Off – Line Optimization of Strategic and Design Parameters of a Hybrid Stand-Alone Wind/Solar/Fuel Cell/Battery System
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: Energy management strategy governs the performance and efficiency of the system. This paper reports the use of an innovative strategy that implements monthly power split parameters to decide the division of load between the fuel cell and the batteries. These parameters are optimized and derived from swarm intelligence during the optimal sizing of a wind/PV/battery/Fuel cell configuration along with the optimized numbers of solar panels, wind turbines, fuel cells, batteries, DOD of batteries and the amount of hydrogen storage requirement. The energy management strategy also divides the operation of the system into five modes.While wind and solar form the primary sources of energy, batteries and a fuel cell stack forms the secondary and primary back-up source respectively. Two parameters, expected value of energy not served and the per-unit cost, have been chosen for the justification of the most optimal configuration. An adaptive particle swarm optimization is used for optimal sizing and a couple of radial basis neural networks trained with reset particle swarm optimization are used to calculate the life of batteries and fuel cell under specific operating conditions, thus helping us to maximize the life of fuel cells.
Authors and Affiliations
Soumyadeep Nag , Namitha Philip
Lightning Strike and Thunder and its Effect on Television Signal Transmission
Abstract: The lightning strike and thunder and its effect on television signal transmission in Nigerian Television, NTA Abakaliki Nigeria was analyzed. From the analyses, it was observed that lightning and thunder strike...
Stegnography in video files using Multivariate Regression and Flexible Macroblock Ordering
Abstract: Data hiding is the ability of embedding data into a digital cover with a minimum amount of perceivable degradation, i.e., the embedded data is invisible or inaudible to a human observer. Data hiding consists of...
Authentication of grayscale document images using shamir secret sharing scheme.
Abstract: This paper proposed a new blind authentication method based on the secret sharing technique with a data repair capability for grayscale document images .Shamir proposed threshold secret sharing scheme in...
An improved Item-based Maxcover Algorithm to protect Sensitive Patterns in Large Databases
Privacy Preserving Data Mining(PPDM) is a rising field of research in Data Mining and various approaches are being introduced by the researchers. One of the approaches is a sanitization process, that transform...
Improving Cloud Security Using Data Mining
Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). It does offer great level of flexibility but this advantage comes...