Optimization Based on Reactive Power in Frequency AC Generating System

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 8 Number 7- Feb 2014
Optimization Based on Reactive Power in Frequency
AC Generating System
T.Yuvaraja1, Somnath Mazumder2, Dr.M.Gopinath,3
1
Research Scholar, & Department of EEE, Meenakshi Academy of Higher Education & Research, Chennai, India,
2
Lecturer, & Department of ECE, Shirdi Sai Engineering College, Bangalore, India,
3
Professor, & Department of EEE, Dr.N.G.P. Institute of Technology, Coimbatore, India,
Abstract— This approach calls for the nonlinear fore bay level,
tailrace level, penstock loss, and hydropower production functions to
be replaced with their piecewise linear approximations. In this
generating system, the power winding produces the VFAC electricity
to feed loads, and the control winding is connected to a static
excitation converter to keep the output voltage stable. Based on the
change law of the reactive power provided by the control winding, an
improved instantaneous slip frequency control strategy both with the
load active and reactive power feed forward is proposed to improve
the system dynamic performance. However, the effects of the
linearization of the nonlinear functions and related constraints on
solution feasibility have not been fully discussed in the literature. The
information of the load active and reactive power is employed
through two feed forward loops to rapidly change the reactive power
provided by the control winding, so as to quicken the regulation of
the slip frequency and excitation reactive power. The simulations
show that the system using the strategy has a good dynamic
performance with inductive and capacitive loads, and demonstrate
the correctness and validity of the proposed control strategy.
I. INTRODUCTION
The past four decades, computer scientists have systematically
developed theories of correctness and safety in different aspects,
such as methodologies, techniques, and even automatic tools for
correctness and safety verification of computer systems (see, for
example, [1], [5], [11]. Of these, model checking has been
established as one of the most effective automated techniques to
analyze correctness of software and hardware designs [2], [5]. A
model checker checks a finite-state system against a correctness
property that is expressed in a propositional temporal logic such as
linear temporal logic (LTL) or computation tree logic (CTL).
These logics can express safety (e.g., no two processes can be in
the critical section at the same time) and levelness (e.g., every job
sent to the printer will eventually print) properties [1], [10]–[12].
Model checking has been effectively applied to reasoning about
correctness of hardware, communication protocols, software
requirements, etc.
Many industrial model checkers have been developed,
including Simple Promela Interpreter (SPIN) [8] and Symbolic
Model Verifier (SMV). Whereas model-checking techniques
focus on the absolute guarantee of correctness—it is
impossible that the system fails in practice, such rigid notions
are hard, or even impossible, to guarantee. Instead, systems
are subject to various phenomena of an uncertainty nature,
such as message incomplete or garbling and the like, and
correctness—with 99% chance the system will not fail or the
system will not fail most often—is becoming less absolute. To
ISSN: 2231-5381
handle with the systematic verification which has something
to do with uncertainties in probability, Hart Sharir [7]
investigated the logic of timing sequence in probability
propositions and applied probability theory to model checking
in which the uncertainty is modelled by probability measure.
Baier and Katoen [2] systematically introduced the principle
and method of model checking based on probability.
Fig.1 Frequency voltage controlling system
This will measure and related applications with Markov
chain models for probability systems. On the other hand, since
Zadeh proposed the theory of fuzzy sets in 1965, many
scholars have been devoting themselves to the research in this
theory and its applications. As a branch of the theory of fuzzy
sets, possibility measure (more general, fuzzy measure is a
development of classical measure, which focuses on non
additive cases (cf., [9] and that are different from the cases
focused by probability measure which is additive.
Most problems in real situations are complicated and non
additive. As a matter of fact, fuzziness seems to pervade most
human perception and thinking processes as noted by Zadeh,
especially modelling human-centred systems, for example,
biomedical systems [16], criminal trial systems, decisionmaking systems [6], and linguistic quantifiers. Therefore, it is
necessary to do some research work in the theory and
applications of model checking on nondeterministic systems
of no additive measure, especially, fuzzy measure. In addition,
this paper attempts to initiate an LTL model checking that is
based on possibility measure. In this paper, the notion of the
possibility Kripke structure is introduced by combining the
system with fuzzy uncertainty, and then a possibility measure
is induced by the given possibility Kripke structure.
