Pub Date : 2019-03-01DOI: 10.1109/i-PACT44901.2019.8959965
V. Vaideeswaran, S. Bhuvanesh, M. Devasena
Electric Vehicle technology plays an important role in greenhouse gas limitation and carbon pollutions. Rechargeable batteries are used to deliver power to the auxiliary systems and motor in the electric vehicle applications. Various classifications of rechargeable batteries are available nowadays, for electric vehicle applications. Among all rechargeable batteries, Lithium Ion Batteries will give high efficiency for electric mobility because Li-Ion batteries have low self-discharge rate, wide operating range, maximum energy density and high life cycle. To improve the quality of battery and safe operation, battery management system is employed and it plays a vital role in application of Electric Mobility. This paper reviews the attributes of battery management system and its technology with advantages and disadvantages for electric vehicle application. This review includes the battery cell monitoring, state estimation, charging and discharging control, temperature control, fault analysis, data acquisition and protection schemes to improve the performance of battery for EV applications.
{"title":"Battery Management Systems for Electric Vehicles using Lithium Ion Batteries","authors":"V. Vaideeswaran, S. Bhuvanesh, M. Devasena","doi":"10.1109/i-PACT44901.2019.8959965","DOIUrl":"https://doi.org/10.1109/i-PACT44901.2019.8959965","url":null,"abstract":"Electric Vehicle technology plays an important role in greenhouse gas limitation and carbon pollutions. Rechargeable batteries are used to deliver power to the auxiliary systems and motor in the electric vehicle applications. Various classifications of rechargeable batteries are available nowadays, for electric vehicle applications. Among all rechargeable batteries, Lithium Ion Batteries will give high efficiency for electric mobility because Li-Ion batteries have low self-discharge rate, wide operating range, maximum energy density and high life cycle. To improve the quality of battery and safe operation, battery management system is employed and it plays a vital role in application of Electric Mobility. This paper reviews the attributes of battery management system and its technology with advantages and disadvantages for electric vehicle application. This review includes the battery cell monitoring, state estimation, charging and discharging control, temperature control, fault analysis, data acquisition and protection schemes to improve the performance of battery for EV applications.","PeriodicalId":214890,"journal":{"name":"2019 Innovations in Power and Advanced Computing Technologies (i-PACT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115711018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/i-PACT44901.2019.8959967
S. M. Farooq, S. M. Suhail Hussain, T. Ustun
Advanced Metering Infrastructure (AMI) is an important subsystem within the smart grid. Smart meters (SMs) in AMI play crucial role in establishing communication with outside world such as utility servers. They report real time power consumption data which aids in demand side management. Security of this link is an indispensable for cybersecurity. Authentication between SMs and utility servers is of prime importance for secure transmission of metering data, yet it increases the computational burden on operations. This paper proposes a light-weight Elliptic Curve Digital Signature Algorithm (ECDSA) certificate based authentication mechanism by utilizing different elliptic curves. Furthermore, computational times of authentication scheme with different ECDSA curves were compared with RSA digital signature algorithm. For this purpose, algorithms have been implemented using openSSL library. Results show that ECDSA authentication scheme has much better timing performance when compared to RSA; and can be safely used for authentication in AMI communication systems.
{"title":"Elliptic Curve Digital Signature Algorithm (ECDSA) Certificate Based Authentication Scheme for Advanced Metering Infrastructure","authors":"S. M. Farooq, S. M. Suhail Hussain, T. Ustun","doi":"10.1109/i-PACT44901.2019.8959967","DOIUrl":"https://doi.org/10.1109/i-PACT44901.2019.8959967","url":null,"abstract":"Advanced Metering Infrastructure (AMI) is an important subsystem within the smart grid. Smart meters (SMs) in AMI play crucial role in establishing communication with outside world such as utility servers. They report real time power consumption data which aids in demand side management. Security of this link is an indispensable for cybersecurity. Authentication between SMs and utility servers is of prime importance for secure transmission of metering data, yet it increases the computational burden on operations. This paper proposes a light-weight Elliptic Curve Digital Signature Algorithm (ECDSA) certificate based authentication mechanism by utilizing different elliptic curves. Furthermore, computational times of authentication scheme with different ECDSA curves were compared with RSA digital signature algorithm. For this purpose, algorithms have been implemented using openSSL library. Results show that ECDSA authentication scheme has much better timing performance when compared to RSA; and can be safely used for authentication in AMI communication systems.","PeriodicalId":214890,"journal":{"name":"2019 Innovations in Power and Advanced Computing Technologies (i-PACT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114373083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/i-PACT44901.2019.8960107
T. Chandrasegar, Mehul Kumar Piruka
Stock price forecasting is a prevalent and critical subject in financial and academic studies. The objective of this paper is to forecast today’s high price in the market from open of today, open from yesterday and closing of yesterday. We are using the real dataset from NSE NIFTY. We will be implementing a fuzzy intuition system such as Mamdani, Sugeno, and machine learning algorithms like CNN and LSTM. Cost optimization would be used for Sugeno. This paper would compare and improvise the algorithm which will show a higher prediction accuracy rate and would be proved statistically.
