Simulation of Speed Control of Brushless DC Motor for four Quadrant Operation
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 12
Abstract
Brushless DC (BLDC) motor drives are becoming more popular in industrial, traction applications. This makes the control of BLDC motor in all the four quadrants very vital. This paper deals with the conventional control of three phase BLDC motor. The BLDC motor is controlled in all four quadrant operation without any loss of power; in fact energy is conserved during regenerative period. The conventional controller is very advantageous over other controllers, as it combines the calculation capability of Digital Signal Processor and controlling capability of microcontroller, to achieve precise control.
Authors and Affiliations
S Ragu,
Minimization of Casting Defects Using Casting Simulation Technique and Casting Defects Analysis Using Design of Experiment
In this paper Computer simulation technique and design of experiment used for casting defects analysis. In the first part using casting simulation technique analysis for shrinkage porosity defect is performed and new ga...
Comparison Among Different Sorting Techniques
Ordering of data is very important. To understand any data it must be in ordered form, even computer cannot perform operations on randomly stored data. The process of ordering of data is known as sorting. There are vari...
slugFundamentals & Concepts of Distributed Database
This paper is prepared with the objective to present an introduction to distributed databases through its two main parts: The first part, is about the fundamentals of distributed databases (DDBS). The Points discussed i...
Piezoelectric Energy Harvesting in Roadways and Railways
Electricity has become major need nowadays and everyday a new research is conducted to find alternate sources of energy mostly focussed on non-conventional sources of energy. Nearly every aspect of our lives relies on u...
Intrusion Detection in Mobile Ad Hoc Network
MANETs are prone to various active and passive security attacks and intrusions.Cryptography and authentication systems are not well sufficient for MANETs. It is required that MANETs should have the ability to detect any...