Subjects -> BIOLOGY (Total: 3174 journals)
    - BIOCHEMISTRY (239 journals)
    - BIOENGINEERING (143 journals)
    - BIOLOGY (1491 journals)
    - BIOPHYSICS (53 journals)
    - BIOTECHNOLOGY (243 journals)
    - BOTANY (233 journals)
    - CYTOLOGY AND HISTOLOGY (32 journals)
    - ENTOMOLOGY (67 journals)
    - GENETICS (165 journals)
    - MICROBIOLOGY (279 journals)
    - MICROSCOPY (13 journals)
    - ORNITHOLOGY (26 journals)
    - PHYSIOLOGY (73 journals)
    - ZOOLOGY (117 journals)

BIOPHYSICS (53 journals)

Showing 1 - 48 of 48 Journals sorted alphabetically
Acta Biochimica et Biophysica Sinica     Hybrid Journal   (Followers: 5)
Advanced NanoBiomed Research     Open Access   (Followers: 1)
Annual Review of Biophysics     Full-text available via subscription   (Followers: 24)
Archives of Biochemistry and Biophysics     Hybrid Journal   (Followers: 17)
BBA Advances     Open Access  
BBA Bioenergetics     Hybrid Journal   (Followers: 5)
BBA Biomembranes     Hybrid Journal   (Followers: 11)
Biochemical and Biophysical Research Communications     Hybrid Journal   (Followers: 17)
Biochemistry and Biophysics Reports     Open Access  
Biochimica et Biophysica Acta (BBA) - General Subjects     Hybrid Journal   (Followers: 12)
Biochimica et Biophysica Acta (BBA) - Molecular and Cell Biology of Lipids     Hybrid Journal   (Followers: 6)
Biochimica et Biophysica Acta (BBA) - Molecular Basis of Disease     Hybrid Journal   (Followers: 12)
Biochimica et Biophysica Acta (BBA) - Molecular Cell Research     Hybrid Journal   (Followers: 10)
Biochimica et Biophysica Acta (BBA) - Proteins and Proteomics     Hybrid Journal   (Followers: 11)
Bioinspired, Biomimetic and Nanobiomaterials     Hybrid Journal   (Followers: 3)
Biophysical Chemistry     Hybrid Journal   (Followers: 8)
Biophysical Journal     Hybrid Journal   (Followers: 47)
Biophysical Reports     Open Access  
Biophysical Reviews and Letters     Hybrid Journal   (Followers: 5)
Biophysics     Hybrid Journal   (Followers: 8)
Biophysics Reports     Open Access  
Cell Biochemistry and Biophysics     Hybrid Journal   (Followers: 7)
Doklady Biochemistry and Biophysics     Hybrid Journal   (Followers: 1)
European Biophysics Journal     Hybrid Journal   (Followers: 4)
Food Biophysics     Hybrid Journal   (Followers: 2)
Freshwater Biology     Hybrid Journal   (Followers: 32)
GSTF Journal of BioSciences     Open Access  
IEEE Life Sciences Letters     Hybrid Journal  
IEEE Nanotechnology Express     Hybrid Journal   (Followers: 18)
Indian Journal of Biochemistry and Biophysics (IJBB)     Open Access   (Followers: 3)
International Journal of Biochemistry and Biophysics     Open Access   (Followers: 1)
International Journal of Biophysics     Open Access  
Journal of Biopharmaceutical Statistics     Hybrid Journal   (Followers: 23)
Journal of Biophotonics     Hybrid Journal   (Followers: 1)
Journal of Biophysical Chemistry     Open Access   (Followers: 3)
Journal of Biophysics and Structural Biology     Open Access   (Followers: 2)
Journal of Medicine, Physiology and Biophysics     Open Access  
Membranes and Membrane Technologies     Full-text available via subscription  
Nanomedicine Research Journal     Open Access   (Followers: 1)
Nanomedicine: Nanotechnology, Biology and Medicine     Hybrid Journal   (Followers: 5)
Natural Products and Bioprospecting     Open Access   (Followers: 2)
Nature Communications     Open Access   (Followers: 323)
Progress in Biophysics and Molecular Biology     Hybrid Journal   (Followers: 1)
Progress in Physical Geography     Hybrid Journal   (Followers: 12)
Quarterly Reviews of Biophysics     Hybrid Journal   (Followers: 3)
Radiation and Environmental Biophysics     Hybrid Journal   (Followers: 3)
Research & Reviews : A Journal of Life Sciences     Open Access  
Statistics in Biopharmaceutical Research     Full-text available via subscription   (Followers: 15)
Similar Journals
Journal Cover
Biophysics Reports
Number of Followers: 0  

