Volume 6, Number 2 (June 2010)                   IJEEE 2010, 6(2): 84-92 | Back to browse issues page

XML Print

Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Thangaprakash S, Krishnan A. Implementation and Critical Investigation on Modulation Schemes of Three Phase Impedance Source Inverter. IJEEE. 2010; 6 (2) :84-92
URL: http://ijeee.iust.ac.ir/article-1-291-en.html

Abstract:   (7999 Views)
New control circuits and algorithms are frequently proposed to control the impedance (Z) source inverter in efficient way with added benefits. As a result, several modified control techniques have been proposed in recent years. Although these techniques are clearly superior to the simple boost control method which was initially proposed along with the Z-source inverter (ZSI), little or conflicting data is available about their merits relating to each other. In this paper, it is shown how the shoot-through periods are inserted in the switching waveforms of the power switches and the performances of them are analyzed based on the operation of ZSI. Simple boost control, maximum boost control, constant boost control and space vector modulation based control methods given in the literature has been illustrated with their control characteristics. A critical investigation on ripples of the impedance source elements, output voltage controllability, output harmonic profile, transient response of the voltage across the impedance source capacitor and voltage stress ratio etc has been presented with the simulation results. The simulation results are experimentally verified in the laboratory with digital signal processors (DSP). DSP coding for the above all control techniques has been generated by interfacing Matlab/Simulink with DSP C6000 tool box and signal processing block set.
Full-Text [PDF 598 kb]   (2280 Downloads)    
Type of Study: Research Paper | Subject: Power Converters
Received: 2010/06/9

Add your comments about this article : Your username or email:
Write the security code in the box

© 2015 All Rights Reserved | Iranian Journal of Electrical and Electronic Engineering

Designed & Developed by : Yektaweb