Synthetic Cloud-Based Regulation Reserve Distribution Management (SECURED)

نویسنده

  • Rupamathi Jaddivada
چکیده

The past decade has seen advancements in renewable energy technology, making even smaller solar and wind installations at residential level an economically viable option. Hence, large amounts of distributed energy sources (DERs) with high penetration of renewables will form a key component of an urban energy grid. This not only reduces the inertia of the system but also injects large unpredictable disturbances into the grid. Furthermore, the end user devices are getting smarter, resulting in added uncertainty in demand. The intermittent generation from renewables and changing consumption patterns are required to be compensated through dispatchable conventional generation sources in order to prevent frequency excursions caused due to generation demand mismatch. However, it is envisioned that large amounts of DERs and adjustable loads causing high frequency disturbances can also be used to the advantage at system level. These collectively provide reserves and balancing services to the grid for frequency regulation, specifically in the presence of high renewable energy integration. Today’s demand response programs fail owing to complexity involved in large scale coordinated control of a vast number of DERs at finer time resolution. Proper market strategies enabling participation of endusers in decision making is what is needed to make provision of robust synthetic reserves a commercially feasible option.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hierarchical based Cloud Computing and De-Identification of Secured Big Data

A smart grid is modernized electrical equipment that uses analog or digital information in an automated fashion to improve the efficiency, reliability, economics, and sustainability of the production and distribution of electricity. The main challenges of smart grids, however, to manage different types of front-end intelligent devices such as power assets and smart meters efficiently, and how t...

متن کامل

A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment

With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...

متن کامل

Policy Based File Assured Deletion with Secure Overlay Cloud Storage

The outsource data backup to third-party cloud storage services so as to reduce data management costs, security concerns arise in terms of ensuring the privacy and integrity of out-sourced data. Design Policy Base a practical, implementable, and readily deployable cloud storage system that focuses on protecting deleted data with Policy Based file secured deletion. Policy Base is built upon stan...

متن کامل

On The Moments Of The Time To Ruin Distribution When The Initial Reserve Is Large And Claim Amount Distribution Is Two Stage Hypo Exponential Distribution

In any classical risk model one of the important random variable is time to ruin. As time to ruin warns the management for possible adverse situations that may arise, the distribution of time to ruin place a vital role in the day to day transactions of the any insurance company. Moments of the distribution are also important as coefficient of skewness of the distribution is very important in ac...

متن کامل

A Fuzzy Reputation-based Trust Management Scheme for Cloud Computing

Cloud computing requires that customers trust that a service provider’s platforms are secured and provide a sufficient level of integrity for the client’s data. However, a lack of trust between cloud customers and providers has hindered the universal acceptance of clouds as an increasingly popular approach for the processing of large data sets and computationally expensive programs. Existing te...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017