Computer Science ›› 2019, Vol. 46 ›› Issue (11A): 381-386.

• Network & Communication • Previous Articles     Next Articles

Analysis of Influence of Mutual Inductances on Energy Transmitting Between Receiving Coil in WRSNs

WANG Xu, LIN Zhi-gui, LIU Xiao-feng, MENG De-jun   

  1. (School of Electronics and Information Engineering,Tianjin Polytechnic University,Tianjin 300387,China);
    (Tianjin Key Laboratory of Optoelectronic Detection Technology and Systems,Tianjin 300387,China)
  • Online:2019-11-10 Published:2019-11-20

Abstract: Based on the principle of coupled magnetic resonant circuit model,this paper theoretically analyzed the influe-nce of mutual inductance between receiving coils on the energy transmitting efficiency and power of receiving nodes.The influence factors affecting the mutual inductance between the receiving coils are the distance,height and angle between the receiving coils.The relationship between three factors and energy transmitting efficiency and power of the node is established and theoretically analyzed.Through the research of the one-to-two charging process of the wireless rechargeable sensor networks based on magnetic coupling resonance technology,the relationships between the threefactors and the mutual inductance of the receiving coil,the energy transmitting efficiency of the node and the power are ana-lyzed.The results show that when the receiving coils are on the same side,the closer the relative distance between the two receiving coils is,the greater the mutual inductance is,and the stronger of the mutual inhibition energy reception of the node is.

Key words: Wireless rechargeable sensor networks (WRSNs), Coupled magnetic energy transmitting, One-to-many charging method, Mutual inductance

CLC Number: 

  • TP393
[1]KURS A,KARALIS A,MOFFATT R,et al.Wireless power transfer via strongly coupled magnetic resonances[J].Science,2007,317(5834):83-86.
[2]XU W Z,LIANG W F,JIA X H,et al.Maximizing Sensor Lifetime with the Minimal Service Cost of a Mobile Charger in Wireless[J].IEEE Transactions on Mobile Computing,2018,17(11):2564-2577.
[3]GUO S T,WANG C,YANG Y Y.Joint mobile data gathering and energy provisioning in wireless rechargeable sensor networks [J].IEEE Transactions on Mobile Computing,2014,13(12):2836-2852.
[4]KURS A,MOFFATT R,SOLJAČIC' M.Simultaneous mid-range power transfer to multiple devices[J].Applied Physics Letters,201096(4):044102-044104.
[5]KIM J W,SON H C,KIM D H,et al.Analysis of wireless energy transfer to multiple devices using CMT[C]∥Asia-Pacific Microwave Conference Proceedings(APMC).Yokohama,2010:2149-2152.
[6]KHELLADI L,DJENOURI D,LASLA N,et al.MSR:Mini-mum-Stop Recharging Scheme for Wireless Rechargeable Sensor Networks[C]∥IEEE International Conference on Ubiquitous Intelligence and Computing (UIC).Denpasar,Bali,Indonesia,2014:378-383.
[7]SHI Y,XIE L,HOU Y T,et al.On renewable sensor networks with wireless energy transfer[C]∥IEEE INFOCOM.Shanghai,2011:1350-1358.
[8]AHN D,HONG S.Effect of Coupling Between Multiple Transmitters or Multiple Receivers on Wireless Power Transfer[J].IEEE Transactions on Industrial Electronics,2013,60(7):2602-2613.
[13]BABIC S I,AKYEL C.Calculating Mutual Inductance Between Circular Coils With Inclined Axes in Air[J].IEEE Transactions on Magnetics,2008,44(7):1743-1750.
[1] LI Hui, LI Xiu-hua, XIONG Qing-yu, WEN Jun-hao, CHENG Lu-xi, XING Bin. Edge Computing Enabling Industrial Internet:Architecture,Applications and Challenges [J]. Computer Science, 2021, 48(1): 1-10.
[2] LIU Tong, FANG Lu, GAO Hong-hao. Survey of Task Offloading in Edge Computing [J]. Computer Science, 2021, 48(1): 11-15.
[3] LIANG Jun-bin, TIAN Feng-sen, JIANG Chan, WANG Tian-shu. Survey on Task Offloading Techniques for Mobile Edge Computing with Multi-devices and Multi-servers in Internet of Things [J]. Computer Science, 2021, 48(1): 16-25.
[4] YU Xue-yong, CHEN Tao. Privacy Protection Offloading Algorithm Based on Virtual Mapping in Edge Computing Scene [J]. Computer Science, 2021, 48(1): 65-71.
[5] GAO Ji-xu, WANG Jun. Multi-edge Collaborative Computing Unloading Scheme Based on Genetic Algorithm [J]. Computer Science, 2021, 48(1): 72-80.
[6] WANG Chun-dong, LUO Wan-wei, MO Xiu-liang, YANG Wen-jun. Survey on Mutual Trust Authentication and Secure Communication of Internet of Vehicles [J]. Computer Science, 2020, 47(11): 1-9.
[7] ZHANG Hao, GUAN Xin-jie, BAI Guang-wei. Optimization of Mobile Charging Path of Wireless Rechargeable Sensor Networks Based on Reinforcement Learning [J]. Computer Science, 2020, 47(11): 316-321.
[8] SONG Ying, ZHONG Xian, SUN Bao-lin, GUI Chao. Sliding Window-based Network Coding Cooperative Algorithm in MANET [J]. Computer Science, 2020, 47(11): 322-326.
[9] LI Zheng-yang, TAO Yang, ZHOU Yuan-lin, YANG Liu. Energy-balanced Multi-hop Cluster Routing Protocol Based on Energy Harvesting [J]. Computer Science, 2020, 47(11A): 296-302.
[10] YAO Li-shuang, LIU Dan, PEI Zuo-fei, WANG Yun-feng. Real-time Network Traffic Prediction Model Based on EMD and Clustering [J]. Computer Science, 2020, 47(11A): 316-320.
[11] ZHAO Rui-jie, SHI Yong, ZHANG Han, LONG Jun, XUE Zhi. Webshell File Detection Method Based on TF-IDF [J]. Computer Science, 2020, 47(11A): 363-367.
[12] CHEN Xi, FENG Mei, JIANG Bo. Analysis of Kaminsky Attack and Its Abnormal Behavior [J]. Computer Science, 2020, 47(11A): 396-401.
[13] LI Xiao, QU Yang, LI Hui, GUO Shi-kai. User Importance Evaluation for Q&A Platform Based on User Relations [J]. Computer Science, 2020, 47(11A): 430-436.
[14] WANG Shuai-hui, HU Gu-yu, PAN Yu, ZHANG Zhi-yue, ZHANG Hai-feng, PAN Zhi-song. Community Detection in Signed Networks with Game Theory [J]. Computer Science, 2020, 47(11A): 449-453.
[15] CHEN Chao, ZHAO Chun-lei, ZHANG Chun-xiang, LUO Hui. Review of IoT Sonar Perception [J]. Computer Science, 2020, 47(10): 9-18.
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .