Five-Level Transformerless Inverter for Single-Phase Solar Photovoltaic Applications Abstract-Transformerless inverters are extensively employed in grid connected photovoltaic (PV) generation systems due to its advantages of achieving low cost and high ef?ciency. However, the common mode voltage issues have been motivated the proposition of new topologies, control and modulation schemes. In common-ground PV inverters the grid…
A Hybrid Boost-Flyback/Flyback Micro-inverter for Photovoltaic Applications Abstract-For photovoltaic applications, the flyback micro-inverter with pseudo-dc-link is popular as a simple topology but brings large transformer turns ratio and thus large leakage inductance, which would deteriorate the converter efficiency. To solve this issue, based on the non-isolated pseudo-dc-link structure, this paper proposed a hybrid boost-flyback/flyback (BF/F)…
Frequency Control of DFIG based Wind Power Penetrated Power Systems Using Switching Angle Controller and AGC Abstract-In the first place, proposes a switching angle controller (SAC) and an automatic generation controller (AGC) for the doubly-fed induction generator (DFIG) to control the frequency of DFIG-based wind power penetrated power systems (WPPSs). The concept of virtual rotor…
Frequency Control of DFIG based Wind Power Penetrated Power Systems Using Switching Angle Controller and AGC Abstract-In the first place, paper proposes a switching angle controller (SAC) and an automatic generation controller (AGC) for the doubly-fed induction generator (DFIG) to control the frequency of DFIG-based wind power penetrated power systems (WPPSs). In addition,the concept of…
Frequency support in a micro-grid using virtual synchronous generator based charging station Abstract-This study focuses on the role of electric vehicle (EV) charging station (CS) to support the frequency of the islanded micro-grid (MG). Frequency deviation is a common issue in islanded MGs due to the intermittent nature of renewable energy sources (RES). This issue…
Full Verifiability for Outsourced Decryption in Attribute Based Encryption Abstract– Attribute based encryption (ABE) is a popular cryptographic technology to protect the security of users? data. However, the decryption cost and ciphertext size restrict the application of ABE in practice. For most existing ABE schemes, the decryption cost and ciphertext size grow linearly with the…
Full-Range Soft-Switching-Isolated Buck-Boost Converters With Integrated Interleaved Boost Converter and Phase-Shifted Control Abstract? Full-Range Soft-Switching-Isolated Buck-Boost Converters With Integrated Interleaved Boost Converter and Phase-Shifted Control. A new method for deriving isolated buck-boost < Final Year Projects 2016 > IBB converter with single-stage power conversion is proposed in this paper and novel IBB converters based on…
Fully-Digital Blind Compensation of Non-Linear Distortions in Wideband Receivers Abstract-Digital post-distortion is becoming an increasingly attractive solution to compensate for the non-linearities of RF receivers implemented in deep submicron CMOS technologies. A very promising technique which provides flexibility and robustness is the frequency spreading based digital post-distortion. In addition, focuses on the analysis of this…
Further Results on Delay-Dependent Stability of Multi-Area Load Frequency Control Abstract?Further to results reported by Jiang , this paper investigates delay-dependent stability of load frequency control (LFC) emphasizing on multi-area and deregulated environment. Based on Lyapunov theory and the linear matrix inequality technique, a new stability criterion is proposed to improve calculation accuracy and to…
GDVAN: A New Greedy Behavior Attack Detection Algor ithm For VANETs Abstract– Vehicular Ad hoc Networks (VANETs), whose main objective is to provide road safety and enhance the driving conditions, are exposed to several kinds of attacks such as Denial of Service (DoS) attacks which affect the availability of the underlying services for legitimate users….
Generating Summary Risk Scores for Mobile Applications Abstract?Generating Summary Risk Scores for Mobile Applications. One of Android’s main defense mechanisms against malicious apps is a risk communication mechanism which, before a user installs an app, warns the user about the permissions the < Final Year Projects > app requires, trusting that the user will make…
GENETIC ALGORITHM CLUSTERING FOR COLOR IMAGE QUANTIZATION Abstract?Clustering is an unsupervised classification method used for different issues in image analysis. Genetic algorithms are randomized search and optimisation techniques. In this paper, we present a genetic algorithm clustering for color image quantization as a prior process to any other one for image analysis. < Final…