  This is an Open Access Journal Open Access journal
ISSN (Print) 2364-3439 - ISSN (Online) 2364-3420
Published by Springer-Verlag Homepage  [2469 journals]
  • Three Dimensional Posed Face Recognition with an Improved Iterative
           Closest Point Method

    • Abstract: Abstract Dealing with different head poses is one of the most challenging issues in the area of face recognition. Recently, 3D images have been used for this purpose as they can gather more information from the head area. Kinect was used for capturing 3D images in our research. Iterative Closest Point (ICP) algorithm has been used in many researches to align a rotated pointcloud with its corresponding reference. However it has many variables that can improve its performance. So an improved version of ICP has been introduced in our research and its performance in terms of accuracy and speed has been evaluated. While it can have many applications, we have used it for increasing the performance of posed face recognition. We applied our proposed algorithm on a local database and concluded that it can significantly improve the recognition rate of 3D posed face recognition compared with using original raw posed image. Results of executing the proposed algorithm on a public database also indicate an improvement with respect to other recently proposed methods.
      PubDate: 2019-07-13
      DOI: 10.1007/s13319-019-0232-0
  • A Multi-sprite Based Anaglyph 3D Video Watermarking Approach Robust
           Against Collusion

    • Abstract: 3D video watermarking is far from the maturity of watermarking algorithms dedicated to audio, image or 2D video. In fact, little work has been proposed for anaglyph 3D videos. Such methods have not been robust against malicious attacks such as compression and collusion. The latter one is a very dangerous attack that can be applied on video content and can easily remove an embedded signature to obtain original content. This paper proposes an efficient approach for anaglyph 3D videos which can resist this malicious attack thanks to the use of a static multi-sprite generated from the different sets of frames which compose the original video. First, a sprite is generated for every set of 25 frames. Then every sprite is marked using a hybrid scheme: the discrete wavelet transform based algorithm and the middle significant bit technique, which improve signature invisibility and enhance robustness. Finally, a marked anaglyph 3D video is generated from every marked sprite. The use of multi-sprites as an embedding target provides robustness against collusion attacks and a high quality of marked video reconstruction compared with static mosaics. The experimental results show good robustness against collusion, compression and other attacks such as geometric manipulation and temporal attacks. Besides, the proposed technique presents a high level of invisibility. Graphical
      PubDate: 2019-05-27
      DOI: 10.1007/s13319-019-0231-1
  • A D2D Wireless Resource Allocation Scheme Based on Overall Fairness

    • Abstract: Abstract D2D user equipment (DUE) multiplex wireless resources of non-orthogonal cellular user equipment (CUE), which can solve the problem of spectrum resource shortage. However, these interferences not only affect the throughput of DUE and CUE, but also undermine their fairness in receiving services. In order to ensure the fairness of CUE and DUE in quality of service and the fairness in using spectrum resources, a D2D wireless resource allocation scheme based on overall fairness is proposed. First of all, it allows multiple D2D users to multiplex the resource of a CUE which increases the access rate of D2D pairs and the throughput of the marginal users; Then it clusters and reconstructs multiple D2D pairs based on graph coloring theory and the reconstructed cluster is taken as a unit; Finally, maximizing the weight value of each D2D reconstructed cluster and its matching cellular users on a resource block (RB) k. Simulation results show that the proposed algorithm can significantly increase the overall fairness and the throughput of the marginal users, access rate of D2D pairs compared with other algorithms.
      PubDate: 2019-05-17
      DOI: 10.1007/s13319-019-0230-2
  • Divergence-Free SPH Fluid Simulation Using Density Constraint Condition