Linear-time properties specify the traces that a possibility
Kripke structure should exhibit. Informally speaking, one could
http://www.ijettjournal.org
Page 329
International Journal of Engineering Trends and Technology (IJETT) – Volume 8 Number 7- Feb 2014
say that a linear-time property specifies the admissible (or 1.2 Variable-Size External Repositor
desired) behaviour of the system under consideration. In the
following, we provide a formal definition of such properties.
The external repository is a bounded elite archive used for
This definition is rather elementary and gives an example of preserving the non dominated solutions found along the search
what a linear-time property is. In particular, the possibilities of process. After the initialization of each searching group, the
model checking of reach ability and repeat reach ability are initial repository is determined by the non dominated members
studied, which can be proceeded by solving certain fuzzy obtained in the initial population. For each iterative step of the
relation.
MGSO algorithm, each non dominated individual obtained in
the new generation of the population is checked for dominance
with the solutions in the current repository. The following is
the dominance comparison strategy adopted for updating the
archive:
1) In case the new solution obtained is infeasible or
dominated by other members in the population, the solution
will not be saved into the repository.
2) If a non dominated member in the population cannot be
dominated by any solution in the current repository, the
solution will be saved into the repository.
3) Any dominated solution in the current repository by this
non dominated member will be removed from the repository.
Though a large-size memory of the elite repository tends to
represent the better characteristics of the PF, it would lead to
explosion in the computational burden due to the dominance
comparisons [8]. Therefore, the number of PF solutions saved
in the repository, i.e., the size of the PF, should be limited. In
this paper, a variable-size external repository, which can be
resized on demand, is adopted.
After each iterative step of the algorithm, the repository
will be resized to cover the entire non dominated set, including
new non dominated members and the survival solutions in the
repository. The resized repository could further be shrunk if
the hierarchical clustering was adopted. In (4)–(10), Im is rms
value of the excitation current; Ic(L) and Ic(C) are the rms
values of the control winding current for the inductive load
and the capacitive load, respectively; Ipc is rms value of the
Fig. 2 Systematic Voltage Stability Calculation
auxiliary excitation capacitor current; Ip and Ir are rms values
of the power winding current and the rotor current,
1.1 Algorithm Framework
respectively; ILp and ILq are the rms values of the active and
reactive currents of the load, respectively; Em is the rms value
In the proposed MGSO, various stochastic global searching of the back EMF; Up is the rms value of the power winding
and probability selection techniques have been integrated for voltage; Rp,Rc , and Rr are the equivalent resistances of the
different types of swarm members. Firstly, the population of power winding, the control winding, and the rotor,
MGSO consists of multiple searching groups, and each group is respectively; Xm is the magnetization reactance;Xlp andXlr are
designed based on producer-scrounger model [18] for each the leakage reactance of the power winding and the rotor,
objective of the MOPD problem. For each searching group, respectively; P is the real power transmitted for the rotor to the
there are four categories of swarm members for four different stator; ω is the angular synchronous frequency; s is the slip.
searching strategies as follows:
Using (9) and (10), the control winding reactive current under
1) Producer: this member is designated to the member different speeds and loads can be calculated. Because the
conferring the best single-objective fitness for each iteration, control winding current phasor and the excitation current
and it is the group leader which has a critical impact on the phasor is the same or opposite, the calculation results from (9)
overall searching direction of the group.
and (10) actually has indicated the situation of the reactive
2) Scroungers: except for the producer, 80% of the remaining power provided by the control winding.
feasible members are selected randomly as scroungers which
If the calculation result is positive, the control winding
constitute the main searching force in the algorithm. Thus, the
should supply some inductive reactive power for the DWIG.
update policy of this swarm should take all the objectives into
At this time, the SEC on the control-winding side is
account through social cooperative mechanism among groups.
equivalent to a capacitor, and plays a role in excitation. The
3) Rangers: the remaining feasible members in the group are
larger the calculation result is, the more inductive reactive
rangers, and they can move in an unpredictable dispersion to
power the control winding provides. If the calculation result
discover resource globally.
