A New Multi Level Grid-Connected Converter Topology for Single-Phase Transformerless PV System
[View]
K.Yaswanth, G.Vamsi Krishna
The ever-increasing energy consumption, fossil fuels soaring costs and exhaustible nature, and worsening global environment have created a booming interest in renewable energy generation systems, one of which is photovoltaic. Such a system generates electricity by converting the Sun’s energy directly into electricity. Photovoltaic-generated energy can be delivered to power system networks through grid-connected converters. A single-phase seven-level converter for grid-connected photovoltaic systems, with a novel pulse width-modulated PWM control scheme is proposed. Three reference signals that are identical to each other with an offset that is equivalent to the amplitude of the triangular carrier signal were used to generate the PWM signals. Eliminating the leakage current is one of the most important issues for transformer less converters in grid-connected photovoltaic system applications, where the technical challenge is how to keep the system common-mode voltage constant to reduce the leakage current. A novel single-phase three-level topology for transformer less photovoltaic systems is presented in this paper. Compared with the conventional H-bridge topology, it only needs two additional asymmetrically distributed switches, and the system common-mode voltage can be kept constant with a simple modulation scheme. Test results verify the theoretical analysis and the feasibility of the proposed topology and further extension can be done using Eleven Level Converters.
K.Yaswanth, G.Vamsi Krishna
The ever-increasing energy consumption, fossil fuels soaring costs and exhaustible nature, and worsening global environment have created a booming interest in renewable energy generation systems, one of which is photovoltaic. Such a system generates electricity by converting the Sun’s energy directly into electricity. Photovoltaic-generated energy can be delivered to power system networks through grid-connected converters. A single-phase seven-level converter for grid-connected photovoltaic systems, with a novel pulse width-modulated PWM control scheme is proposed. Three reference signals that are identical to each other with an offset that is equivalent to the amplitude of the triangular carrier signal were used to generate the PWM signals. Eliminating the leakage current is one of the most important issues for transformer less converters in grid-connected photovoltaic system applications, where the technical challenge is how to keep the system common-mode voltage constant to reduce the leakage current. A novel single-phase three-level topology for transformer less photovoltaic systems is presented in this paper. Compared with the conventional H-bridge topology, it only needs two additional asymmetrically distributed switches, and the system common-mode voltage can be kept constant with a simple modulation scheme. Test results verify the theoretical analysis and the feasibility of the proposed topology and further extension can be done using Eleven Level Converters.
Design and Analysis of a New Soft-Switching Multi-Output Fly-Back Converter
[View]
M.AJITH KUMAR , N.BHASKARA RAO
Abstract— This paper presents a new multioutput converter. Demand for multiple output power supplies with low voltage and high current has increased. A multi output converters needs to satisfy these conditions such as efficiency, voltage regulation, isolation and size. The fly back converter is the most attractive because of its relative simplicity compared with other topologies used in low power applications and we get multiple outputs. The proposed fly back converter operated at zero-voltage-switching ZVS turn -on and zero-current-switching ZCS turn -off process. The operational principle, analysis, and design considerations of the proposed converter are presented in this paper.
M.AJITH KUMAR , N.BHASKARA RAO
Abstract— This paper presents a new multioutput converter. Demand for multiple output power supplies with low voltage and high current has increased. A multi output converters needs to satisfy these conditions such as efficiency, voltage regulation, isolation and size. The fly back converter is the most attractive because of its relative simplicity compared with other topologies used in low power applications and we get multiple outputs. The proposed fly back converter operated at zero-voltage-switching ZVS turn -on and zero-current-switching ZCS turn -off process. The operational principle, analysis, and design considerations of the proposed converter are presented in this paper.
A Novel Fuzzy Approachof Combining Shunt Hybrid Power Filterand TCR for Power Quality
[View]
U.V.V.SATYANARAYANA, .R.GANESH, D.N.SITA LAKSHMI
ABSTRACT: In Recent scenarios in the distribution system is harmonics created by nonlinear load and unbalance current. It affects not only the working of adjacent loads but also shorten the life of power equipment by creating excessive losses. In this paper, a fuzzy controlled shunt active power filter with TCR is described to maintain the (Total Harmonic Distortion) THD within the allowable limits defined to reduce reactive power and improve power factor. This Filter draws the opposite harmonics containing current from the load so that source current remain sinusoidal and undistorted. Fuzzy logic controller is used to control the shunt active power filter and the performance of the shunt active filtercontrol strategies has been evaluated in terms of harmonic mitigation and DC link voltage regulation. A fully functional MATLAB based Simulink model of Shunt ActivePower Filter for different types of load (nonlinear, unbalance, both). The results of simulation comply with all the features described by the theory; justifying employment of TCR based Shunt Active Power Filter (SAPF) in the industry.
