Performance of Appropriate Photovoltaic Model
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 2
Abstract
Energy is very important key to improve human life. Due to the global warming and pollution, the new energy source is developed. Photovoltaic is one of these sources that growth in recent decades and has several models. Using the practical and simple modelto compare with other models is necessary, to this purpose in this paper at first the ideal model of photovoltaic is described then appropriate model by using MATLAB software is presented. On other hand knowing the effect of environment of PV characteristics to predict its behavior is important. These models included diode-(diodes), series resistor and source. The temperature and solar irradiation were inputs variable parameters and I-V and P-V characteristic were the outputs. At end, effect of each parameter is presented.
Authors and Affiliations
Rasool Feiz Kenerdian
Reinforcement Learning based Routing Protocols in WSNs: A Survey
Advances in the technology along with reduction in processor size, its memory, and wireless antenna size has facilitated the construction of low cost, low powered and multifunctional Sensor nodes which in turn led to hig...
Detecting The Optic Disc Using Morphology And Histogram based Thresholding
Optic disc (OD) detection is the most important step while developing an automated screening systems for certain diseases. However, it is a cumbersome task to locate Optic disc in all types of retinal images including no...
Identity-Based Localization Attacks in Wireless Networks
Wireless networks are helpless to identity based attacks, as well as spoofing and Sybil attacks, which allow for many other form of attacks on the networks. Even though the identity of a node can be confirmed through cry...
A Survey on Hidden Markov Model for IT Service Management
Network management refers to the actions, techniques, proceedings, and tools that are related to the process, governance, upholding, and stipulating of networked systems. Network management is vital to rule and manage pr...
Preventing mitm attack in simple secure pairing in Bluetooth
Secure simple pairing has been adopted by Bluetooth version “Bluetooth 2.1+EDR(ENHANCED DATA RATE).It should be noted that for establishing Bluetooth connection that uses Diffie hellman public cryptography in its commu...