is negative, the control winding should provide some
4) Infeasible members: the update policy of this swarm
capacitive reactive power for the DWIG. At this moment,
should be a constraint satisfaction process for handling the
the SEC on the control-winding side is equivalent to an
complex constraints. Also, every individual in the
inductance, and plays a role in demagnetization.
population has a current position
ISSN: 2231-5381
http://www.ijettjournal.org
Page 330
International Journal of Engineering Trends and Technology (IJETT) – Volume 8 Number 7- Feb 2014
The smaller the calculation result is, the more capacitive approach. Several demonstrators have been realized for the
reactive power the control winding provides. The 13-point different modelling approaches. Table I gives an overview of
linearization technique is applied by employing the procedure the state of the art.
presented in Section II-C. Hence, 13 steady-state operating
points are determined under 13 different output power
conditions of wind generation. The values of stability indices (x1.4 Objective
axis) and their sensitivities with respect to the firs wind power
output (y-axis) are calculated at each steady-stat operating point
This work is dedicated to AC emulation, the most recent
by deterministic analysis and plotted in Fig.3 as an example. It power emulation approach. As an extension of the author’s
can be seen from Fig. 3 that the sensitivity of stability indices previous work, the first hardware demonstrator is presented.
has a noticeable change with the increase of wind power
At this early stage of development, we focused on the
penetration level. This explains that the conventional method speed aspect. Thus, the scope is to prove the high-speed
based on one-point linearization may not provide accurate capabilities of AC emulation with simple models, in fact, the
result.
models used at the beginning of power system simulation
development. This permits to clearly separate microelectronic
influences and power system theory aspects leading to
precious conclusions for going a step further with less
implementation risks.
This paper is divided into 7 sections: general approach to
keep the modularity of analog emulators, general description
of AC emulation emphasizing the differences between the two
emulation approaches, specific description of the first AC
demonstrator, behavioural model validation, microelectronic
implementation with scaling issues, results of hardware testing
and conclusion.
II. FLEXIBILITY
Fig. 3 Linearized Stability Analysis
1.3 State of the Art
Currently, three different implementations of power system
dynamic simulation using analog emulation are under
development. Their progress can be found in the literature [4]–
[11]. These implementations are based on two different
modelling approaches called “Phasor emulation approach” and
“AC emulation approach”, respectively. The Phasor emulation
approach [1], [4]–[7] is based on a mathematical representation
of the grid. It uses a complex representation of voltages and
currents in the grid. Two isolated and resistive networks are thus
realized in order to emulate separately the real and imaginary
part of the grid’s current and voltages.
It provides the downscaled envelopes of the real power
system signals. The power grid is implemented with analog
components, whereas the generator and load models can be
implemented using purely analog, mixed or purely
numerical implementations. AC emulation [8]–[11] is
instead based on a one-to-one mapping of the components
of the real power system by emulating their behaviour on
dedicated analog (micro)-electronics.
Frequency dependence of the elements is preserved and the
signals propagating on the emulated grid are the shrunk and
downscaled current and voltage waves (AC signals) of the real
power system. As such, this approach is termed AC emulation
ISSN: 2231-5381
One main consideration for simulators is their modularity.
Analog emulation approaches are often seen as too rigid
compared to numerical simulators. Indeed, in numerical
simulators, the topologies, the characteristic of the elements
and the models used to characterize the different power system
components can simply be changed through the software. No
hardware changes are needed. The authors developed a
concept called Field Programmable Power Network System
(FPPNS) [12] in order to enhance the flexibility of antilog
emulation approaches.
The concept is based on an array of reconfigurable basic
blocks called power system Atoms (PSA). Each PSA is
composed of the basic elements of a power system. Hence it
contains at least a generator model (GM), a load model (LM)
and some analog transmission line models. The analog
transmission lines are used to interconnect the atoms. Fig. 2
shows a possible PSA topology. Each element of a PSA is not
only reprogrammable but is also equipped with switches.
Therefore it is possible to emulate different power system
topologies and scenarios without changing the hardware. A
possible PSA array is depicted in Fig.2. It includes PSA atoms
connected through their transmission lines and a
communication bus A user flow example is depicted in Fig. 3.
