe0

andjV0= QV;CjV0+ PV;CjV0, and obtain the corresponding consistent values from

PCe0 := PCe0+PCAVQV;CH6;1QTV;C;vt(t0);ATVPCe0

jL0 := jL0+ATLQCRVH7;1QTCRV ;;AItit(t0);ALj0L

QCPV;Ce0 := QCH2;1QTCAVPTV;C;;ATVPCe0+v(ATCe0 jL0 t0) whereas the value ofQCQV;CPR;CVe0 can be obtained by solving the equation

PTR;CVQTV;CQTCARr(ATR(PC+QCPV;C+QCQV;CPCRV)e0) +ALjL0+AIaia(ATCe0 ATVe0 jL0 t0)

= 0:

(11)

Then we calculate

PV;CjV0 := ;H3;1ATVQCPTV;CQTCARr(ATRe0 t0) +ALjL0+AIa ciac((ACAVAR)Te jL t)

:

Next, we can determine the remaining values by means of

QCRVe0 := ;;QCRVH5;1()QTCRV

ALL;1(jL0 t0)ATL(PC+QCPV;C+QCQV;CPR;CV)e0

;ALL;1(jL0 t0)0t(jL0 t0) +AItdit

dt

(t0)

QV;CjV0 := ;H4;1() QTV;CATVH1;1()PTC ACqt0(ATCe0 t0) +ARr(ATRe0 t0) +ALjL0+AVPV;CjV0+AIi((ACAVAR)Te0 jL0 PV;CjV0

t

0)

;H

;1

4 () QTV;Cdvt

dt

(t0):

If the charge-oriented MNA is considered, we set additionally:

q

0 := qC(ATCe0 t0)

0 := L(jL0 t0):

Remarks:

Note that each time the matrices H1;1() = H1;1(ATCe0 t0), H4;1() =

H

;1

4 (ATCe0 t0) or H5;1() = H5;1(jL0 t0) appear, we already know the corresponding valuesATCe0orjL0and, therefore, can insert them. On the other hand, the conditions of the Tables 5.1 and 5.2 imply precisely that this holds analogously for the controlled sources.12.

Of course, if the network contains no C-V-loops and no L-I cutsets, then the corresponding equations dened with the aid of the projectors QV;C

andQCRV, respectively, do not appear.

Corollary 5.6 implies that the choice of (e0 jL0 jV0) is arbitrary as long as the nonlinear equation that leads to the expression forQCQV;CPR;CVe0

is solvable.

From the results presented in 8] it follows directly that, for the controlled sources we consider here, the spaceN\S() is constant and can be described by

N\S() = imQCRV f0gim QV;C

12Note that the controlled sources we permit do not change the spaces associated with the DAEs and, in this context, imply that we do not need to alter the order, as it was done in 6].

(12)

for the conventional MNA and

N\S() =f0gf0gimQCRV f0gim QV;C

for the charge-oriented MNA. Observe that QCRVe and QV;CjV appear only in linear expressions of the equations (4.1) - (4.3) and (4.4) - (4.8).

5.2 Topological analysis of the network

Let us analyze the topology of a given circuit to locate the equations corre- sponding to (5.15) and (5.16), i. e., to the equations that lead to the hidden constraints13. In 6] it was shown that these equations can be obtained directly from the network by making use of the following two procedures. They pre- cisely determine the linearly independent equations that describe the hidden constraints arising from C-V loops and L-I cutsets, respectively.

PROCEDURE 1

1. Search a C-V loop in the given network graph. If no loop is found, then end.

2. Write the equation resulting from the sum of the derivatives of the charac- teristic equations of the voltage sources contained in the C-V loop, taking into account the orientation of the loop and the reference direction of the considered branches.

For instance, if the voltage sourcesv1 ::: vk form a part of the C-V loop and we dene

i:=

+1 if the orientation of the loop coincides with that ofvi

;1 else,

then the equation we write in this step isPki=1i((ATVe)0i;v0i) = 0.

3. Form a new network graph by deleting the branch of one voltage source that forms a part of the loop, leaving the nodes unchanged.

4. Return to 1, considering the new network graph.

The following procedure starts again from the initial graph.

PROCEDURE 2

1. Search an L-I cutset. If one is found, then pick an arbitrary inductance of this cutset. Realize that we can always nd such an inductance because cutsets of current sources only are forbidden. If no cutset is found, then end.

13A similar topological analysis of the network can be found in 3].

(13)

2. Write a new equation resulting by derivation of the cutset equation arising from 1.

For instance, if the current sourcesi1 ::: ikand the inductancesjL1 ::: jL~k

form a part of the L-I cutset and we dene

j :=

+1 if the orientation of the cutset coincides with that ofij

;1 else,

~

j :=

+1 if the orientation of the cutset coincides with that ofjLj

;1 else,

then the equation obtained in this step readsPkj=1ji0j+P~ki=1~jjLi0 = 0.

