Fuzzy-PID Control Method of Hybrid Derived Boost Converter (HDBC) Using Wind Energy


  • Vinoth Kumar G


HDBC, Wind source, Micro Grid, Fuzzy-PID controller.


The hybrid converters are provides the energy to the load with better efficiency. The method of supplying the energy to the both loads such as AC load and DC load are done by using multi converters. More than one converter is used for AC and DC outputs in applications of micro grid as well as nano grid. Therefore the components are increased due to the utilization of more converters. This paper proposes HDBC which is supply the simultaneous DC and AC loads and the input power is obtained from the wind energy system. The system circuit consists of a power switch of the boost converter with single switch and the single phase inverter. The proposed HDBC gives a high reliability outputs for DC and AC loads using PID-fuzzy logic controller. For the system which has DC loads as well as AC loads simultaneously, Such a HDBC is well suited. The output of this proposed system provides high gain with the better efficiency. The output results of the proposed system are verified using in MATLAB/ Simulink.


Download data is not yet available.

Author Biography

Vinoth Kumar G

PG Student, Power Electronics and Drives, Department of Electrical and Electronics Engineering, St. Peters Institute of Higher Education and Research, Avadi, Chennai -600 054, Tamilnadu, India.


[1] Wu, X., Zhu, X., Wu, G.Q. and Ding, W., “Data mining with big data. IEEE transactions on knowledge and data engineering,” in IEEE transactions on knowledge data engineering. 2013, pp. 97–107.

[2] Xu, L., Jiang, C., Wang, J., Yuan, J. and Ren, Y., “Information security in big data: privacy and data mining. Ieee Access,” in Ieee Access. 2014, vol, pp. 1149–1176.

[3] Cheung, D.W., Lee, S.D. and Xiao, Y., “Effect of data skewness and workload balance in parallel data mining”, IEEE IEEE Transactions on Knowledge and Data Engineering, pp. 498-514, 2002.

[4] Saygin, Y. and Ulusoy, Ö., “Exploiting data mining techniques for broadcasting data in mobile computing environments,” in IEEE Transactions on Knowledge and Data Engineering, 2002, pp.1387-1399.

[5] Feng, Z. and Zhu, Y.,, “A survey on trajectory data mining: Techniques and applications,” in IEEE Access 2016, pp. 2056–2067.

[6] Cao, L., “Social security and social welfare data mining: An overview IEEE Transactions on Systems, Man, and Cybernetics, 2012,pp.837-853

[7] Ming, J., Zhang, L., Sun, J. and Zhang, Y., “Analysis models of technical and economic data of mining enterprises based on big data analysis”, IEEE 3rd International Conference on Cloud Computing and Big Data Analysis (ICCCBDA), 2018, pp 224-227.

[8] Kalegele, K., Sasai, K., Takahashi, H., Kitagata, G. and Kinoshita, T., “Four decades of data mining in network and systems management,” in . IEEE Transactions on Knowledge and Data Engineering, 27(10), 2015, pp. 2700-2716.

[9] Hajian, S. and Domingo-Ferrer, J., “A methodology for direct and indirect discrimination prevention in data mining.,” in IEEE transactions on knowledge and data engineering, 25(7), 2012, pp. 1445-1459.

[10] Zhang, N. and Zhao, W., “Privacy-preserving data mining systems” in Computer, 40(4), 2007, pp. 52-58.

[11] Musolesi, M., “Big mobile data mining: Good or evil?.” in IEEE Internet Computing, 18(1), 2007, pp.78-81.

[12] Li, Y., Chen, M., Li, Q. and Zhang, W., “Enabling multilevel trust in privacy preserving data mining” in IEEE Transactions on Knowledge and Data Engineering, 24(9),2011, pp.1598-1612.

[13] Feng, M., Zheng, J., Ren, J., Hussain, A., Li, X., Xi, Y. and Liu, Q., “Big data analytics and mining for effective visualization and trends forecasting of crime data,” in IEEE Access, 2013, pp.106111-106123.

[14] Akay, A., Dragomir, A. and Erlandsson, B.E., “A novel data-mining approach leveraging social media to monitor consumer opinion of sitagliptin.” in IEEE journal of biomedical and health informatics, 19(1),2012, pp.389-396.

[15] Thuraisingham, B., “A primer for understanding and applying data mining..,” in It Professional, 2(1), 2000, pp.28-31.