The power system topology under investigation and the
system parameters are set through the UI (i.e., a personal
computer). This information is then converted into the
corresponding emulated network parameters and transmitted to
the PSA array through the communication bus.
Once the initial values are set, the operating point of the
network (known as the steady state of the power system) is
automatically reached and the system is ready to emulate the
response of the power system to a particular perturbation event
data is extracted and evaluated on-chip.
http://www.ijettjournal.org
Page 331
International Journal of Engineering Trends and Technology (IJETT) – Volume 8 Number 7- Feb 2014
Therefore, only a limited amount of information has to be
depends entirely on the implementation of the generator and
sampled and transmitted to the UI for monitoring. With such
load models. Pure analog implementations are thus more rigid
an approach, the flexibility of emulation becomes
in terms of models than mixed-signal implementations such as
comparable to the flexibility of numerical simulators in term
proposed.
of topology and configurability of the elements.
The authors are aware of the fact that FPPNS does not
guarantee the flexibility in terms of models. This flexibility
Fig. 4 Output Voltage and Resistance of OTA
2.1 Optimization Model Formulation Concept
Phase emulation provides the downscaled envelopes of the
real power system signals. Frequency dependence of the
elements is thus lost. AC emulation aims to keep frequency
dependence of the elements. Theoretically, it becomes possible
to simultaneously analyze various types of stabilities with
different time constants after the occurrence of a contingency.
Practically, of course, this depends additionally on the models
that are implemented. A high-speed, multiple-phenomena-inone simulator would be a very powerful tool for upcoming
power system challenges which could be achieved using AC
emulation. While large-scale PEVs can bring significant
benefits, there are costs in the coordination of PEV charging
and discharging. The cost-benefit analysis (CBA) of a
coordination strategy for the optimal coordination of large scale
PEV charging and discharging is crucial for power system
planning or supporting PEV-related decision or policy making.
In this section, we present how to calculate the benefits and
costs of a coordination strategy for optimal control of charging
states of large scale PEVs as a part of power system planning
from a social welfare perspective.
Some assumptions are made based on the Similar to the
benefits, we conduct the cost calculation in CBA as a part of
power system planning with a focus on social welfare. The
costs that can be incurred in implementing a coordination
strategy for large scale PEVs in a power grid come from
various aspects, as shown in Table II. The method of
calculating the costs is concerned with the costs of
construction, maintenance, and the upgrade of the
charging/discharging infrastructure, including the control
systems and the cost of energy consumed for the
coordination of PEV charging and discharging.
ISSN: 2231-5381
The annual cost, denoted by , is composed of a fixed annual
cost for the building and maintenance of the infrastructure, such
as the power electronic devices, the communication systems and
IT devices, and a variable cost resulting from energy loss and
battery degradation.
III FORMULATION
The key question addressed by the formulation is how to
optimally invest in capacity enhancement to mitigate seismic
risk on power networks. We measure the performance of the
power network as the sum of the power generating costs and
load shed costs under a set of consequence scenarios, that model
the seismic hazard in the region and vulnerability of the network
to that hazard.
The electric power transmission system investment planning
model is formulated as a two-stage stochastic program. A two
stage stochastic program is an optimization model formulation
that incorporates uncertainty in the parameters of the model. The
two-stage structure assumes that all decisions are made at one
time instant prior to the resolution of all uncertainty. In this case,
the uncertainty revolves around what damage will occur to each
component in the electric power system.
This uncertainty is expressed through the use of a
number of consequence scenarios, where each consequence
scenario gives the damage to each component. The
decisions are made in what is termed the “first-stage” of the
model. In our formulation, the first-stage is the
identification of what components in the electric power
system should be enhanced. The consequences of those
decisions, under each consequence scenario, occur in the
“second-stage” of the model. In this problem formulation,
the second-stage is the power flow across each component
http://www.ijettjournal.org
Page 332
International Journal of Engineering Trends and Technology (IJETT) – Volume 8 Number 7- Feb 2014
including what demands for power are not satisfied under
transformers is 6 months. For low voltage transformers, we
each consequence scenario.
