A Novel approach on ɸ - Disposition Pulse Width Modulation for Modular Multilevel Inverter
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 1
Abstract
In this project implemented a novel approach in the modulation technique based on selective virtual loop mapping, to attain dynamic capacitor voltage balance without any compensated signal.An improvised proposed method, phase disposition pulse width modulation (PDPWM) technique is the main aspect for modulator field in a multilevel inverting model, which also used for Photovoltaic grid connection. Establishing the notion on virtual sub module (VSM), a rapport forming among the real & virtual sub modules .It doesn’t need any sorting voltages, which makes it suitable for a modular multilevel converter with a large number of sub modules in one arm. In which the voltages of the upper/ lower arm’s capacitors can be well balanced. This method is more easy when compare to carrier phase – shifted PWM (CPSPWM)and it is to be realized in field-programmable gate array and has much stronger dynamic regulation ability, and is conducive to the control of circulating current. In this modulation technique, developed experimental results & simulations are presented.
Authors and Affiliations
Gunnam Prabha Lakshmi, P Suguna Ratnamala
Finger Vein Based User Identification Using Differential Box Counting
The personal information can be protected in the form of biometrics which uses human physiological or behavioural features for personal identification. Finger vein ID is a biometric authentication system that matches...
Android Based Braille Interactive System
In our daily life the telecommunication technology plays an important role. Despite of all these technological advancement in the telecommunication field, the physically impaired people have no access for these technolo...
Development of an Indigenous Software For Radiometric and Geometric Calibration of Microwave Remote Sensed Imagery
Microwave Remote sensed data finds a great deal of application in the field of agriculture and disaster management. In this paper an attempt is made towards development of software which can be used for processing of...
Protective Speculation Clouds With Valuable Cost
In this paper, we propose Protective Speculation Clouds With Valuable Cost constraint based approach to identify which datasets need to be encrypted and which do not, so that privacy preserving cost can be saved whil...
ACHIEVING ZERO FALSE POSITIVE AND FALSE NEGATIVE RATES IN AN ATTACK-PATH RECONSTRUCTION
The security and privacy are two essential components for the system security of the Computer Networks. Data security means the data is securely stored , transferred and traced IP.Data privacy means the data can only...