    • Abstract: Abstract In this paper, a novel, incompressible fluid simulation framework based on the divergence-free Smoothed Particle Hydrodynamics model is presented. The novel SPH model combines a system of non-linear density constraint conditions and the divergence-free velocity field condition to enforce fluid incompressibility. In the new framework, the position of particles is firstly modified by solving the density constraints, and the distribution of particles is adjusted to keep the density of fluid in a relatively constant state. Then the divergence-free state increases the stability significantly and reduces the number of solver iterations. Compared to the modern Smoothed Particle Hydrodynamic (SPH) solvers, the new SPH framework allows better incompressibility and similar convergence. Finally, the method of pre-computed smoothing kernel functions is used to accelerate the proposed SPH model. It can effectively improve the real-time performance of the algorithm while maintaining sufficient accuracy.
      PubDate: 2019-05-10
      DOI: 10.1007/s13319-019-0225-z
  • An Automatic Threshold Segmentation and Mining Optimum Credential Features
           by Using HSV Model

    • Abstract: In this present study a perfect outcome of skin lesion in the computerized image analysis is used to segment the abnormal layers on the skin. The dermatologist finds difficult for easy identification of skin lesion. A computational tool should be developed to assist the dermatologist for diagnosis. This paper reports the differentiation of segmentation with various techniques. The review is made with related works to the current proposed method as a comparative study with plenty of fundamental steps like image acquisition, pre-processing and segmentation. In this work, the asymmetric pattern extractions from the dermoscopic images are segmented by the HSV segmentation to find the contour image. An automatic segregation of RGB–HSV is incorporated in the masked threshold on the proposed system which segments the lesion. The techniques involved in each stage are perfectly explained. From the state of RGB input and handling of pre-processing and segmentation were evaluated effectively. The outcome of this result is compared with other segmentation techniques to improve the result. The proposed performance measures between Ground Truth image and Segmented Image provides best-offered values of accuracy up to 96% for PH2 dataset and 95% for ISIC 2016 Dataset. Graphical Graphical of the proposed segmentation and mining optimum credential features
      PubDate: 2019-04-26
      DOI: 10.1007/s13319-019-0229-8
  • Improved Security in Multimedia Video Surveillance Using 2D Discrete
           Wavelet Transforms and Encryption Framework

    • Abstract: Abstract As the rate of the video is increasing on the internet, the security of video data is considered as a critical issue. In case of video surveillance application, the multimedia video streams require the video to be transmitted in a more secure way to its corresponding monitoring site. The multimedia video security is improved in this paper using a compression based encryption module. 2D Discrete Wavelet Transforms method is used for the compression process. The wavelet transform eliminates the low visual information, and it is scrambled and rotated for the encryption process. The encryption is handled using a series of the permutation–diffusion framework that helps in encrypting each video frame for possible secured transmission. The diffusion is carried out using Logistic chaotic maps, and the permutated blocks are encrypted with block-wise encryption. The experimental results show that the proposed video security framework achieves an improved performance against the existing method in terms of PSNR, SSIM, key size, and compression ratio, error rate.
      PubDate: 2019-04-24
      DOI: 10.1007/s13319-019-0228-9
  • Feature Line Extraction from Point Clouds Based on Geometric Structure of
           Point Space