assume that the operator would have access to spares within a
We first introduce the topology of the power network. Let D month.
be the set of transmission lines. Let be the set of substations. Let
be the set of generators. Let be the set of buses. Let be the set of
3.2 Small Signal Rotational Angle
generators connected to bus . We define the first-stage binary
decision variables as follows. Let take integer values 0, 1 or 2
Therefore, all the components in substations under complete
representing the number of capacity increments to add to the damage are back to normal within a month with the exception of
capacity of power generator. The cost to add a discrete medium and high voltage transformers which is 6 months. For
increment to the existing capacity of generator.
transmission lines we only model two levels of damage:
Let take integer values from 0 to 4 representing the number extensive and complete. Extensive damage for a transmission
of increments to add to the transmission capacity for line The line corresponds to a damage ratio of 50% of the total cost of the
cost to add a discrete capacity increment to the existing capacity line and complete damage results in costs totalling the full cost
of transmission line is . We assume that the total available of the line. Transmission lines under extensive damage can be
budget for transmission capacity and power generation repaired within 3 days and under complete damage within a
enhancement is . Since the total investments to add capacity to week. This implies that by the end of 6 months, in the worst
the components cannot exceed the available budget, In practice, case, the system is back to normal. The analysis focuses on
transmission line and generation enhancement increment units damage to transformers not damage to other substation
and maximums are specific to each component.
components because transformers typically drive the restoration
When available, the proposed model can be easily adjusted to process due to their long repair lead-times.
include the specific incremental units for each component. In
The analysis does not include damage to generators because
the absence of the exact information we propose to use the total they generally perform better than the rest of components in
component’s capacity as reference to the incremental unit. The power networks. From a modelling perspective, this implies that
percentage of the capacity and maximum capacity to add for the repair process is composed of 4 time periods. The first period
transmission lines and generators were selected to reflect the extends from the event to the end of the third day. By then
sense that there are more variations in the transmission line transmission lines that have experienced extensive damage have
upgrade. Transmission line enhancement is modelled as discrete been restored. Also, substations under moderate damage have
increments of a quarter of total original capacity of the line.
been repaired. The second time period extends from the
beginning of day four to the end of the first week.
3.1 Voltage Buffer
By then transmission lines that have experienced complete
damage have been repaired as well as substations under
Generation enhancement is modelled as discrete increments extensive damage. The third time period extends from the end of
of a fifth of initial capacity. The cost of the enhancement is the first week to the end of the first month. By the end of this
modelled as a percentage of the total cost of the line or time period, low voltage transformers will have been replaced.
generator. Capital costs and operational unit cost of generation The final time period extends from one month to six months. Six
unit were obtained from [20]. Line capacity enhancement costs months after the event, medium and large voltage transformers
were extracted from [21]. All the costs were converted to 2002 will have been replaced.
U.S. dollars and adjusted to make them consistent among
The following notation encapsulates these time period
sources. Requiring the enhancements to be discrete is more definitions. Let, days, week, month, and months, then is the time
widely representative of practically feasible upgrades such as length in days of period. It is important to observe that the
re-conduct ring, changes in operational limits with improved uncertainty in the repair times could have been integrated into
coordination or controls, or adding another generating unit.
the scenario definitions. This would likely lead to more than four
Based on the HAZUS seismic risk assessment
time periods.
methodology [19], five damage states are defined for
electric power components: none, minor, moderate,
3.3 A & B System
extensive and complete. Of those five, we disregard minor
because the damage is not significant in this context.
The second approach, referred to as the introduces some
Moderate damage generates a repair cost of 40% of
approximation. In fact, many solvers are built on a compromise
substation cost and does not affect any of the transformers in
between speed and accuracy. In stability studies, even the
the substation. Extensive damage is assumed to imply
integrated scheme with small time steps but too demanding
damages costing 70% of the value of the substation
electromagnetic transient simulation. A similar trade off is
including impacting 50% of the transformers in the
accepted when resorting to dynamic equivalents. The localized
substation.