3. Delete the chosen inductance from the network contracting its incident nodes.

4. Return to 1, considering the new network graph.

In 6], an extension of these procedures determines how to x the dynamic components for calculating consistent initial values. The result permits to assign specic values to a selection of variables, and to determine the remaining by making use of the system's equation14. Nevertheless, the values obtained in that way depended on the choice of variables selected.

6 Calculating a consistent value starting up from a value fullling the system's equations

The approach presented in this section distributes the index-2 property along all aected elements. It results from the approach presented in Section 3 and can be summarized as follows:

Theorem 6.1

For networks that contain only controlled sources as specied in the Tables 5.1 and 5.2 we obtain consistent initial values starting up from possibly inconsistent ones that full the system's equations in the following way:

1. Add additional currents that ow through the C-V-loops as a consequence of the hidden constraints described by PROCEDURE 1 to the values of the currents through the branches that form a part of C-V-loops.

2. Add convenient values to the node potentials to full the additional volt- age across the L-I cutsets dened by the hidden constraints described by PROCEDURE 2.

The meaning of this theorem becomes clear in the course of the article. The Theorems 6.5 and 6.6 describe the statement properly.

In this chapter, we rst give an overview of our aim, explaining the approach

14Therefore, this result is similar to the one obtained in 16].

(14)

for a special case, the DC operating point, and then we generalize the results to apply them for arbitrary points. The proofs will be pointed out for the general case only.

In Section 6.4 we illustrate why the class of controlled sources for which this approach holds cannot be extended if no further topological considerations are made.

6.1 An initialization related to the DC operating point

A common way for obtaining values to start the numerical integration in circuit simulation is to calculate the DC operating point. Therefore, we consider this point separately. We calculate the DC operating point by setting the current through the capacitances and the voltages across the inductances equal to zero.

Note that for calculating the DC operating point for the charge-oriented MNA, the matrix dxdf has to be nonsingular.

Topologically, this implies that:

1. Cutsets of capacitances and/or current sources are forbidden, i.e., that (AL AR AV) has full row rank.

2. Loops of inductances and/or voltage sources are forbidden, i.e., (AL AV) has full column rank.

Furthermore, the non-singularity of dxdf implies assumptions on the resistances and on the controlled sources.

Similar considerations hold for the conventional MNA, whereasqt0() and 0t() have to be considered separately . Observe that, if time-dependent capacitors or inductors appear in the network, then the existence of the DC operating point and the non-singularity of the corresponding matrix dxdf are not equivalent for the conventional MNA.

In the index-2 case the DC operating point has not to be consistent. Neverthe- less, the values obtained for the DC operating point, (e0 jL0 jV0), full Kircho's laws, and precisely the equations

ARr(ATRe0 t0) +ALjL0+AVjV0 +AIi(PCRVe0 jL0 PV;CjV0 t0) = 0(6.1)

;ATLe0 = 0(6.2)

ATVe0;v(ATCe0 jL0 t0) = 0(6.3) for the conventional MNA, and, additionally, the equations

q;qC(ATCe0 t0) = 0 (6.4)

;L(jL0 t0) = 0 (6.5)

if the charge-oriented MNA is considered.

Theorem 6.2

For the conventional MNA we obtain a consistent initialization (e0 jL0 jV0 PCe00 jL00) related to the DC operating point (e0 jL0 jV0) in the fol- lowing way:

Referenzen

ÄHNLICHE DOKUMENTE

Both analytical and numerical models are employed to describe the warpage and the stress distribution in the package during different critical steps (i.e. die

Our main contributions are as follows: we propose a mapping between the ªObjective, Model, Architecture, Mechanism” (OM-AM) framework from the access control litera- ture [Sa00] and

Besides drawing on pathways that are already presented in the literature (via shared values and value content) we add a third, in which values influence the formation and change of

The main distinction will be between a notion of objectivity accruing to facts and thus to objects and properties and building on ontological independence and a quite different

For this purpose, the methods of Value Stream Design and fact sheets are used to describe the characteristics of production systems objects (resources and parts)..

At each time step the model first calculates curves of regional liquid fuel demand and supply versus cost, which reflect the changing domestic potential of production, substitution,

First, the firms selling consumption goods gain the whole profit; then they transfer a part ot it to the other firms through monetary flows when purchasing fixed and

Keywords: environmental values, Nature, ethics, utilitarianism, rights, virtue, incommensurability, intrinsic value, economic valuation, moral considerability/standing, plural