Design renewable energy system

Assignment Help Basic Computer Science
Reference no: EM133117478

You are asked to design a renewable energy system,The following considerations are important for the case:

You will need to use a combination of different renewable energy sources and storage to ensure that electricity and heat is always available throughout the year.

You need to make assumptions for the load you need to supply for. The average energy consumption of a household depends on the climate. In all cases we only consider the use of energy for household use (heating, light, cooking, household appliances). Transport and industry are excluded from the cases.

Use as many assumptions as necessary, but make sure you present an argument clearly stating the data on which the assumption was based, or the reason behind the assumption.

This rural village is in a warm climate with mild winters. The village has a large surface of agricultural land with scattered small forests. The farmers use their lands for sugar cane crops and own the small forests. The farms are not connected to the electricity grid, but use diesel generators for electricity for heat, light and cooking. Farmers are amenable to wind turbine and solar panel deployment. Household organic and organic waste is used by the farmers as fertilizer.

The village has 40 households. Average use per household is 1250 liter diesel per year, which produces 4000 kWh (3475 kg CO2).

Other data:

Average wind speed: 8 m/s, capacity factor: 0.18, 2 MW wind turbines possible

Solar irradiance per year: 2200 kWh/

Production of sugar cane: 60 ton per year per hectare

- Potential of renewable energy sources

List for your case the top 3 potential renewable energy sources in kWh/day per person. For example:

Solar [insert number] kWh/day per person

Wind [insert number] kWh/day per person

Biomass [insert number] kWh/day per person

Rank them from biggest to smallest.

- Energy use

Describe the current energy use in kWh/day per person per carrier. For example:

Electricity (coal) [insert number] kWh/day per person

Fuel [insert number] kWh/day per person

Gas [insert number] kWh/day per person

Rank them from biggest to smallest.

- What do you expect the fluctuations in generation and use to be?

Explain how you think the season and daily pattern is from the renewable energy sources and the use. Also give a statement how you think the energy demand will develop in the coming years.

- Design

Explain your design for a 100% renewable energy system. Which sources will you use? How much energy will these provide? Where are they located? How can the households use the energy? How does the design deal with fluctuations in generation and demand?

- Pros and cons

Explain what the pros and cons are of your design. Think of reliability, costs, technical challenges etcetera.

Reference no: EM133117478

Questions Cloud

Group decision support systems : Group decision support systems provide structures aid teams in managing the ideas from all members.
Fossil fuels contributing with global warming : How are fossil fuels contributing with global warming? 2. Are fossil fuels renewable? Explain your answer.
How are fossil fuels contributing with global warming : How are fossil fuels contributing with global warming? Are fossil fuels renewable? Explain your answer.
What is interesting phenomenon : What is the interesting phenomenon that you're going to explain? What is/are the observational experiment(s)?
Design renewable energy system : You are asked to design a renewable energy system. Describe the current energy use in kWh/day per person per carrier.
Contingency planning is risk mitigation process : Contingency planning is a risk mitigation process for developing back-up plans in anticipation of events (scenarios) that might disrupt ‘business as usual'.
Information systems for business : What are the five major components that make up an information system? List the three examples of information system hardware?
Footprinting techniques : Explain the incident that occurred, and then list the steps you would follow to solve this case using FOOTPRINTING techniques.
Types of authentication mechanisms : Discuss the four processes involved in access control approaches and the types of authentication mechanisms

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Explain when to use these different types of loops

Explain when to use these different types of loops. How do you include a ‘loop' structure programming in Python?

  Networking forensics using wireshark

"Networking Forensics using Wireshark" readings this week focus on monitoring network traffic in real-time. A network administrator essentially needs

  What is the advantage of using different types of cursors

What is the advantage of using different types of cursors?

  How can red reduce likelihood of tcp global synchronization

Research the problem known as "TCP global synchronization." How can RED reduce the likelihood of TCP global synchronization?

  Find three different job postings in the area

Find three different job postings in the area you live in for a Project Manager. What are the items in the three job ads that are the same?

  Many businesses migrating to use cloud technologies

You summarize the security and governance challenges that exist with incorporating BYOD in an environment that is migrating to the Cloud.

  Policies and procedures for gathering information

Where in the FAR are the policies and procedures for gathering information from offerors to assist the Government

  Security system consists of four digits

The access code for a? car's security system consists of four digits. The first digit cannot be 6 and the last digit must be odd. How many different codes are?

  Current work environment

How the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment.

  Discuss possible reasons for considerable increase in cost

A program written for personal use imposes rather less stringent requirements than a product that is also to be used by other people. According to (Brooks, 1995), the latter may require three times as much effort. Discuss possible reasons for this..

  Describe distribution and summarize the important feature

Describe the distribution and summarize the important features. What is it about running that might account for the shape you see?

  Legal issues in information security and incident response

The news media often publicizes cyber crime activities. Discuss one of the cyber crimes you have heard about, explaining the crime along with how it was discovered and investigated? What was the outcome? If the investigation is ongoing, based on t..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd