Adaptive Setting of UFLS Relay Using Hourly Programming with Consideration of Renewable Energy Sources in Smart Grid
نویسندگان
چکیده مقاله:
In the light of the emergence of smart grids, the functions associated with this type of grids in the blocks of the energy management system require the adoption of robust strategies in order to provide a higher level of control and protection. Under-frequency load shedding (UFLS) sheds load blocks when the frequency drop is below the threshold limit. In adaptive UFLS, in an advanced telecommunications platform, the main quantities of the system are measured at each hour and in real-time; besides, the optimal amount of load is shed according to frequency deviation. In this paper, an hourly framework using Mixed-Integer Linear Programming (MILP) is proposed for an optimal design of an adaptive UFLS in smart networks. The goal is to provide a more systematic adaptive UFLS that is less dependent on trial and error. Here, the under-frequency relay is set for each hour in regard to operating conditions and uncertainties resulting from contingencies, to renewable energy sourses (RES), and to load fluctuations at that hour. The simulations are performed on the IEEE 39-bus test system over a 24-hour time horizon.
منابع مشابه
Feasibility Study of Using Renewable Energy Sources for a University Campus in Smart Grid Using Fuzzy Method
In this paper, the electrical consumption of Hamedan University is derived of the bills, Then with defining of fuzzy Bus Thermal Coefficient objective function for heating, the amount of available heat selling to university consumer that is produced by Biomass CHP plant is calculated. With the capacity determination of Biomass CHP plant to provide Thermal and electrical energy of university and...
متن کاملEnergy Consumption Scheduling in a Smart Grid Including Renewable Energya Smart Grid Including Renewable Energy
Smart grids propose new solutions for electricity consumers as a means to help them use energy in an efficient way. In this paper, we consider the demand-side management issue that exists for a group of consumers (houses) that are equipped with renewable energy (wind turbines) and storage units (battery), and we try to find the optimal scheduling for their home appliances, in order to reduce th...
متن کاملPower Management in a Utility Connected Micro-Grid with Multiple Renewable Energy Sources
As an efficient alternative to fossil fuels, renewable energy sources have attained great attention due to their sustainable, cost-effective, and environmentally friendly characteristic. However, as a deficiency, renewable energy sources have low reliability because of their non-deterministic and stochastic generation pattern. The use of hybrid renewable generation systems along with the storag...
متن کاملThe Role of Digitalization in Microgrid Including Renewable Energy Sources
Hybrid renewable energy systems (HRES) with potential environmental, economic and social benefits are designed to improve energy efficiency and reliability. In this study, artificial intelligence and smart grids were studied to supply electricity for a green cottage. The obtained results are essential for designing, implementing, and building HRES. Three cost-benefit and environmental, economic...
متن کاملThe Role of Digitalization in Microgrid Including Renewable Energy Sources
Hybrid renewable energy systems (HRES) with potential environmental, economic and social benefits are designed to improve energy efficiency and reliability. In this study, artificial intelligence and smart grids were studied to supply electricity for a green cottage. The obtained results are essential for designing, implementing, and building HRES. Three cost-benefit and environmental, economic...
متن کاملautomatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولمنابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ذخیره در منابع من قبلا به منابع من ذحیره شده{@ msg_add @}
عنوان ژورنال
دوره 12 شماره 3
صفحات 16- 33
تاریخ انتشار 2022-11
با دنبال کردن یک ژورنال هنگامی که شماره جدید این ژورنال منتشر می شود به شما از طریق ایمیل اطلاع داده می شود.
کلمات کلیدی برای این مقاله ارائه نشده است
میزبانی شده توسط پلتفرم ابری doprax.com
copyright © 2015-2023