    • Abstract: In order to improve the accuracy and rapidity of feature line extraction from point clouds, the work proposed a feature line extraction method based on geometric structure of point space. Firstly, a spatial grid dynamic division method is designed to locate the feature region of the model. A new feature points detection operator based on the linear intercept ratio is proposed according to the geometric information of points. Then, the feature points are refined by the Laplacian operator. Finally, the refined feature points are connected into the characteristic curve by the improved method of polyline growth. Compared with the feature points detection method based on surface variation (MSSV) or the angle of normal vector (SM-PD), the proposed method has low rate of error recognition with the increased noise intensity. Meanwhile, the computation time is 224.42 ms for the standard Armadillo model, less than 530.23 ms of the MSSV and 350.75 ms of the SM-PD. The experimental results show that the proposed method can accurately extract the feature points, with good noise immunity, especially suitable for the massive point cloud model. Graphical
      PubDate: 2019-04-24
      DOI: 10.1007/s13319-019-0227-x
  • Simulation and Analysis of Three-Dimensional Space Path Prediction for
           Six-Degree-of-Freedom (SDOF) Manipulator

    • Abstract: Abstract Traditional methods are ineffective in predicting the three-dimensional path of a six-degree-of-freedom (SDOF) manipulator. In view of the above situation, this paper proposes a three-dimensional space path prediction simulation method for a SDOF manipulator. The structure of the SDOF manipulator is analyzed, and the kinematics model of the manipulator is constructed. The kinematics model of the manipulator is solved by the forward and reverse kinematics solutions. According to the inverse kinematics solutions, the method of automatic optimization of multiple solutions is obtained, which can effectively improve the performance of the manipulator. The collision is avoided in the three-dimensional motion of a SDOF manipulator. On the basis of the kinematics of the manipulator, the Cartesian space is used to predict the path trajectory. The average operation time of the path planning cycle and the deviation of the relative smooth trajectory are compared through the three-dimensional path prediction distance and the straight line distance of the SDOF manipulator. The experimental results show that the average operation time of the period of the path prediction between the two is close, and the deviation of the three-dimensional space path prediction distance of the SDOF manipulator is better than that of the straight line distance. It has certain application performance.
      PubDate: 2019-04-09
      DOI: 10.1007/s13319-019-0226-y
  • Automatic Facial Expression Recognition Using Combined Geometric Features

    • Abstract: Abstract This study presents a geometric feature based automatic facial expression recognition system. The proposed system utilises the facial landmark points to determine the relative distances between the facial features in order to capture deformities caused by the movement of facial muscles due to different expressions. Three feature sets are generated by using landmark coordinates, relative distances between the facial points and a combination of both. Discriminating power of each feature set is determined by training different classification models for classifying an image into six basic emotions or neutral state. The proposed system is validated on two publically available facial expression databases. Experimental results show good accuracy of 95.5% for MUG database on the combined features by using ensemble neural network.
      PubDate: 2019-04-01
      DOI: 10.1007/s13319-019-0224-0
  • A Review on Anaglyph 3D Image and Video Watermarking

    • Abstract: Thanks to the rapid growth of internet and the advanced development of 3D technology, 3D images and videos are proliferated over the networks. However, this causes several insecurity problems, and protecting this type of media has become a main challenge for many researchers. 3D watermarking is considered as an efficient solution for 3D data protection. In fact, it consists in embedding a secret key into a 3D content to protect it and in trying to extract it after any attack applied on marked 3D data. Anaglyph is the most popular and economical method among different 3D visualization methods. For this reason, it has become used for many 3D applications. Hence, 3D anaglyph watermarking presents an important research area, and several techniques have been proposed in order to protect this type of media. In this survey paper, the existing anaglyph 3D images and videos watermarking techniques are discussed. This discussion shows that the anaglyph video watermarking field is still not mature and new techniques should be proposed to improve the invisibility/robustness trade-off. In addition, based on the study of anaglyph generation methods, it is concluded that signature can be embedded during the generation stage. Graphical
      PubDate: 2019-03-22
      DOI: 10.1007/s13319-019-0223-1
  • LGSA: Hybrid Task Scheduling in Multi Objective Functionality in Cloud
           Computing Environment

