Design & Analysis of 5th Order DC-DC Converter
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 8
Abstract
A new two-input DC-DC converter suitable to draw power from two different dc sources feeding a common dc-bus is presented in this paper. This is a two-switch converter belongs to fifth-order family and performs bucking operation for one dc source while it allows both bucking as well as boosting feature with the second source. The salient feature of the proposed converter is that both the sources either individually or simultaneously supply power to the downstream load at reduced ripple current. This feature is particularly attractive for photovoltaic power processing applications. A digital voltage-mode controller is designed for downstream dc-bus regulation while the current controller regulates the power from the weak input power source. A 24 V, 100 Watt converter performance is analyzed and compared with the simulation observations.
Authors and Affiliations
Akash Gupta, Pratibha Shukla
Tongue Recognition System for Authentication
The paper presents an efficient tongue recognition biometric system for authentication based on Dual Tree Complex Wavelet Transform. A method for identifying a person based on their tongue is provided in which an image...
Design and Optimization of H-shaped Fractal Microstrip Patch Antenna with Defected Ground Structure for Wireless Applications
Microstrip antennas find applications in aircraft, satellite and missile applications where important characteristics are size, weight and complexity. They are less bulky and capable of resonating at different bands but...
slugCyber Security in India’sTourism
The growing use of ICT for administration of all the spheres of our daily life cannot be ignored. Also, we also cannot ignore the need to secure the ICT infrastructures used for meeting social function like Tourism. To...
A survey on Intrusion Detection System by Using Data Mining Based on Class-Association-Rule Mining Using GNP
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are constructed by manual encoding of expert knowledg...
P-leach Protocol for Wireless Sensor Network
Reducing the energy consumption of available resources is still a problem to be solved in Wireless Sensor Networks (WSNs). Many types of existing routing protocols are developed to save power consumption. In these proto...