{"title":"Prediction of Share Market using FIS","authors":"T. Chandrasegar, Mehul Kumar Piruka","doi":"10.1109/i-PACT44901.2019.8960107","DOIUrl":"https://doi.org/10.1109/i-PACT44901.2019.8960107","url":null,"abstract":"Stock price forecasting is a prevalent and critical subject in financial and academic studies. The objective of this paper is to forecast today’s high price in the market from open of today, open from yesterday and closing of yesterday. We are using the real dataset from NSE NIFTY. We will be implementing a fuzzy intuition system such as Mamdani, Sugeno, and machine learning algorithms like CNN and LSTM. Cost optimization would be used for Sugeno. This paper would compare and improvise the algorithm which will show a higher prediction accuracy rate and would be proved statistically.","PeriodicalId":214890,"journal":{"name":"2019 Innovations in Power and Advanced Computing Technologies (i-PACT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125332441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/i-PACT44901.2019.8960088
E. Mahesh Ramachandran, K. V. Vijaya Chandrakala
This paper proposes a control algorithm for an efficient Energy Management System (EMS) meeting towards minimizing the operating cost of the micro grid in grid connected mode. The microgrid system consists of distributed energy sources mainly renewable energy sources, photovoltaic (PV), Wind Turbine (WT), and Battery Energy Storage (BES) which is lithium-ion battery system is considered as power mix in the analysis. The convex optimization technique is used to determine the optimal scheduling of the microgrid system. To the EMS system, the forecasted wind power, solar power and the electricity market price i.e. time of demand price is given as input parameters. The convex optimization techniques helps to control and provide the day ahead scheduling of power production from each renewable sources, charging and discharging time of the battery storage system. The work tries to show the importance of an energy management system for a dynamic power market from an economic point of view.
{"title":"Dynamic Pricing Based Optimal Power Mix of Grid Connected Micro Grid Using Energy Management System","authors":"E. Mahesh Ramachandran, K. V. Vijaya Chandrakala","doi":"10.1109/i-PACT44901.2019.8960088","DOIUrl":"https://doi.org/10.1109/i-PACT44901.2019.8960088","url":null,"abstract":"This paper proposes a control algorithm for an efficient Energy Management System (EMS) meeting towards minimizing the operating cost of the micro grid in grid connected mode. The microgrid system consists of distributed energy sources mainly renewable energy sources, photovoltaic (PV), Wind Turbine (WT), and Battery Energy Storage (BES) which is lithium-ion battery system is considered as power mix in the analysis. The convex optimization technique is used to determine the optimal scheduling of the microgrid system. To the EMS system, the forecasted wind power, solar power and the electricity market price i.e. time of demand price is given as input parameters. The convex optimization techniques helps to control and provide the day ahead scheduling of power production from each renewable sources, charging and discharging time of the battery storage system. The work tries to show the importance of an energy management system for a dynamic power market from an economic point of view.","PeriodicalId":214890,"journal":{"name":"2019 Innovations in Power and Advanced Computing Technologies (i-PACT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125925526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/i-PACT44901.2019.8960070
S. Ayeswarya, J. Norman
As recent devices are growing in potentiality and accessibility, they offer more necessities in terms of security. With the extensively documented inadequate use of PINs, Continuous Authentication System (CAS) is constructed to overcome the vital issue of secure authentication and usability through biometric-based techniques to seamlessly authenticate the user identity. This work presents a multimodal biometric approach which includes the user information from iris and face. Human face and iris involve rich textural data that is the decisive information for biometric verification. It is very unique and one amongst the foremost precise biometric modalities. However, spoofing methods can be used to imitate or occult user identities and increase the possibility of FRR or FAR. Mostly, the print attack is employed as the impersonate user identities. It is noticed that print attack, independently and in conjunction, can crucially vary the interpersonal and intrapersonal distributions and thus improve the possibility to deceive the CAS. The system is assessed to investigate the performance of providing security and usability. The final outcomes illustrated that the system is capable to supply a 92% lessening in the number of invasive authentication requests needed for high-security applications.
