Hybrid T-I-D and Fuzzy Logic Based SVC Controller for Transient Stability Enhancement
Journal Title: International Journal of engineering Research and Applications - Year 2017, Vol 7, Issue 6
Abstract
This paper presents a new approach to solve the transient stability problem. The conventional PI based SVC controller has simple functioning and is economical in operation but has sluggish performance with non-linear characteristics. so, in order to circumvent this problem, fuzzy based T-I-D controller has been designed to improve the transient stability of 2 machine 3 bus power system using MATLAB/SIMULINK software.
Authors and Affiliations
Poonam Singhal, Sakshi Sharma
Efficacy of Twisted Jacket for Offshore Wind Turbine Foundation
With the increase in demand of offshore wind energy, the need for offshore structures for supporting wind turbine is increasing. These structures can be floating and moored to the seabed or a fixed structure with its fou...
Investigation On The Strength And Density Of Concrete Made By Partial Replacement Of Waste Glass As Coars Aggregate
Concrete is a highly compacted construction composite material made by mixing suitable quantities of coarse and fine aggregates, cement and water. Its strength is much greater than ordinary bricks used in construction du...
Identification of classification criteria for testing Concurrent Software Systems
Many recent software systems are composed of multiple execution flows that run simultaneously, spanning from applications designed to exploit the power of recent multi-core architectures to distributed systems consisting...
Studying the Effect of Nano-materials on Capillary Pressure Curves for Sandstone ReservoirUsing the Centrifuge Technique
In the past few years, the Effect of Capillary Pressure Curves on the Non-wetting and Wetting properties of fluid flow was the topic of several papers. This effect was usually examined by applying different EOR methods o...
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
Public key cryptosystem plays major role in many online business applications. In public key cryptosystem, public key need not be protected for confidentiality, but the authenticity of public key is needed. Earlier, many...