ABSTRACT

This edited book comprises chapters that describe the IoT, machine learning, and blockchain technologies for renewable energy and modern hybrid power systems with simulation examples and case studies.

After reading this book, users will understand recent technologies such as IoT, machine learning techniques, and blockchain technologies and the application of these technologies to renewable energy resources and modern hybrid power systems through simulation examples and case studies.

chapter 1|28 pages

Introduction to IoT

ByAsim Maharjan, Saju Khakurel

chapter 2|32 pages

IoT and its Requirements for Renewable Energy Resources

ByD. Gunapriya, R. Sivakumar, K. Sabareeshwaran, C. Sharmeela

chapter 3|17 pages

Power Quality Monitoring of Low Voltage Distribution System Toward Smart Distribution Grid Through IoT

ByP. Sivaraman, C. Sharmeela, S. Balaji, P. Sanjeevikumar, S. Elango

chapter 4|13 pages

Health Monitoring of a Transformer in a Smart Distribution System using IoT

ByP. Sivaraman, C. Sharmeela, P. Sanjeevikumar

chapter 5|28 pages

Introduction To Machine Learning Techniques

BySaniya M. Ansari, Ravindra R. Patil, Rajnish Kaur Calay, Mohamad Y. Mustafa

chapter 6|28 pages

Machine Learning Techniques for Renewable Energy Resources

ByK. Pimitha, S. Anbarasi, T. Balasubramanian

chapter 7|23 pages

Application of Optimization Technique in Modern Hybrid Power Systems

ByD. Lakshmi, R. Zahira, C.N. Ravi, P. Sivaraman, G. Ezhilarasi, C. Sharmeela

chapter 8|32 pages

Application of Machine Learning Techniques in Modern Hybrid Power Systems – A Case Study

ByB. Koti Reddy, Krishna Sandeep Ayyagari, Raveendra Reddy Medam, Mohemmed Alhaider

chapter 9|30 pages

Establishing a Realistic Shunt Capacitor Bank with a Power System using PSO/ACCS

ByAli Mohamed Eltamaly, Osama El Sayed Morsy, Elghaffar, Yehia Sayed Mohamed, Abou-Hashema Ahmed

chapter 10|22 pages

Introduction to Blockchain Technologies

ByXiaofeng Chen, Xiangjuan Jia

chapter 11|14 pages

Blockchain Technologies for Renewable Energy Resources with Case Study: SHA-256, 384, and 512

ByKaung Si Thu, Shubham Tiwari, Weerakorn Ongsakul