She–PWM Cascaded Seven level Inverter With Adjustable DC Voltage Levels Control For D-Statcom Applications
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 8
Abstract
In this paper presents a new multilevel selective harmonic elimination pulse-width modulation (MSHE–PWM) technique for transformer less static synchronous compensator (STATCOM) system employing cascaded H-bridge inverter (CHI) configuration. The proposed MSHE–PWM method optimizes both the dc-voltage levels and the switching angles, enabling more harmonics to be eliminated without affecting the structure of the inverter circuit. The method provides constant switching angles and linear pattern of dc-voltage levels over the modulation index range. This in turns eliminates the tedious steps required for manipulating the offline calculated switching angles and therefore, easing the implementation of the MSHE–PWM for dynamic systems. Although the method relies on the availability of the variable dc-voltage levels which can be obtained by various topologies, however, the rapid growth and development in the field of power semiconductor devices led to produce highefficiency dc–dc converters with a relatively highvoltage capacity and for simplicity, a buck dc–dc converter is considered in this paper. Current and voltage closed loop controllers are implemented for both the STATCOM and the buck converter to meet the reactive power demand at different loading conditions. The technique is further compared with an equivalent conventional carrierbased pulse-width modulation to illustrate its enhanced characteristics. The effectiveness and the theoretical analysis of the proposed approach are verified through both simulation and experimental studies.
Authors and Affiliations
Rani Hepsiba| M. Tech Student in PE &ED Pragati Engineering College, Surampalem, P. V. Prasuna| Asst. Prof.in EEE Dept. Pragati Engineering College, Surampalem
Secrecy Stabilizing for Cloud Storage With Assessing Of Third Party
Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage...
A Multi User Data Share For Data Privacy and Defend Unauthorized Access
A hierarchical access control method using a modified hierarchical attribute-based encryption (M-HABE) and an adjusted three-layer structure is proposed. Varying from the current ideal models, for example, the HABE c...
Assessing Software Reliability Using Exponential Imperfect Debugging Model
Software reliability is one of the most important characteristics of software quality. As the usage of software reliability is growing rapidly, accessing the software reliability is a critical task in development of...
Utilization Of Ring Signatures To Construct Homomorphic Authenticators In ORUTA To Verify The Integrity of Shared Data
It is practiced for users to influence cloud storage services to contribute to data with others in a group as data sharing develop into a standard feature in most cloud storage offerings including Drop box, iCloud an...
We have considered the issue of best k high utility itemsets mining, where k is the coveted number of high utility itemsets to be mined. Two effective calculations TKU (mining Top-K Utility itemsets) and TKO (mining...