2020
DOI: 10.1016/j.energy.2020.119009
|View full text |Cite
|
Sign up to set email alerts
|

Technical economic analysis of PV-driven electricity and cold cogeneration systems using particle swarm optimization algorithm

Abstract: Three different studies are presented in this paper. As a first step, a Particle Swarm Optimization (PSO) algorithm is used to optimize a prototype of cold/electricity cogeneration designed to be disconnected from the grid and implanted in an insular tropical region where a high need of cold and electricity is required. The electricity is provided by solar photovoltaic panels and the electrical energy in excess is stored in the form of hydrogen thanks to an electrolyzer. When a lack of electricity occurs a fue… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 23 publications
(5 citation statements)
references
References 31 publications
0
5
0
Order By: Relevance
“…The global extremum is the individual extremum with the best fitness among all the individual extrema. The weight and connection structure of the NN corresponding to the global extremum are the current optimal solutions of the particle swarm [ 26 ]. where: pbest is the particle best position; gbest is the swarm best position; v i is the velocity vector; x i is the position vector; c 1 and c 2 are learning factors; r 1 and r 2 are two random values between 0 and 1.…”
Section: Pso-bpnn-based Performance Evaluation Model Of Knowledge Sha...mentioning
confidence: 99%
See 1 more Smart Citation
“…The global extremum is the individual extremum with the best fitness among all the individual extrema. The weight and connection structure of the NN corresponding to the global extremum are the current optimal solutions of the particle swarm [ 26 ]. where: pbest is the particle best position; gbest is the swarm best position; v i is the velocity vector; x i is the position vector; c 1 and c 2 are learning factors; r 1 and r 2 are two random values between 0 and 1.…”
Section: Pso-bpnn-based Performance Evaluation Model Of Knowledge Sha...mentioning
confidence: 99%
“…The global extremum is the individual extremum with the best fitness among all the individual extrema. The weight and connection structure of the NN corresponding to the global extremum are the current optimal solutions of the particle swarm [ 26 ]. …”
Section: Pso-bpnn-based Performance Evaluation Model Of Knowledge Sha...mentioning
confidence: 99%
“…At the combination level of artificial neural network and intrusion detection technology, relevant European researchers tend to use artificial intelligence technology combined with encryption technology to monitor and analyze intrusion objects. The main technology includes random key management algorithm, which mainly adopts the random allocation of secret materials [ 16 , 17 ]; corresponding researchers proposed hybrid encryption algorithm based on the above random key allocation algorithm, which is mainly based on elliptic curve cryptography algorithm and advanced encryption standard algorithm for hybrid processing, so as to improve the performance of intrusion detection system [ 18 , 19 ]; relevant researchers combined with artificial intelligence algorithm proposed the intrusion detection technology of trust-based adaptive confirmation, which uses the trust algorithm of Kalman filter [ 20 ]; relevant American researchers propose refining the data model by constantly searching the corresponding relationship between data and reduce the corresponding redundant knowledge, so as to further reduce the information overload and improve the decision-making ability of the corresponding information model [ 21 , 22 ]. In the corresponding privacy protection strategy of wireless sensor networks, its main algorithms include data privacy protection scheme based on data disturbance, data privacy protection scheme based on secure multi-party technology, privacy data protection scheme based on polynomial regression, and encryption technology based on the same data state [ 23 , 24 ].…”
Section: Related Research: Research Status Of Privacy Protection and ...mentioning
confidence: 99%
“…The PV panel efficiency is noted η pv . On these latitudes, PV panels can be installed horizontally [26]. The output power of the PV panels is present in Equation (3):…”
Section: Electrical Modelingmentioning
confidence: 99%