This paper presents ac-dc converter utilising current control mode to obtain unity p.f. Many applications demanding ac-dc converter require stable dc voltage at the terminals with better steady state and transient performance, which is accomplished by boost converters. These converter produce higher, regulated dc output voltage and simultaneously improving the p.f. Utilising control techniques of current, it is observed that input current can be made to follow input sinusoidal voltage wave thus shaping the input current and reducing harmonics distortion and bringing p.f. to almost unity. Amongst various current control strategies hysteresis current mode in CCM mode control is preferred. Simulation is done in PSIM software.
- Aparna ChaturvediM.Tech 2nd Year
- Vinesh AgarwalHOD Electrical Dept.
References
[1] Supratim Basu, Math H.J.Bollen and Tore M.Undeland, "PFC strategies in Light of EN 61000-3-2", EPE PEMC Conference, Riga, Latvia, 1-3 September 2004. [2]W.Wolfle, Hurley W.G, "Power Factor Correction and Harmonic Filtering for AC/DC Converters", 28th Annual IEEE IndustrialElectronics Conference-IECON, Vol.4,2002, pp. 3238-3243. [3] Huai Wei, Issa Batarseh, Senior Guangyong Zhu and Peter Kornetzky, " A Single-Switch AC– DC Converter with Power Factor Correction", IEEE Transactions on Power Electronics, Vol. 15, No. 3, May 2000, pp. 421-430. [4] Tse.C.K, "Classification And Derivation Of Switching Power Converters With Power Factor Correction and Output Regulation", Third International Conference on Power Electronics and Motion Control- IPEMC, Beijing, Vol.2, 2000. [5]J.W.Kimball ,P.T.Krein,Y.Chen, "Hysteresis Current and Delta Modulation Control Converters using sensor less Current Mode"IEEE Trans. Power Electronics,Vol.21,Issue 4,pp 1154-1158,July 2006. [6] N.A.Rahim, J.Selvaraj, C.Krismadinata, "Hysteresis current control of sensorless MPPT for grid connected photo voltaic system",Proc.IEEE ,ISIE ,pp 572-577,2007. [7] L.Rosseto, G.Spiazzi, P.Tenti, " Control techniques for power factor correction converters",,Department of Electrical Engineering, Department of Electronics and Informatics,University of Italy,pp 1-9,1994. [8] PSIM User Manual Guide", Powersim Inc., May, 2001.
Aparna Chaturvedi, Vinesh Agarwal "Performance Analysis of Power Factor Correction for Converters using Hysteresis Current Mode Control" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.1 issue 8, pp.10-14 2012
E-business is a powerful tool for business transformation to 21st century that allows companies to enhance their supply chain operation reach new market and improve services for customers as well as for providers. The development and improvement of technologies have brought success towards e-business. High technologies attracted people misuse the technologies such as hackers and cybercrime which they can access to e-business privacy easily. This article examines the issues related to the security of the assets and transactions in the e-business components and activities. Since a large business community is involved and public money at large invested in business, role of information security and privacy is not blown up in this kind of business. This article identifies the need of security, essential components of security and their importance to protect ebusiness from threats. Thus e-business companies should built security circle around business entity. Company should built security and trust to protect e-business customers which in turn will improve e-business prospective. This paper undertake descriptive study on security threats determining the quantum of risk of security threats on e-business and develop a model of total security for secure business transaction using e-business platform.
- Bijender Singh YadavResearch Scholar, JJT University Chudela (Jhunjhunu), India
[1]B. Dahlbom, Postface, Oxford University Press, 2001. [2] Burns S 2002 Unique Characteristic of e-commerce and their effect upon payment system Ver. 1.3 [3] Computer Insecurity Springer Verlag, London 2005 [4] Majumdar C Barik MS, Das S 2003 Final technical report for project development. [5] N. Jarvis, E-commerce and encryption: Barriers to growth, Computers & Security 18 (1999), no. 5, 429-431. [6] P. Jungck and S. Shim, Issues in high speed Internet security, Computer 37 (2004), no. 7, 36-42. [7] S. Katsikas, J. Lopez, and G. Pernul, Trust, privacy and security in e-business: Requirements and solutions, Lecture Notes in Computer Science 3746 (2005),548-558. /
Bijender Singh Yadav "Electronic Business Security Model (EBSM)" International Journal of Latest Technology in Engineering, Management & Applied Science-IJLTEMAS vol.1 issue 8, pp.19-26 2012