{"title":"Seamless Personal Authentication using Biometrics","authors":"S. Ayeswarya, J. Norman","doi":"10.1109/i-PACT44901.2019.8960070","DOIUrl":"https://doi.org/10.1109/i-PACT44901.2019.8960070","url":null,"abstract":"As recent devices are growing in potentiality and accessibility, they offer more necessities in terms of security. With the extensively documented inadequate use of PINs, Continuous Authentication System (CAS) is constructed to overcome the vital issue of secure authentication and usability through biometric-based techniques to seamlessly authenticate the user identity. This work presents a multimodal biometric approach which includes the user information from iris and face. Human face and iris involve rich textural data that is the decisive information for biometric verification. It is very unique and one amongst the foremost precise biometric modalities. However, spoofing methods can be used to imitate or occult user identities and increase the possibility of FRR or FAR. Mostly, the print attack is employed as the impersonate user identities. It is noticed that print attack, independently and in conjunction, can crucially vary the interpersonal and intrapersonal distributions and thus improve the possibility to deceive the CAS. The system is assessed to investigate the performance of providing security and usability. The final outcomes illustrated that the system is capable to supply a 92% lessening in the number of invasive authentication requests needed for high-security applications.","PeriodicalId":214890,"journal":{"name":"2019 Innovations in Power and Advanced Computing Technologies (i-PACT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124738896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/i-PACT44901.2019.8960037
Annima Gupta, Akhilesh Panwar, S. Sahoo, I. Jacob Raglend
The proposed work intends to design a single channel boost power factor correction (PFC) AC to DC converter for wide range of power applications. Unlike the traditional approaches of PFC this topology manages to eliminate the ripple in input as well as in output current and voltage waveforms, reduces peak current and switching losses. Conventional controllers cannot obtain a good current shaping because of non-linear characteristics of converter at light loads and inaccurate average current samples in DCM mode. This inappropriate current profile also causes poor efficiency. A new digital hybrid control scheme which includes the sampling correction during reference current generation is employed for shaping the good input current in both CCM/DCM mode and also allows the smooth transition between two modes as the load changes. The proposed scheme also improves the reference current tracking at low load conditions. A satisfactory performance of 1KW PFC converter working at 50 KHz switching frequency with hybrid CCM/DCM control scheme is validated by simulation results at various load conditions. The obtained results of power indices comply with IEEE 519-1992 and IEC 61000-3-2 standards.
{"title":"A CCM/DCM Hybrid Control Scheme for Single Channel Boost PFC Converter to Improve Power Quality","authors":"Annima Gupta, Akhilesh Panwar, S. Sahoo, I. Jacob Raglend","doi":"10.1109/i-PACT44901.2019.8960037","DOIUrl":"https://doi.org/10.1109/i-PACT44901.2019.8960037","url":null,"abstract":"The proposed work intends to design a single channel boost power factor correction (PFC) AC to DC converter for wide range of power applications. Unlike the traditional approaches of PFC this topology manages to eliminate the ripple in input as well as in output current and voltage waveforms, reduces peak current and switching losses. Conventional controllers cannot obtain a good current shaping because of non-linear characteristics of converter at light loads and inaccurate average current samples in DCM mode. This inappropriate current profile also causes poor efficiency. A new digital hybrid control scheme which includes the sampling correction during reference current generation is employed for shaping the good input current in both CCM/DCM mode and also allows the smooth transition between two modes as the load changes. The proposed scheme also improves the reference current tracking at low load conditions. A satisfactory performance of 1KW PFC converter working at 50 KHz switching frequency with hybrid CCM/DCM control scheme is validated by simulation results at various load conditions. The obtained results of power indices comply with IEEE 519-1992 and IEC 61000-3-2 standards.","PeriodicalId":214890,"journal":{"name":"2019 Innovations in Power and Advanced Computing Technologies (i-PACT)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126527075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/i-PACT44901.2019.8960012
