63 research outputs found

    Addressing Instability Issues in Microgrids Caused By Constant Power Loads Using Energy Storage Systems

    Get PDF
    Renewable energy sources, the most reasonable fuel-shift taken over the naturally limited conventional fuels, necessarily deal with the self-functional microgrid system rather than the traditional grid distribution system. The study shows that the microgrid system, a comparatively low-powered system, experiences the challenge of instability due to the constant power load (CPL) from many electronic devices such as inverter-based systems. In this dissertation, as a methodical approach to mitigate the instability complication, AC microgrid stability is thoroughly investigated for each and every considerable parameter of the system. Furthermore, a specific loading limit is depicted by evaluating the stability margin from the small signal analysis of the microgrid scheme. After demonstrating all cases regarding the instability problem, the storage-based virtual impedance power compensation method is introduced to restore the system stability and literally extend the loading limit of the microgrid system. Here, a PID controller is implemented to maintain the constant terminal voltage of CPL via current injection method from storage. Since the system is highly nonlinear by nature, advanced nonlinear control techniques, such as Sliding Mode Control and Lyapunov Redesign Control technique, are implemented to control the entire nonlinear system. Robustness, noise rejection, and frequency variation are scrutinized rigorously in a virtual platform such as Matlab/Simulink with appreciable aftermaths. After that, a comparative analysis is presented between SMC and LRC controller robustness by varying CPL power. From this analysis, it is evident that Lyapunov redesign controller performs better than the previous one in retaining microgrid stability for dense CPL-loaded conditions. Finally, to ensure a robust storage system, Hybrid Energy Storage System is introduced and its advantages are discussed as extended research work

    Investigation of Degradation of Solar Photovoltaics: A Review of Aging Factors, Impacts, and Future Directions Toward Sustainable Energy Management

    Get PDF
    The degradation of solar photovoltaic (PV) modules is caused by a number of factors that have an impact on their effectiveness, performance, and lifetime. One of the reasons contributing to the decline in solar PV performance is the aging issue. This study comprehensively examines the effects and difficulties associated with aging and degradation in solar PV applications. In light of this, this article examines and analyzes many aging factors, including temperature, humidity, dust, discoloration, cracks, and delamination. Additionally, the effects of aging factors on solar PV performance, including the lifetime, efficiency, material degradation, overheating, and mismatching, are critically investigated. Furthermore, the main drawbacks, issues, and challenges associated with solar PV aging are addressed to identify any unfulfilled research needs. Finally, this paper provides new directions for future research, best practices, and recommendations to overcome aging issues and achieve the sustainable management and operation of solar energy systems. For PV engineers, manufacturers, and industrialists, this review’s critical analysis, evaluation, and future research directions will be useful in paving the way for conducting additional research and development on aging issues to increase the lifespan and efficiency of solar PV

    Design and data analysis for a belt-for-blind for visual impaired people

    Get PDF
    This research designs a new walking support system for the blind people in order to navigate without any assistance from others or using any guide cane. With the help of this device, a user can move independently and able to walk freely almost like a normal person. In this research, a belt for blind wearable around the waist is equipped with four ultrasonic sensors and one sharp infrared sensor. A mathematical model has been developed based on the specifications of the ultrasonic sensors to identify optimum orientation of the sensors for detecting stairs and holes. These sensors are connected to a microcontroller along with a laptop so that we can get sufficient data for analysing terrain on the walkway of the blind. Based on the analyses of the acquired data, we have developed an algorithm capable of classifying various types of obstacles. The developed belt for blind device is superior in terms of less weight less, able to detect stair and hole, low cost, less power consumption, adjustable, less training and availability of actuation systems. It was tested and implemented successfully to address all those issues

    Investigation on the development of a sliding mode controller for constant power loads in microgrids

    Get PDF
    Abstract: To implement renewable energy resources, microgrid systems have been adopted and developed into the technology of choice to assure mass electrification in the next decade. Microgrid systems have a number of advantages over conventional utility grid systems, however, they face severe instability issues due to the continually increasing constant power loads. To improve the stability of the entire system, the load side compensation technique is chosen because of its robustness and cost effectiveness. In this particular occasion, a sliding mode controller is developed for a microgrid system in the presence of constant power loads to assure a certain control objective of keeping the output voltage constant at 480 V. After that, a robustness analysis of the sliding mode controller against parametric uncertainties was performed and the sliding mode controller’s robustness against parametric uncertainties, frequency variations, and additive white Gaussian noise (AWGN) are presented. Later, the performance of the proportional integral derivative (PID) and sliding mode controller are compared in the case of nonlinearity, parameter uncertainties, and noise rejection to justify the selection of the sliding mode controller over the PID controller. All the necessary calculations are reckoned mathematically and results are verified in a virtual platform such as MATLAB/Simulink with a positive outcome

    A New Perspective of Wind Power Grid Codes Under Unbalanced and Distorted Grid Conditions

