Minimization of Voltage Sag/Swell by Simultaneous Controlling Of Active and Reactive Powers in UPQC-S
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 12
Abstract
This paper aims at presenting the new concept of controlling active and reactive powers simultaneously (complex power) with the help of the series inverter of UPQC, introduced and termed as UPQC-S. The new proposed concept of the UPQCS approach is mathematically formulated and analyzed for voltage sag and swell conditions in power systems. The developed comprehensive equations for UPQC-S can be effectively utilized to estimate the required series injection voltage and the shunt compensating current profiles (both magnitude of simultaneous voltage sag/swell and load reactive power sharing feature of series part and phase angle), and the overall VA loading both under voltage sag and swell conditions. . The simulation studies illustrate the effectiveness of the proposed concept of UPQC-S.
Authors and Affiliations
Dr. Chandrashekhar Reddy. S
Increasing Production Rate of Gear Box Assembly Using SMED Concept
In This Paper The Purpose Of The Single Minute Exchange Die (SMED) Is To Eliminate Waste Of Time. Longer Setting Up Time Denotes That Production Line Is Not Very Productive. Nowadays, Everything Is Being Done Faster And...
Face Recognition with SIFT Algorithm for Attendance Monitoring
The Face Recognition is an integral part of biometrics. In biometrics, basic traits of human are used to extract information and use that information and data for other application. The SIFT [1] algorithm takes a croppe...
Fuzzy Techniques for Enhancement of Low Contrast Images
In the recent years enormous work has been carried out to enhance the contrast of image because of its wide applications in surveillance, medical domain and enhancement of geostationary images. Conventional methods like...
Securing Guest Virtual Machine By Using Software And Hardware Processor
With rapid development on cloud computing, securing guest virtual machines (VMs) from malicious user has become critical to provide secure services. Today’s cloud security model is based up on the software based virtual...
Secure Deduplication with Authorized Duplicate Check Using Convergent Encryption in Cloud
Increased growth of cloud storage turns the focus of cloud service providers to save their resources to earn more profit by renting them to the multiple cloud users. One of the main factors that utilizes more space and...