2023
DOI: 10.1142/s0218126624500117
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Control Strategy for an Extended Switched Coupled Inductor Quasi-Z-Source Inverter for 3Φ Grid Connected System

Abstract: An effective hybrid control technique for an extended switched coupled inductor quasi-Z source inverter for 3[Formula: see text] grid-connected photovoltaic (PV) system is proposed in this paper. The proposed hybrid system is a joint implementation of Recalling Enhanced Recurrent Neural Network (RERNN) with Chaotic Henry Gas Solubility Optimization (CHGSO); hence it is named as hybrid RERNN-CHGSO. The main objective of this work is to maximize power extraction to manage the performance of the PV system. The ES… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 29 publications
(1 citation statement)
references
References 39 publications
0
1
0
Order By: Relevance
“…As a result, they are attacked and hacked by botnets that can be employed for initiating distributed denial-of-service (DDoS) against associations (Karthick, Senthilselvi, et al, 2023;Khan et al, 2021;Wang et al, 2022). Network intrusion detection systems (NIDSs) can be executed in IoT networks to preserve three security principles of information systems; they are availability, confidentiality, and integrity (Meenalochini et al, 2023;Rahman et al, 2021;Shajin et al, 2022). It analyzes and scans network traffic to find patterns and signs that denote an effective assault.…”
Section: Introductionmentioning
confidence: 99%
“…As a result, they are attacked and hacked by botnets that can be employed for initiating distributed denial-of-service (DDoS) against associations (Karthick, Senthilselvi, et al, 2023;Khan et al, 2021;Wang et al, 2022). Network intrusion detection systems (NIDSs) can be executed in IoT networks to preserve three security principles of information systems; they are availability, confidentiality, and integrity (Meenalochini et al, 2023;Rahman et al, 2021;Shajin et al, 2022). It analyzes and scans network traffic to find patterns and signs that denote an effective assault.…”
Section: Introductionmentioning
confidence: 99%