Newton scheme presented in this paper exploits the fact that, in a
Complete damage causes the complete loss of the substation
large-scale system, many components have little participation in
including all the transformers. presents restoration curves for
the dynamic response and hence can be replaced by a less
substations, lines and generators for different damage stages
demanding simplified model.
[19]. The mean time for repair is 3 days for moderate damage
and a week for extensive damage. For substation restoration
That replacement is controlled by a single tolerance
under complete damage, the mean value is 30 days; however,
parameter. The computational effort is thus localized on the
repairs can vary depending on the difficulty with which some
components with significant response. The BBD structure is
components such as transformers can be replaced. We assume
further exploited to this purpose. Localization concepts have
that the average lead-time for medium and high voltage
been used in time-domain simulation in the multi rate method
ISSN: 2231-5381
http://www.ijettjournal.org
Page 333
International Journal of Engineering Trends and Technology (IJETT) – Volume 8 Number 7- Feb 2014
[12]. They have been also applied to static security analysis
to two buses, such as HVDC links, TCSCs, etc. is
[13]. Similar techniques have been used in the simulation of
considered.
VLSI circuits [14], where components little affected by a
The state vector and the matrix can be split into and , relative
disturbance are called latent.
to the th injector. Without loss of generality, it is assumed that
the first two (out of ) components of are and , the rectangular
components of the complex current injected into the network,
The idea behind localization is to detect injectors with low
dynamic activity (classified as latent) and replace their original
models with much simpler mathematical relations. The rest of
the injectors (classified as active) continue being solved without
approximation. The resulting algorithm is referred.
3.4 Newton scheme.
Fig. 5 Integrated Scheme of Transmission
Equation (4) has a structure that reflects the physical
structure of the system, i.e., a set of injectors interacting
through the network only, as illustrated in Fig. 1. In this
paper, the term “injector” designates any equipment
connected to the network, such as a synchronous machine
with its controllers, an induction motor, a dynamic or static
load, or a static var compensator. The generic model
considered hereafter is illustrated in an example in
Appendix B, while the extension to components connected
Thus, an active injector is solved with the same accuracy as in
a detailed simulation. The techniques detailed in Section IV-B
apply to those injectors and allow performing less iterations on
injectors with lower dynamic response. For a latent injector, on
the other hand, (13) are not solved at all. Its vector is even not
computed.
Fig. 6 Probabilistic Measurement on Switching Frequency
IV Identifying Latent Injectors
Which injectors are latent and which ones are active
cannot be decided a priori because it depends on the
simulated disturbance. Furthermore, an injector may change
from active to latent after some transients have died out and
then switch back to active under the effect of the system
evolving. The linearization instant is defined as the last time
the injector changed from active to latent. At the beginning
of the simulation, is initialized to zero for all injectors. After
extensive tests, the following latency identification rules
were found the most satisfactory by the authors.
1) For a “probationary” period after the initial
disturbance, all
injectors are active, in order to
collect information about their level of dynamic activity.
ISSN: 2231-5381
2) At the end of each time step, say at time : an injector
switches from active to latent if its current components have not
changed by more than a threshold.
In this paper, we studied several important possibility
measures of LT properties and LTL formulas corresponding to
them. Concretely, we introduced the notions of LT properties;
several particular LT properties such as reach ability and
repeatedly reach ability were introduced. More generally, LT
properties such as regular safety properties and regular
properties using automata theory were studied.
http://www.ijettjournal.org
Page 334
International Journal of Engineering Trends and Technology (IJETT) – Volume 8 Number 7- Feb 2014
[16] Y. Hu, L. Zhang, W. Huang, and F. Bu, “A fault-tolerant
V Conclusion
This model checking that is based on possibility measure and
fuzzy measure extension of classical model checking. emulators
aim to complete nowadays high-performance and highprecision numerical simulators by proposing solutions to their
speed, cost and size bottlenecks. Such high spec emulators
would certainly contribute to the operation security of the
emerging Smart Grids. Moreover, the here presented work has
shown that the AC emulation approach is ready to b
implemented as FPPNS to go a step further and prove the
suitability of such simulator for large-scale topologies Both the
possibilistic and probabilistic model checking solve certain
uncertainty of error or other stochastic behaviour occurring in
various real-world applications. This paper presents the
successful achievement of the first step in the development of a
large-scale, multi-phenomena, high-speed power system
simulator based on AC emulation.
induction
generator system based on instantaneous torque control (ITC),” IEEE
Trans. Energy Convers., vol. 25, no. 2, pp. 412–421, Jun. 2010.