U.V.V.SATYANARAYANA, .R.GANESH, D.N.SITA LAKSHMI
ABSTRACT: In Recent scenarios in the distribution system is harmonics created by nonlinear load and unbalance current. It affects not only the working of adjacent loads but also shorten the life of power equipment by creating excessive losses. In this paper, a fuzzy controlled shunt active power filter with TCR is described to maintain the (Total Harmonic Distortion) THD within the allowable limits defined to reduce reactive power and improve power factor. This Filter draws the opposite harmonics containing current from the load so that source current remain sinusoidal and undistorted. Fuzzy logic controller is used to control the shunt active power filter and the performance of the shunt active filtercontrol strategies has been evaluated in terms of harmonic mitigation and DC link voltage regulation. A fully functional MATLAB based Simulink model of Shunt ActivePower Filter for different types of load (nonlinear, unbalance, both). The results of simulation comply with all the features described by the theory; justifying employment of TCR based Shunt Active Power Filter (SAPF) in the industry.
Low Latency and Area Optimization for Serial Links Using Embedded Transition Inversion Coding
[View]
V.Seetha Raman, V. Krishnan, P.Sivadurgarao
ABSTRACT-This paper proposes embedded transition inversion (ETI) coding to reduce bit transitions in serializing parallel buses, implies reduction in area, delay and power. This paper proposes an embedded transition inversion (ETI) coding scheme that uses the phase difference between the clock and data in the transmitted serial data to tackle the problem of an extra indication bit. This technique is implemented in an optimized fashion using pipelining so that it can be used in practical systems with only a slight compromise in performance. B2I block is replaced with logic expansion of XOR gate operation. The complete proposed Embedded transition inversion architecture is coded in VHDL and the design is simulated using ModelSim and Xilinx ISE 12.1i, Spartan 3E family and device xc3s250e.In this proposed system area is reduced by 22% and delay is reduced by 34%.
V.Seetha Raman, V. Krishnan, P.Sivadurgarao
ABSTRACT-This paper proposes embedded transition inversion (ETI) coding to reduce bit transitions in serializing parallel buses, implies reduction in area, delay and power. This paper proposes an embedded transition inversion (ETI) coding scheme that uses the phase difference between the clock and data in the transmitted serial data to tackle the problem of an extra indication bit. This technique is implemented in an optimized fashion using pipelining so that it can be used in practical systems with only a slight compromise in performance. B2I block is replaced with logic expansion of XOR gate operation. The complete proposed Embedded transition inversion architecture is coded in VHDL and the design is simulated using ModelSim and Xilinx ISE 12.1i, Spartan 3E family and device xc3s250e.In this proposed system area is reduced by 22% and delay is reduced by 34%.
Dynamic Authentication in Guessing Attacks Using iCAPTCHA
[View]
Pulipaka Sunder Sravan, S. Sailaja
ABSTRACT-Many protection primitives are depending on difficult statistical issues. Using difficult AI issues for protection is growing as an interesting new model, but has been under explored. In this paper, we present a new protection basic depending on difficult AI issues, namely, a novel family of visual protection password techniques built on top of Captcha technology, which we call Captcha as visual security passwords (CaRP). CaRP is both a Captcha and a visual protection password plan. CaRP details a number of protection issues completely, such as on the internet wondering strikes, pass on strikes, and, if along with dual-view technological innovation, shoulder-surfing strikes. Especially, a CaRP protection password can be found only probabilistically by automated on the internet wondering strikes even if the protection password is in the search set. CaRP also provides a novel approach to address the well-known image hot spot problem in popular visual protection password techniques, such as Pass Points, that often leads to poor protection password choices. CaRP is not a remedy, but it provides reasonable protection and functionality and appears to fit well with some practical programs for enhancing internet protection.
Pulipaka Sunder Sravan, S. Sailaja
ABSTRACT-Many protection primitives are depending on difficult statistical issues. Using difficult AI issues for protection is growing as an interesting new model, but has been under explored. In this paper, we present a new protection basic depending on difficult AI issues, namely, a novel family of visual protection password techniques built on top of Captcha technology, which we call Captcha as visual security passwords (CaRP). CaRP is both a Captcha and a visual protection password plan. CaRP details a number of protection issues completely, such as on the internet wondering strikes, pass on strikes, and, if along with dual-view technological innovation, shoulder-surfing strikes. Especially, a CaRP protection password can be found only probabilistically by automated on the internet wondering strikes even if the protection password is in the search set. CaRP also provides a novel approach to address the well-known image hot spot problem in popular visual protection password techniques, such as Pass Points, that often leads to poor protection password choices. CaRP is not a remedy, but it provides reasonable protection and functionality and appears to fit well with some practical programs for enhancing internet protection.