    • Abstract: Abstract Cloud computing turns to be a big shift from the conventional perception of the IT resources. It is a transpiring computing technology that is increasingly stabling itself as the promising future of distributed on-demand computing. The processes comprised in it are the ones that act as a vital backbone and which strengthen the entire stream of cloud computing as a whole. In specific, Task scheduling is the one such phenomena that enhances the cloud computing in terms of performance. Hence task scheduling that is considered as a predominant one amidst others is what this paper comprises all about. Maximizing the profit via assigning the whole task to the virtual machine is what the problem of scheduling deals with. Although there prevails many more ways to resolve this problem, this paper explores one such solution that consumes lesser number of resources, having lower cost and much importantly consuming lesser energy. By making a profound research regarding this approach of scheduling so as to represent the multi-objective function, both lion optimization algorithm and gravitational search algorithm are hybridized. In spite of having certain drawbacks which could be avoided although, the brighter side relies the merits of making use of both lion search and gravitational search algorithm. There could be many means of measurement for computing the performance of the algorithm. The different algorithms that aid to depict the comparable study encompasses gravitational search algorithm, genetic algorithm and lion, particle swarm optimization. The experimental results serve as the evident for depicting the bitterness of our proposed algorithm compared to the prevailing approaches. As an unexplored path may seem trivial but is effective so does the betterment of our lion approach.
      PubDate: 2019-03-15
      DOI: 10.1007/s13319-019-0222-2
  • Nonparametric Statistical and Clustering Based RGB-D Dense Visual Odometry
           in a Dynamic Environment

    • Abstract: Abstract The robustness of dense-visual-odometry is still a challenging problem if moving objects appear in the scene. In this paper, we propose a form of dense-visual-odometry to handle a highly dynamic environment by using RGB-D data. Firstly, to find dynamic objects, we propose a multi-frame based residual computing model, which takes a far time difference frame into consideration to achieve the temporal consistency motion segmentation. Then the proposed method combines a scene clustering model and a nonparametric statistical model to obtain weighted cluster-wise residuals, as the weight describes how importantly a cluster residual is considered. Afterward, the motion segmentation labeling and clusters’ weights are added to the energy function optimization of dense-visual-odometry to reduce the influence of moving objects. Finally, the experimental results demonstrate that the proposed method has better performance than the state-of-the-art methods on many challenging sequences from a benchmark dataset, especially on highly dynamic sequences.
      PubDate: 2019-03-07
      DOI: 10.1007/s13319-019-0220-4
  • Indoor Moving Target 3D-Tracking Algorithm Based on Multi-structure Loss

    • Abstract: Abstract Because of the influence of obstacles, random noise, signal multipath propagation, and the moving state of moving target, the traditional indoor tracking algorithms have larger error rate in localization accuracy and path optimization. In order to solve these problems, an indoor moving target 3D-tracking algorithm based on wireless sensor networks multi-structure loss model is proposed. In the phase of loss model establishment, this paper presents a multi-structure path loss model. In the phase of localization, this paper proposes a localization algorithm based on regional division. In the phase of tracking, the centroid of the intersection space is used to replace the coordinate which has larger error, and then get on filtering. The simulation results show that the proposed algorithm has high localization accuracy in the case of complicated indoor structure and larger interference. Moreover, the degree of fitting between the tracking path and the real path is high.
      PubDate: 2019-02-25
      DOI: 10.1007/s13319-019-0221-3
  • Numerical Simulation of Effect of Magnetizer on Magnetic Field of
           Induction Melting Furnace

