Performance Improved Active Power Filter Using Fuzzy Based Adaptive Controller for Renewable Power Generation Systems
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 12
Abstract
An Active power filter implemented with a four-leg voltage-source inverter utilizing a predictive control scheme is introduced. The utilization of a fourleg voltage-source inverter permits the pay of current consonant parts, and in addition lopsided current created by single-stage nonlinear burdens. A point by point yet straightforward numerical model of the dynamic power channel, including the impact of the identical power framework impedance, is determined and used to plan the prescient control calculation. The pay execution of the proposed dynamic power channel and the related control plan under enduring state and transient working conditions is shown through reproductions results. As of late, fuzzy logic controller was connected for active power filter (APF) control application, as the APF is only a current controlled VSI. In this paper, a fuzzy logic based shunt APF is displayed in light of the compelling time idea. The viable time idea disposes of the trigonometric counts and part ID, along these lines it lessens the computational exertion. Reenactment results show the viability of the APF with the fuzzy logic based control procedure. Reproduction results are acquired for both PI controller and fuzzy logic controller and the outcomes are thought about. In the fuzzy controlled four leg inverter APF is utilized for power quality change.
Authors and Affiliations
Malladi Lova Raju| PG student, Head of the Dept. in Dept. of Electrical & Electronic Engineering Chaitanya Institute of Science and Technology, Kakinada,A.P, India, malladilovaraju@gmail.com, B. Krishna Chaitanya| Asst.Professor, Head of the Dept. in Dept. of Electrical & Electronic Engineering Chaitanya Institute of Science and Technology, Kakinada,A.P, India, chaitanyasurya.in@gmail.com, Grandhi Ramu| Head of the Dept. in Dept. of Electrical & Electronic Engineering Chaitanya Institute of Science and Technology, Kakinada,A.P, India
Judging Analogous Data Search In Resultant Web Databases
The present scenario is based on internet technologies we are having a huge amount of useful Information which is usually having on the web databases but in not retaive effectively at the time of users needed. Inform...
Method To Prevent Re-Identification Of Individual Nodes By Combining K-Degree Anonymity With L-Diversity
A range of privacy models as well as anonymization algorithms have been developed. In tabular micro data some of the no responsive attributes called quasi identifiers can be used to reidentify individuals and their s...
Key logging Prevention by QR code with Visual Authentication
Key logging is an activity of capturing users’ keyboard the activity key logger hardware and software. The key loggers secretly monitor and log all keystrokes. Malicious programs, key loggers do not cause any threat...
Maintain Data Integrity And Protection Of Private Label Information In Social Network Data
Perceptive information about users of the social networks should be protected. The confront is to plan methods to publish social network data in a form that affords usefulness without compromising privacy. Previous r...
Distributed Manipulation Through Unidentified Data Accumulated In Cloud
Cloud computing is a rising registering standard in which resources of the processing structure are given as an administration over the Internet. As ensuring as it might be, this standard also conveys quite a few peo...