2022
DOI: 10.3390/app12178397
|View full text |Cite
|
Sign up to set email alerts
|

Development of an Intelligent Solution for the Optimization of Hybrid Energy Systems

Abstract: This paper presents a proposal for the development of a new intelligent solution for the optimization of hybrid energy systems. This solution is of great importance for installers of hybrid energy systems, as it helps them obtain the best configuration of the hybrid energy system (efficient and less expensive). In this solution, it is sufficient to enter the name of the location of the hybrid energy system that we want to install; after that, the solution will show the name of the best technology from which th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1
1
1

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 40 publications
(44 reference statements)
0
1
0
Order By: Relevance
“…Ontology is a formal and explicit representation of information associated with a specific domain [15][16][17]. In medicine, ontology is interested in the genesis of medical entities: diseases, clinical signs, clinical syndromes, symptoms, lesions, biological anomalies, and radiological anomalies [18].…”
Section: Methods and Resultsmentioning
confidence: 99%
“…Ontology is a formal and explicit representation of information associated with a specific domain [15][16][17]. In medicine, ontology is interested in the genesis of medical entities: diseases, clinical signs, clinical syndromes, symptoms, lesions, biological anomalies, and radiological anomalies [18].…”
Section: Methods and Resultsmentioning
confidence: 99%
“…These SG design, operation, and maintenance processes might fall short of the cybersecurity risk management standards for identifying, safeguarding, detecting, responding, and recovering. Any electrical system damage degree depends on how these faults are located and used [19]. Malicious software is now the main offensive tool used in attacks to exploit SG vulnerabilities [20].…”
Section: Literature Reviewmentioning
confidence: 99%