    • Abstract: Abstract In an induction melting furnace, magnetizers are placed outside the coil region regularly, which prevents leakage of magnetic flux and, therefore, increases the induction melting efficiency of the furnace. In the present paper, the effects of the geometric and structural parameters of magnetizers on the magnetic flux intensity distributed in the material region of an induction melting furnace are investigated. A method for determining resistivity and relative permeability of lamination material of magnetizers in harmonic magnetic field simulation is established. The results indicate that magnetizer height has the strongest influence on the magnetic field distribution formed at the induction coil end. A skin effect and a vector vortex due to magnetic induction were formed at the left and the right sides of the magnetizers, respectively, while a non-magnetized zone was formed in the middle part of the coil. The leakage of the magnetic field at the coil end could be reduced by using an L-type magnetizer. The increased ratio along the circumferential direction of magnetizer improved the magnetic flux intensity in the material field located in the magnetizer gaps, while at the same ratio, increasing the number of magnetizers helped significantly in terms of improving magnetic flux intensity.
      PubDate: 2019-02-15
      DOI: 10.1007/s13319-018-0213-8
  • Optical Asymmetric Cryptosystem Based on Kronecker Product, Hybrid Phase
           Mask and Optical Vortex Phase Masks in the Phase Truncated Hybrid
           Transform Domain

    • Abstract: Abstract This research work proposes a novel asymmetric scheme by utilizing the hybrid phase truncated fractional Fourier and Gyrator transform with the secure enhancement by adding Kronecker product as a key. In this cryptosystem, the encryption keys constitute Hybrid Phase Mask along with the Optical Vortex Phase Mask and Kronecker product as the other keys. The Hybrid Phase Mask is formed by the combination of a secondary image and random phase mask. The phase truncated parts during encryption process are reserved as decryption keys with the inverse Kronecker product. The proposed method comprises of more obscure keys for upgraded security and to defend different attacks. In support of the technique proposed, the results under the effect of various attacks are presented. The efficiency and robustness of the presented cryptosystem has been examined and demonstrated by simulation in MATLAB (R2014a) with different performance parameters.
      PubDate: 2019-02-13
      DOI: 10.1007/s13319-019-0218-y
  • A New CT Based Method for Post-operative Motion Analysis of Pelvic

    • Abstract: Abstract Conventional X-ray is commonly used for pelvic fracture follow-ups, but has a precision of only ± 5 mm. Implantation of tantalum beads together with RSA has shown high precision but not applicable in clinical practice. CT scan has been shown a suitable substitute for RSA to follow the metal markers. We aimed to assess whether implantation of metal markers could be avoided using CT scan and merging of bone surface anatomy. A human cadaveric pelvis marked with 0.8 mm tantalum beads was fixed over the symphysis and the right SI-joint. Left hemi-pelvis was subsequently distracted using plastic spacers. Sequential CT exams was conducted and data were analyzed using Sectra® (Sectra AB), CTMA package. Examinations were repeated after 2 weeks. Bone registration showed better precision than registration based on tantalum beads. However, only the difference in angular changes was statistically significant (p = 0.008). The confidence interval of the repeatability was ± 0.5 mm for translation and ± 0.5° for rotation. This new non-invasive technique showed good precision and repeatability and might be a future option in clinical practice for post-operative follow-ups of patients with pelvic fractures.
      PubDate: 2019-01-29
      DOI: 10.1007/s13319-019-0217-z
  • Image Based Steganography to Facilitate Improving Counting-Based Secret

    • Abstract: Abstract The secret sharing scheme is a security tool that provides reliability and robustness for multi-user authentication systems. This work focuses on improving the security and efficiency of counting-based secret sharing by remodeling its phases. The research presents refining the shares generation phase as well as proposing different secret reconstruction models based on new shares distribution method. This work addressed solving published defects in the original counting-based secret sharing scheme providing optimized efficient methodology. The research further proposed utilizing steganography for practicality purposes. We adopted image-based steganography to hide generated shares preserving the improved security of the scheme enhancing the humanized remembrance usability. The study compared several applicable steganography methods for hiding shares analyzing their distortion, security, and capacity. This facilitating work of image-based steganography with the improved counting-based secret sharing is showing promising results opening research direction for future attractive contributions to follow-on.
      PubDate: 2019-01-18
      DOI: 10.1007/s13319-019-0216-0
  • Fabric Defect Detection Adopting Combined GLCM, Gabor Wavelet Features and
           Random Decision Forest

