Pulsed Operation of a Weakly-Dispersive, Leaky-Wave Antenna: A Causal Numerical Study

Junhong Gu, Martin Stumpf, Andrea Neto, Ioan E. Lager*

*Corresponding author for this work

Research output: Contribution to journalArticleScientificpeer-review

Abstract

A strictly causal numerical study of the pulsed operation of a weakly dispersive, leaky wave (LW) antenna is presented. The intricacies at the forefront of the electromagnetic (EM) field radiated from a gap-fed slot in a perfectly electrically conducting (PEC) sheet are evidenced for the first time. The radical effect of a free-space gap separating the PEC sheet from the dielectric half-space into which the slot radiates is demonstrated, thus providing time-domain (TD) arguments for the effectiveness of this essential element of leaky-lens antennas (LLAs). The response of the gapped structure to an excitation consisting of pulse trains is evaluated. The discussed results pave the way toward building a genuine TD counterpart of the LW radiation from gap-fed slots. Furthermore, they are conditional to understanding the transients occurring in between intervals when a steady-state, time-harmonic (TH) operation can be assumed, an extremely relevant ingredient to implementing highly complex modulations in carrier-based, wireless transfer.

Original languageEnglish
Pages (from-to)720-732
Number of pages13
JournalIEEE Transactions on Antennas and Propagation
Volume72
Issue number1
DOIs
Publication statusPublished - 2024

Bibliographical note

Green Open Access added to TU Delft Institutional Repository 'You share, we take care!' - Taverne project https://www.openaccess.nl/en/you-share-we-take-care
Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public.

Keywords

  • Leaky wave antennas
  • numerical analysis
  • time-domain analysis

Fingerprint

Dive into the research topics of 'Pulsed Operation of a Weakly-Dispersive, Leaky-Wave Antenna: A Causal Numerical Study'. Together they form a unique fingerprint.

Cite this