V. B. Raju, C. Chengaiah
The output power of solar photovoltaic modules at uniform irradiance are more as compared to non-uniform irradiance due to partial shading caused by passing clouds, the shadow of nearby buildings, dust etc,. The effect of partial shading, reduces the performance of PV system by minimizing output power and also its creates hotspots in the shaded PV modules that can damage the PV cells in solar PV modules connected in that PV array. To enhance the maximum output power of PV arrays under different partial shading cases with reconfiguration methods by interconnection of PV modules in different topologies, these are solar PV configurations or topologies. The main objective of this paper is modeling of different 4x4 size solar PV array topologies mainly Total-Cross-Tied, Series-Parallel, Honey-Comb and Bridge-Linked types under different partial shading cases and discuss the power loss analysis of these PV topologies. For this analysis, total 12 shading cases are considered and compare the power loss with one unshaded case. The parameters of LG Electronics LG215P1W PV module are considered for modeling and simulation of different types of topologies for a 4x4 size PV array in MATLAB/Simulink. Keywords- Solar PV output power, Power enhancement, solar Irradiances, PV modules, PV array configurations, Partial shading effect, power losses.
{"title":"Power Enhancement of Solar PV Arrays Under Partial Shading Conditions with Reconfiguration Methods","authors":"V. B. Raju, C. Chengaiah","doi":"10.1109/i-PACT44901.2019.8960012","DOIUrl":"https://doi.org/10.1109/i-PACT44901.2019.8960012","url":null,"abstract":"The output power of solar photovoltaic modules at uniform irradiance are more as compared to non-uniform irradiance due to partial shading caused by passing clouds, the shadow of nearby buildings, dust etc,. The effect of partial shading, reduces the performance of PV system by minimizing output power and also its creates hotspots in the shaded PV modules that can damage the PV cells in solar PV modules connected in that PV array. To enhance the maximum output power of PV arrays under different partial shading cases with reconfiguration methods by interconnection of PV modules in different topologies, these are solar PV configurations or topologies. The main objective of this paper is modeling of different 4x4 size solar PV array topologies mainly Total-Cross-Tied, Series-Parallel, Honey-Comb and Bridge-Linked types under different partial shading cases and discuss the power loss analysis of these PV topologies. For this analysis, total 12 shading cases are considered and compare the power loss with one unshaded case. The parameters of LG Electronics LG215P1W PV module are considered for modeling and simulation of different types of topologies for a 4x4 size PV array in MATLAB/Simulink. Keywords- Solar PV output power, Power enhancement, solar Irradiances, PV modules, PV array configurations, Partial shading effect, power losses.","PeriodicalId":214890,"journal":{"name":"2019 Innovations in Power and Advanced Computing Technologies (i-PACT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121607093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/i-PACT44901.2019.8960235
Laxman Khandare, D. K. Sreekantha, K. Sairam
Today’s emerging trends in the applications of wearable healthcare devices integrated with clouds and cloudlets technologies which strengthen the delivery of cost effective and high quality healthcare services. The Internet of Things (IoT), wearable devices, medical devices and healthcare systems provides the facilities to health care centers and doctors to monitor patient’s health at their homes using patient’s health data which is stored on cloud. Public area network is used to send data to cloud from healthcare devices, which is not secure. Opponent could read and change the data in the network during transmission. However, due to the heterogeneity, different characteristics and small size of smart wearable devices, specific method for the data protection with wearable device has not been yet established. Therefore to protect the privacy of patient’s data it needed access control mechanism based on encryption and cryptography. In this article, we review the different models, schemes as well as implementation related to data encryption and cryptography algorithms proposed by different researchers to secure smart wearable medical health care devices. To prevent the unauthorized access and securing the wireless communication as well as protect device integrity and data confidentiality Cryptography is the best approach.
