An Energy Based Fuzzy Logic Dc-Link Voltage Controller For Three Phase DSTATCOM To Compensate AC Loads
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 10
Abstract
it is very important to compensate the transient response of DSTATCOM for unbalanced and nonlinear loads. Majorly the dc link voltage will be varied, when any small change in the load side. The proper operation of DSTATCOM is achieved with the help of the proportional integral controller (PI) is used. But the transient response of this controller is slow, Because the multiplication of the gains are more In this paper implement the energy based fuzzy logic controller with fast reference voltage generation to regulate Unbalance voltage in threephase system. Also improves the Power Quality of the 3- phase unbalanced and nonlinear loads. One of the main advantages of Fuzzy control over conventional controller is the inaccuracies of the sensors on the system performance can be reduced by adding additional rules, this reduces the need for costly sensors and cost of the control system is reduced without a compromise in performance. The simulation results show a very good performance.
Authors and Affiliations
A. Ranganadh| PG Student, Department of EEE, Prakasam Engineering College, kandukur,India, Ranganadh312@gmail.com, V. Hari babu| Associate Professor, Prakasam Engineering College, kandukur,India, haribabuvaraparla@gmail.com
Design and Analysis of Dry Cylinder Liners Used in Diesel Engines
A Cylinder liner is a cylindrical part to be fitted in to an engine block to form a cylindrical space in which the piston reciprocates very smoothly. It is one of the most important functional parts to make up the int...
A Deniable Cp-Abe Scheme For An Audit-Free Cloud Storage Service
To brawl against outside coercion, we meant to build an encryption scheme that could help cloud storage providers keep away from this quandary. In our move toward, we present cloud storage providers means to create f...
Prevention of Sensitive Information by Enhancing Cloud Access Control
the scheme prevents replay attacks and supports creation, modification, and reading data stored in the cloud. We also address user revocation. Moreover, our authentication, and storage overheads are comparable to cen...
Anonymous Asserts Profile Protection In Mobile Social Networks
In The Current Environment Through Social Network People Can Find Others And Make Their Own Network. An Individual User Can Have Multiple Accounts Of Social Networking Sites. In This Paper We Proposed An Algorithm Fo...
A Secure and authorized Duplication model in Cloud Using multi-layered cryptosystem based
the present a scheme that permits a more fine-grained trade-off. The intuition is that outsourced data may require different levels of the protection, depending on how to popular it is: content shared by many users,...