    • Abstract: In image analysis and pattern recognition activity, one of the most salient characteristics is texture. The global region of images in spatial domain has an enhanced processing effect with the help of co-occurrence matrix and in the frequency domain for the admirable performance such as multi-scale, multi-direction local information is obtained from Gabor wavelet. The consolidation of gray-level co-occurrence matrix and Gabor wavelet is utilized to fabric image feature texture eradication. In classification phase, random decision forest (RDFs) Classifier is applied to classify the input fabric image into defective or non-defective. RDFs are a novel and outfit machine learning strategy which fuses the element choice. Nevertheless, RDFs exhibit a lot of advantages when compared with other modeling approaches within the category. The main advantages are, RDFs can handle both the continuous and discrete variables, RDFs does not overfit as a classifier, and run quick and productively when taking care of expansive datasets. Graphical In this paper the consolidation of gray-level co-occurrence matrix (GLCM) and Gabor wavelet is utilized to fabric image feature texture eradication. In classification phase, random decision forest (RDFs) classifier is applied to classify the input fabric image into defective or non-defective.
      PubDate: 2019-01-14
      DOI: 10.1007/s13319-019-0215-1
  • Encryption of 3D Point Cloud Using Chaotic Cat Mapping

    • Abstract: 3D point clouds, a new primitive representation for objects, are spreading among thousands of people through internet software. Thus, the privacy preserving problem of the 3D point cloud should be widely concerned by more and more people. To ensure the safe transmission and use of point cloud, two schemes of encryption have been proposed by using chaotic cat mapping in this paper. The two encryption schemes are tested by using various types of 3D point clouds. In addition, these proposed encryption algorithms are analyzed through key space, sensibility, statistical and encryption time analysis. These analysis results show that the two proposed schemes can resist the common existing cipher attacks and are effective encryption methods for 3D point cloud encryption. At the same time, the two promising encryption algorithms can guarantee the security of the 3D point cloud model transmitted on the Internet. Graphical
      PubDate: 2019-01-05
      DOI: 10.1007/s13319-018-0212-9
  • IoT Based Framework: Mathematical Modelling and Analysis of Dust Impact on
           Solar Panels

    • Abstract: Abstract The solar photovoltaic performance is governed by manifold parameters viz. temperature, irradiance, dust on solar module, photoactive material, panel orientation. Among these dust is a critical impediment, as its accumulation on panel surface degrades its productivity; while frequent cleaning sessions affect module’s life and result into PV destruction. Accordingly, the need to know dust thickness responsible for deteriorating panel’s capability and adequate cleaning time of solar panels to produce optimum yields is requisite. This paper aims to discern a right cleaning time, owing to a particular dust thickness so as to conserve the panel efficiency using internet of things (IoT). The mathematical correlations of PV efficiency and current with thickness of accumulated dust are derived using linear regression. Further, these equations are associated with an IoT-based platform which remotely monitors and records PV output current; thereafter dust thickness corresponding to a significant current reduction is estimated. For this, experimental data of 46 inverters with total 114,819.30 kWh productions in a month with an average of 4416.13 kWh/day is accessed and the results pertaining to mathematical analysis exhibit a decline in current by 1 A with 5.51 × 10−3 mm thickness of dust.
      PubDate: 2019-01-04
      DOI: 10.1007/s13319-018-0214-7
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Tel: +00 44 (0)131 4513762

Your IP address:
Home (Search)
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-