A study of shading effect on photovoltaic modules with proposed P & O checking algorithm

Sun irradiation levels and associated temperature changes are the main factors that influence the conversion of solar energy into electricity. Most energy is produced during a hot sunny day as the sun irradiation is at the maximum level and uniform throughout the solar photovoltaic (PV). However, most solar PV were frequently get shadowed, completely or partially, by the neighbouring buildings, trees and passing clouds. Consequently, the solar PV has lower voltage and current output; hence, multiple maximum power points (MPP) are existed on the PV curve, which could cause confusion to the conventional Maximum Power Point Tracker (MPPT) to track the true MPP for the PV system. Thus, it is important to examine the impacts of partial shading on the solar PV in order to extract the maximum possible power. This paper presents a MATLAB-based modelling for simulation and experimental setup to study the I-V and P-V characteristics of a solar module under a non-uniform irradiation due to partial shading condition (PSC).  Furthermore, this study is also proposed an effective method (a variable step size of P&O with checking algorithm) that is low cost and higher tracking efficiency. Thus, this study is essential in improving and evaluating any new MPPT algorithm under the PSC.

[1]  Biswanath Mukherjee,et al.  Wireless sensor network survey , 2008, Comput. Networks.

[2]  Pascal Thubert,et al.  Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks , 2011, RFC.

[3]  Stephen E. Deering,et al.  Internet Protocol, Version 6 (IPv6) Specification , 1995, RFC.

[4]  Kalpana Sharma,et al.  Cross Layer Security Framework for Wireless Sensor Networks , 2011 .

[5]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[6]  Aikaterini Mitrokotsa,et al.  Intrusion Detection Techniques in Sensor Networks , 2008 .

[7]  David E. Culler,et al.  Transmission of IPv6 Packets over IEEE 802.15.4 Networks , 2007, RFC.

[8]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[9]  Philip Levis,et al.  RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.

[10]  Yuguang Fang,et al.  Securing wireless sensor networks: a survey , 2008, IEEE Communications Surveys & Tutorials.

[11]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[12]  Drago Zagar,et al.  Security in IPv6-based wireless sensor network — Precision agriculture example , 2013, Proceedings of the 12th International Conference on Telecommunications.

[13]  Neeli R. Prasad,et al.  Security Framework for Wireless Sensor Networks , 2006, Wirel. Pers. Commun..

[14]  Krešimir Grgić,et al.  Wireless Sensor Networks - Applications and Development , 2007 .

[15]  Snjezana Rimac-Drlje,et al.  Security aspects in IPv6 networks - implementation and testing , 2007, Comput. Electr. Eng..

[16]  Wen-Chung Chang,et al.  Detecting Sybil attacks in Wireless Sensor Networks using neighboring information , 2009, Comput. Networks.

[17]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[18]  Nicolas Sklavos On the Hardware Implementation Cost of Crypto-Processors Architectures , 2010, Inf. Secur. J. A Glob. Perspect..

[19]  Drago Zagar,et al.  System for Malicious Node Detection in IPv6-Based Wireless Sensor Networks , 2016, J. Sensors.

[20]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[21]  T. Kavitha,et al.  Security Vulnerabilities In Wireless Sensor Networks: A Survey , 2010 .

[22]  Mohit Saxena,et al.  SECURITY IN WIRELESS SENSOR NETWORKS - A LAYER BASED CLASSIFICATION , 2007 .

[23]  Claudia Eckert,et al.  On handling insider attacks in wireless sensor networks , 2008 .