Effective Prediction Storage System in Bandwidth Allocation in Cloud
[View]
Pelluri Anusha , K. Ravi Chandra
ABSTRACT-Cloud is changing our life by giving clients new sorts of administrations. a novel end-to-end movement repetition disposal (TRE) framework, intended for distributed computing clients. Cloud-based TRE needs to apply a wise utilization of cloud assets so that the transfer speed expense decrease consolidated with the extra cost of TRE calculation and capacity would be upgraded. PACK's primary point of interest is its capacity of offloading the cloud-server TRE exertion to end customers, in this manner minimizing the handling expenses prompted by the TRE algorithm.1. Prior methodologies keeps up chains by saving for any piece just the last known consequent lump in a LRU design determined by SHA Algorithm characterized as rabin fingerprinting. We propose Digital Signature Algorithm (DSA) set up of SHA that can be utilized as a measurable investigation of chains of lumps that would empower numerous potential outcomes in both the lump request which is less contrasted with SHA and the comparing forecasts. The results are highlighted with dynamic substitution of this execution which approves our case of a superior execution.
Pelluri Anusha , K. Ravi Chandra
ABSTRACT-Cloud is changing our life by giving clients new sorts of administrations. a novel end-to-end movement repetition disposal (TRE) framework, intended for distributed computing clients. Cloud-based TRE needs to apply a wise utilization of cloud assets so that the transfer speed expense decrease consolidated with the extra cost of TRE calculation and capacity would be upgraded. PACK's primary point of interest is its capacity of offloading the cloud-server TRE exertion to end customers, in this manner minimizing the handling expenses prompted by the TRE algorithm.1. Prior methodologies keeps up chains by saving for any piece just the last known consequent lump in a LRU design determined by SHA Algorithm characterized as rabin fingerprinting. We propose Digital Signature Algorithm (DSA) set up of SHA that can be utilized as a measurable investigation of chains of lumps that would empower numerous potential outcomes in both the lump request which is less contrasted with SHA and the comparing forecasts. The results are highlighted with dynamic substitution of this execution which approves our case of a superior execution.
An Efficient and Enhanced ETI Encoder for low Power Transitions
[View]
SAI CHARITHA AVUTAPALLI., SK. ASHRAF ALI
ABSTRACT- Here, in this project; embedded transition inversion (ETI) is proposed to reduce bit transitions in Serializing parallel buses. Implies power can be reduced further. This project proposes an embedded transition inversion (ETI) coding scheme that uses the phase difference between the clock and data in the transmitted serial data to tackle the problem of the extra indication bit. The technique is implemented in an optimized fashion using pipelining so that it can be used in practical systems with only a slight compromise in performance. This is achieved by calculating the decision as the data is being loaded on to the buffer and doing the encoding on the fly. This is one aspect which is lacking in most existing algorithms as they are not amenable to low delay implementation.
SAI CHARITHA AVUTAPALLI., SK. ASHRAF ALI
ABSTRACT- Here, in this project; embedded transition inversion (ETI) is proposed to reduce bit transitions in Serializing parallel buses. Implies power can be reduced further. This project proposes an embedded transition inversion (ETI) coding scheme that uses the phase difference between the clock and data in the transmitted serial data to tackle the problem of the extra indication bit. The technique is implemented in an optimized fashion using pipelining so that it can be used in practical systems with only a slight compromise in performance. This is achieved by calculating the decision as the data is being loaded on to the buffer and doing the encoding on the fly. This is one aspect which is lacking in most existing algorithms as they are not amenable to low delay implementation.
Enhanced and reliable data retrievals for decentralized military networks
[View]
SHAJAHAN BEGUM, V.THIRUPATHI
ABSTRACT- There are partitions in military environments such as a battlefield or a hostile region. They are likely to suffer from intermittent network connectivity. They are having frequent partitions. Disruption-tolerant network DTN technologies are is a true and easy solutions.DTN is a Disruption-tolerant network. It allows devices which are wireless and carried by peoples in a military to interact with each other. These devices access the confidential information or command reliably by exploiting external storage nodes. In these networking environments DTN is very successful technology. When there is no wired connection between a source and a destination device, the information from the source node may need to wait in the intermediate nodes for a large amount of time until the connection would be correctly established. one of the challenging approach is a ABE. That is attribute-based encryption which fulfills the requirements for secure data retrieval in DTNs. The concept is Cipher text Policy ABE (CP-ABE).it gives a appropriate way of encryption of data. the encryption includes the attribute set that the decryption needs to possess in order to decrypt the cipher text. Hence, Many users can be allowed to decrypt different parts of data according to the security policy.