[17] O. Ojo and I. E. Davidson, “PWM-VSI inverter-assisted stand-alone dual
stator winding induction generator,” IEEE Trans. Ind. Appl., vol. 36, no.
6, pp. 1604–1611, Nov./Dec. 2000.
VI REFERENCES
[1] K. Emadi and M. Ehsani, “Aircraft power systems: Technology, state of
the art, and future trends,” IEEE Aerosp. Electron. Syst. Mag., vol.
15, no. 1, pp. 28–32, Jan. 2000.
[2] Y. Hu,W. Huang, and Y. Li, “A novel instantaneous torque control scheme
for induction generator systems,” IEEE Trans. Energy Convers., vol.
25, no. 3, pp. 795–803, Sep. 2010.
[3] J. Chang and A. Wang, “New VF-Power system architecture and
evaluation for future aircraft,” IEEE Trans. Aerosp. Electron.
Syst., vol. 42, no. 2, pp. 527–539, Apr. 2006.
[4] (2013). [Online]. Available: http://www.boeing.com/
[5] (2013). [Online]. Available: http://www.airbus.com/
[6] A. Griffo, D. Drury, T. Sawata, and P. H. Mellor, “Sensorless starting of a
wound field synchronous starter/generator for aerospace applications,”
IEEE Trans. Ind. Electron., vol. 59, no. 9, pp. 3579–3587, Sep.
2012.
[7] S. Rosado, X. Ma, G. Francis, F. Wang, and D. Boroyevich, “ModelBased digital generator control unit for a variable frequency synchronous
generator with brushless exciter,” IEEE Trans. Energy Convers., vol.
23, no. 1, pp. 42–52, Mar. 2008.
[8] Y. He, Y. Wang, Y. Feng, and Z. Wang, “Parameter identification of an
induction machine at standstill using the vector constructing method,”
IEEE Trans. Power Electron., vol. 27, no. 8, pp. 905–915, Feb. 2012.
[9] R. C. Bansal, T. S. Bhatti, and D. P. Kothari, “Bibliography on the
application of induction generators in nonconventional energy systems,”
IEEE Trans. Energy Convers., vol. 18, no. 3, pp. 433–439, Sep. 2003
[10] G. Quinonez-Varela and A. Cruden, “Modelling and validation of a
squirrel cage induction generator wind turbine during connection to the
local grid,” IET Generation. Transmiss. Distrib., vol. 2, no. 2, pp.
301–309, Mar. 2008
[11] M. Mengoni, L. Zarri, A. Tani, G. Serra, and D. Casadei, “A comparison
of four robust control schemes for field-weakening operation of induction
motors,” IEEE Trans. Power Electron., vol. 27, no. 1, pp. 307–320,
Jan. 2012.
[12] G. Hua, D. Xu, B.Wu, andW. Huang, “Direct voltage control for a
standalone wind-driven self-excited induction generator with improved
power quality,” IEEE Trans. Power Electron., vol. 26, no. 8, pp.
2358–2368, Aug. 2011.
[13] I. Alan and T. A. Lipo, “Starter/generator employing resonantconverterfed induction machine—Part I: Analysis,” IEEE Trans.
Aerosp. Electron. Syst., vol. 36, no. 4, pp. 1309–1318, Oct.
2000.
[14] M. Naidu and J. Walters, “A 4-kW 42-V induction machine based
automotive power generation system with a diode ridge rectifier and a
PWM inverter,” IEEE Trans. Ind. Appl., vol. 39, no. 15, pp.
1287–1293, Sep. 2003.
[15] R. Leidhold, G. Garcia, and M. Valla, “Induction generator controller
based on the instantaneous reactive power theory,” IEEE Trans.
Energy Convers., vol. 17, no. 3, pp. 368–373, Sep. 2002.
ISSN: 2231-5381
http://www.ijettjournal.org
Page 335
Download