{"title":"A Study on Encryption Techniques to Protect the Patient Privacy in Health Care Systems","authors":"Laxman Khandare, D. K. Sreekantha, K. Sairam","doi":"10.1109/i-PACT44901.2019.8960235","DOIUrl":"https://doi.org/10.1109/i-PACT44901.2019.8960235","url":null,"abstract":"Today’s emerging trends in the applications of wearable healthcare devices integrated with clouds and cloudlets technologies which strengthen the delivery of cost effective and high quality healthcare services. The Internet of Things (IoT), wearable devices, medical devices and healthcare systems provides the facilities to health care centers and doctors to monitor patient’s health at their homes using patient’s health data which is stored on cloud. Public area network is used to send data to cloud from healthcare devices, which is not secure. Opponent could read and change the data in the network during transmission. However, due to the heterogeneity, different characteristics and small size of smart wearable devices, specific method for the data protection with wearable device has not been yet established. Therefore to protect the privacy of patient’s data it needed access control mechanism based on encryption and cryptography. In this article, we review the different models, schemes as well as implementation related to data encryption and cryptography algorithms proposed by different researchers to secure smart wearable medical health care devices. To prevent the unauthorized access and securing the wireless communication as well as protect device integrity and data confidentiality Cryptography is the best approach.","PeriodicalId":214890,"journal":{"name":"2019 Innovations in Power and Advanced Computing Technologies (i-PACT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121655158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/i-PACT44901.2019.8959999
S. Venkateswarlu, Srikanth Velpula, M. Janaki, R. Thirumalaivasan
This paper presents, the SSR characteristic analysis of the system with combined active and passive series compensation methods to increase secure loading, stability and fast control of power in the transmission line. The hybrid compensation is done by considering SSSC (an active FACTS device) and fixed series capacitor (passive compensation) method. Also, the Flower Pollination Algorithm is adopted in designing of the SSSC with Type-1 controller based on the damping torque analysis. The SSR analysis is carried out using damping torque, eigenvalue and transient simulation methods which show the effectiveness of SSSC in the elimination of torsional interaction at the operating point. The SSSC with Type-1 controller shows better performance in reducing the network resonant frequency along with improved power transfer capability of line.
{"title":"Analysis of SSR with SSSC using FPA based Voltage Controller","authors":"S. Venkateswarlu, Srikanth Velpula, M. Janaki, R. Thirumalaivasan","doi":"10.1109/i-PACT44901.2019.8959999","DOIUrl":"https://doi.org/10.1109/i-PACT44901.2019.8959999","url":null,"abstract":"This paper presents, the SSR characteristic analysis of the system with combined active and passive series compensation methods to increase secure loading, stability and fast control of power in the transmission line. The hybrid compensation is done by considering SSSC (an active FACTS device) and fixed series capacitor (passive compensation) method. Also, the Flower Pollination Algorithm is adopted in designing of the SSSC with Type-1 controller based on the damping torque analysis. The SSR analysis is carried out using damping torque, eigenvalue and transient simulation methods which show the effectiveness of SSSC in the elimination of torsional interaction at the operating point. The SSSC with Type-1 controller shows better performance in reducing the network resonant frequency along with improved power transfer capability of line.","PeriodicalId":214890,"journal":{"name":"2019 Innovations in Power and Advanced Computing Technologies (i-PACT)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130579551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/i-PACT44901.2019.8960046
R. Venkateswari, S. Sreejith
This paper investigates the performance of DSTAT-COM as a load compensator. It is employed to mitigate the sag on load side. The sag is mainly due to the increase in the usage of the non-linear loads by the consumers. The DSTATCOM regulates the bus voltage by absorbing or generating reactive power. Depending on the system voltage, the DSTATCOM works on inductive or capacitive mode. In this paper, the analysis on the distribution side issues is performed with DSTATCOM compensation.
{"title":"Load Compensation using DSTATCOM","authors":"R. Venkateswari, S. Sreejith","doi":"10.1109/i-PACT44901.2019.8960046","DOIUrl":"https://doi.org/10.1109/i-PACT44901.2019.8960046","url":null,"abstract":"This paper investigates the performance of DSTAT-COM as a load compensator. It is employed to mitigate the sag on load side. The sag is mainly due to the increase in the usage of the non-linear loads by the consumers. The DSTATCOM regulates the bus voltage by absorbing or generating reactive power. Depending on the system voltage, the DSTATCOM works on inductive or capacitive mode. In this paper, the analysis on the distribution side issues is performed with DSTATCOM compensation.","PeriodicalId":214890,"journal":{"name":"2019 Innovations in Power and Advanced Computing Technologies (i-PACT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130552461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}