    Get PDF
    Increasing penetration of wind power has led power system operators worldwide to develop new grid codes for integration of a wind power plant (WPP) onto the grid. According to the grid codes issued by Federal Energy Regulatory Commission (FERC) in the US, a WPP must have low voltage ride through (LVRT) capability, power factor design criteria, and supervisory control and data acquisition (SCADA) system to ensure power system reliability. Fast Fourier transform (FFT) is frequently used to measure root mean square (RMS) voltage, power factor, and for supervisory data acquisition in order to verify that a WPP conforms to the grid code requirements. However, FFT inherently assumes signal is periodic in nature, and it provides misleading results under unbalanced and distorted grid conditions. To overcome these issues, this work proposes a new method for wind power grid codes based on time-frequency analysis technique. Unlike FFT, it provides accurate result both in steady-state and transient conditions. The efficacy of the proposed method is verified by applying it to computer simulated and real-world cases provided by National Renewable Energy Laboratory (NREL) in the US. Time-frequency analysis is performed utilizing Time-Frequency Toolbox (TFTB) in MATLAB® developed for the analysis of non-stationary signals

    State of the art review on walking support system for visually impaired people

    Get PDF
    The technology for terrain detection and walking support system for blind people has rapidly been improved the last couple of decades but to assist visually impaired people may have started long ago. Currently, a variety of portable or wearable navigation system is available in the market to help the blind for navigating their way in his local or remote area. The focused category in this work can be subgroups as electronic travel aids (ETAs), electronic orientation aids (EOAs) and position locator devices (PLDs). However, we will focus mainly on electronic travel aids (ETAs). This paper presents a comparative survey among the various portable or wearable walking support systems as well as informative description (a subcategory of ETAs or early stages of ETAs) with its working principal advantages and disadvantages so that the researchers can easily get the current stage of assisting blind technology along with the requirement for optimising the design of walking support system for its users

    A Comprehensive Review on Constant Power Loads Compensation Techniques

    Get PDF
    Microgrid, because of its advantages over conventional utility grids, is a prudent approach to implement renewable resource-based electricity generation. Despite its advantages, microgrid has to operate with a significant proportion of constant power loads that exhibit negative incremental impedance and thus cause serious instability in the system. In this paper, a comprehensive review is presented on accomplished research work on stabilization of dc and ac microgrid. After reviewing these, microgrid system stabilization techniques are classified with required discussions. As found out in this paper, the stabilization techniques can basically be classified as compensation done: 1) at feeder side; 2) by adding intermediate circuitry; and 3) at load side. Finally, after analyzing the merits and drawbacks of each generalized technique, several infographics are presented to highlight the key findings of this paper

    Interleaved Honeypot-Framing Model with Secure MAC Policies for Wireless Sensor Networks

    Get PDF
    The Wireless Medium Access Control (WMAC) protocol functions by handling various data frames in order to forward them to neighbor sensor nodes. Under this circumstance, WMAC policies need secure data communication rules and intrusion detection procedures to safeguard the data from attackers. The existing secure Medium Access Control (MAC) policies provide expected and predictable practices against channel attackers. These security policies can be easily breached by any intelligent attacks or malicious actions. The proposed Wireless Interleaved Honeypot-Framing Model (WIHFM) newly implements distributed honeypot-based security mechanisms in each sensor node to act reactively against various attackers. The proposed WIHFM creates an optimal Wireless Sensor Network (WSN) channel model, Wireless Interleaved Honeypot Frames (WIHFs), secure hash-based random frame-interleaving principles, node-centric honeypot engines, and channel-covering techniques. Compared to various existing MAC security policies, the proposed model transforms unpredictable IHFs into legitimate frame sequences against channel attackers. Additionally, introducing WIHFs is a new-fangled approach for distributed WSNs. The successful development of the proposed WIHFM ensures resilient security standards and neighbor-based intrusion alert procedures for protecting MAC frames. Particularly, the proposed wireless honeypot methodology creates a novel idea of using honeypot frame traps against open wireless channel attacks. The development of a novel wireless honeypot traps deals with various challenges such as distributed honeypot management principles (node-centric honeypot, secretly interleaved-framing principles, and interleaving/de-interleaving procedures), dynamic network backbone management principles (On Demand Acyclic Connectivity model), and distributed attack isolation policies. This effort provides an effective wireless attack-trapping solution in dynamic WSNs. The simulation results show the advantage of the proposed WIHFM over the existing techniques such as Secure Zebra MAC (SZ-MAC), Blockchain-Assisted Secure-Routing Mechanism (BASR), and the Trust-Based Node Evaluation (TBNE) procedure. The experimental section confirms the proposed model attains a 10% to 14% superior performance compared to the existing techniques

    Authentication Protocol for Cloud Databases Using Blockchain Mechanism

    Get PDF
    Cloud computing has made the software development process fast and flexible but on the other hand it has contributed to increasing security attacks. Employees who manage the data in cloud companies may face insider attack, affecting their reputation. They have the advantage of accessing the user data by interacting with the authentication mechanism. The primary aim of this research paper is to provide a novel secure authentication mechanism by using Blockchain technology for cloud databases. Blockchain makes it difficult to change user login credentials details in the user authentication process by an insider. The insider is not able to access the user authentication data due to the distributed ledger-based authentication scheme. Activity of insider can be traced and cannot be changed. Both insider and outsider user’s are authenticated using individual IDs and signatures. Furthermore, the user access control on the cloud database is also authenticated. The algorithm and theorem of the proposed mechanism have been given to demonstrate the applicability and correctness.The proposed mechanism is tested on the Scyther formal system tool against denial of service, impersonation, offline guessing, and no replay attacks. Scyther results show that the proposed methodology is secure cum robust
    corecore