Run-time detection and correction of heliostat tracking errors

被引:11
|
作者
Chiesi, Matteo [1 ]
Scarselli, Eleonora Franchi [1 ]
Guerrieri, Roberto [1 ]
机构
[1] Univ Bologna, Adv Res Ctr Elect Syst Informat & Commun Technol, Viale Carlo Pepoli 3-2, I-40123 Bologna, Italy
关键词
Solar tower power plants; Parallel computing; Closed-loop solar tracker; Distributed sensors; Microelectromechanical systems (MEMS); e-compass; CONTROL-SYSTEM; SOLAR POWER; MODEL; FIELD;
D O I
10.1016/j.renene.2016.12.093
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
This paper investigates the effect of tracking errors in heliostats used in solar tower power plants and proposes an approach based on low-cost distributed electronics capable of limiting their impact. An analysis carried out through a parallel model sets the specifications for design of a closed-loop solar tracker based on a low-cost six-axis digital e-compass. A proof of concept system is devised to test the accuracy of the proposed strategy. This approach allows the solar tracker to perform a run-time detection and correction of heliostat tracking errors, with an accuracy of about 3 mrad for the azimuth angle and less than 2 mrad for the altitude angle, thus leading to a higher concentration ratio than with an open loop solar-tracker. (C) 2017 Elsevier Ltd. All rights reserved.
引用
收藏
页码:702 / 711
页数:10
相关论文
共 50 条
  • [31] Run-Time Hardware Trojan Detection Using Performance Counters
    Elnaggar, Rana
    Chakrabarty, Krishnendu
    Tahoori, Mehdi B.
    [J]. 2017 IEEE INTERNATIONAL TEST CONFERENCE (ITC), 2017,
  • [32] Run-time detection of communication deadlocks in occam 2 programs
    Zhao, JJ
    Abe, H
    Nomura, Y
    Cheng, JD
    Ushijima, K
    [J]. CORRECT MODELS OF PARALLEL COMPUTING, 1997, 49 : 97 - 107
  • [33] An Abnormal Behavior Detection Technology for Run-time Mobile Application
    Li, Yong
    Ma, YuanYuan
    Chen, Mu
    Dai, ZaoJian
    [J]. PROCEEDINGS FIRST INTERNATIONAL CONFERENCE ON ELECTRONICS INSTRUMENTATION & INFORMATION SYSTEMS (EIIS 2017), 2017, : 497 - 501
  • [34] Protecting Run-time Filters for Network Intrusion Detection Systems
    Valgenti, Victor C.
    Sun, Hai
    Kim, Min Sik
    [J]. 2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, : 116 - 122
  • [35] Run-time fault detection in monitor based concurrent programming
    Cao, JN
    Cheung, NKC
    Chan, ATS
    [J]. INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2001, : 357 - 366
  • [36] Run-Time Detection of Hardware Trojans: The Processor Protection Unit
    Dubeuf, Jeremy
    Hely, David
    Karri, Ramesh
    [J]. 2013 18TH IEEE EUROPEAN TEST SYMPOSIUM (ETS 2013), 2013,
  • [37] Exploiting Cache Traffic Monitoring for Run-Time Race Detection
    Schimmel, Jochen
    Pankratius, Victor
    [J]. EURO-PAR 2011 PARALLEL PROCESSING, PT 1, 2011, 6852 : 15 - 26
  • [38] Unknown Malicious Executables Detection Based on Run-time Behavior
    Hu, Yongtao
    Chen, Liang
    Xu, Ming
    Zheng, Ning
    Guo, Yanhua
    [J]. FIFTH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, VOL 4, PROCEEDINGS, 2008, : 391 - 395
  • [39] Run-time reconfiguration at Xilinx
    Guccione, SA
    [J]. PARALLEL AND DISTRIBUTED PROCESSING, PROCEEDINGS, 2000, 1800 : 873 - 873
  • [40] Run-Time Verification of Coboxes
    de Boer, Frank S.
    de Gouw, Stijn
    Wong, Peter Y. H.
    [J]. SOFTWARE ENGINEERING AND FORMAL METHODS, SEFM 2013, 2013, 8137 : 259 - 273