SHAJAHAN BEGUM, V.THIRUPATHI
ABSTRACT- There are partitions in military environments such as a battlefield or a hostile region. They are likely to suffer from intermittent network connectivity. They are having frequent partitions. Disruption-tolerant network DTN technologies are is a true and easy solutions.DTN is a Disruption-tolerant network. It allows devices which are wireless and carried by peoples in a military to interact with each other. These devices access the confidential information or command reliably by exploiting external storage nodes. In these networking environments DTN is very successful technology. When there is no wired connection between a source and a destination device, the information from the source node may need to wait in the intermediate nodes for a large amount of time until the connection would be correctly established. one of the challenging approach is a ABE. That is attribute-based encryption which fulfills the requirements for secure data retrieval in DTNs. The concept is Cipher text Policy ABE (CP-ABE).it gives a appropriate way of encryption of data. the encryption includes the attribute set that the decryption needs to possess in order to decrypt the cipher text. Hence, Many users can be allowed to decrypt different parts of data according to the security policy.
Secure Data Transmission in DTNs for Key Escow Process
[View]
K.Siddartha , S. Sailaja
ABSTRACT- Abstract: Military faces a number of challenges in handling classified and unclassified information. Major challenges include the money, time and effort it takes to develop and deploy new devices or networks and finally integrating them with the existing infrastructure cohesively currently in use and not readily replaceable. To meet military needs for securing data storage with respect to the new state of the art Disruption-tolerant network's (DTN) that allows DTN nodes carried by soldiers to communicate with each other and access and share private information even in the event of network delays. But security breach is a major concern in such DTN's. Although an attribute based encryption scheme is found viable in such store and forward networks, the latency issues with respect to key generation and maintenance is quite complex when using the traditional list based structures. So we propose a new optimized solution to improve to attribute extraction process of data and sort, revalidate and formulate a key generation process that can reduce the latencies involved and store and forwarding process of DTN's [4]. A real time network application developed in this regard highlights our proposed claim and its efficiency.
K.Siddartha , S. Sailaja
ABSTRACT- Abstract: Military faces a number of challenges in handling classified and unclassified information. Major challenges include the money, time and effort it takes to develop and deploy new devices or networks and finally integrating them with the existing infrastructure cohesively currently in use and not readily replaceable. To meet military needs for securing data storage with respect to the new state of the art Disruption-tolerant network's (DTN) that allows DTN nodes carried by soldiers to communicate with each other and access and share private information even in the event of network delays. But security breach is a major concern in such DTN's. Although an attribute based encryption scheme is found viable in such store and forward networks, the latency issues with respect to key generation and maintenance is quite complex when using the traditional list based structures. So we propose a new optimized solution to improve to attribute extraction process of data and sort, revalidate and formulate a key generation process that can reduce the latencies involved and store and forwarding process of DTN's [4]. A real time network application developed in this regard highlights our proposed claim and its efficiency.
PCA BASED RELIABLE AND EFFICIENT ANTI-SPOOFING ARCHITECTURE
[View]
1DHAVILESWARAPU CHINNAYYA, 2D.S.SAMBA SIVA RAO
ABSTRACT- The vulnerabilities of face biometric authentication systems to spoofing attacks have received a significant attention during the recent years.
1DHAVILESWARAPU CHINNAYYA, 2D.S.SAMBA SIVA RAO
ABSTRACT- The vulnerabilities of face biometric authentication systems to spoofing attacks have received a significant attention during the recent years.
Pages [1]

This work is licensed under a Creative Commons Attribution 3.0 License.
© 2011 - 2012 International Journal of Engineering In Advanced Research Science and Technology
Managed By IJEARST Foundation
International Journal of Engineering In Advanced Research Science and Technology ISSN : 2278-2566 (Online)
All rights reserved witheditor@IJEARST.COM.
To make sure that you can receive messages from us, please add the 'IJEARST.COM' domain to your e-mail 'safe list'. If you do not receive e-mail in your 'inbox', check your 'bulk mail' or 'junk mail' folders.
For any Technical Support contact @complaint@IJEARST.COM