Adaptive Setting of UFLS Relay Using Hourly Programming with Consideration of Renewable Energy Sources in Smart Grid

Authors

Abstract:

In the light of the emergence of smart grids, the functions associated with this type of grids in the blocks of the energy management system require the adoption of robust strategies in order to provide a higher level of control and protection. Under-frequency load shedding (UFLS) sheds load blocks when the frequency drop is below the threshold limit. In adaptive UFLS, in an advanced telecommunications platform, the main quantities of the system are measured at each hour and in real-time; besides, the optimal amount of load is shed according to frequency deviation. In this paper, an hourly framework using Mixed-Integer Linear Programming (MILP) is proposed for an optimal design of an adaptive UFLS in smart networks. The goal is to provide a more systematic adaptive UFLS that is less dependent on trial and error. Here, the under-frequency relay is set for each hour in regard to operating conditions and uncertainties resulting from contingencies, to renewable energy sourses (RES), and to load fluctuations at that hour. The simulations are performed on the IEEE 39-bus test system over a 24-hour time horizon.

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

Feasibility Study of Using Renewable Energy Sources for a University Campus in Smart Grid Using Fuzzy Method

In this paper, the electrical consumption of Hamedan University is derived of the bills, Then with defining of fuzzy Bus Thermal Coefficient objective function for heating, the amount of available heat selling to university consumer that is produced by Biomass CHP plant is calculated. With the capacity determination of Biomass CHP plant to provide Thermal and electrical energy of university and...

full text

Energy Consumption Scheduling in a Smart Grid Including Renewable Energya Smart Grid Including Renewable Energy

Smart grids propose new solutions for electricity consumers as a means to help them use energy in an efficient way. In this paper, we consider the demand-side management issue that exists for a group of consumers (houses) that are equipped with renewable energy (wind turbines) and storage units (battery), and we try to find the optimal scheduling for their home appliances, in order to reduce th...

full text

Power Management in a Utility Connected Micro-Grid with Multiple Renewable Energy Sources

As an efficient alternative to fossil fuels, renewable energy sources have attained great attention due to their sustainable, cost-effective, and environmentally friendly characteristic. However, as a deficiency, renewable energy sources have low reliability because of their non-deterministic and stochastic generation pattern. The use of hybrid renewable generation systems along with the storag...

full text

The Role of Digitalization in Microgrid Including Renewable Energy Sources

Hybrid renewable energy systems (HRES) with potential environmental, economic and social benefits are designed to improve energy efficiency and reliability. In this study, artificial intelligence and smart grids were studied to supply electricity for a green cottage. The obtained results are essential for designing, implementing, and building HRES. Three cost-benefit and environmental, economic...

full text

The Role of Digitalization in Microgrid Including Renewable Energy Sources

Hybrid renewable energy systems (HRES) with potential environmental, economic and social benefits are designed to improve energy efficiency and reliability. In this study, artificial intelligence and smart grids were studied to supply electricity for a green cottage. The obtained results are essential for designing, implementing, and building HRES. Three cost-benefit and environmental, economic...

full text

automatic verification of authentication protocols using genetic programming

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

15 صفحه اول

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 12  issue 3

pages  16- 33

publication date 2022-11

By following a journal you will be notified via email when a new issue of this journal is published.

Keywords

No Keywords

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023