Schedule Strategy Considering the Overload Violation Risk to the Security Region in Distribution Networks
Jiacheng Jia (),
Guiliang Yin (),
Lingling Sun and
Ahmed Abu-Siada
Additional contact information
Jiacheng Jia: Key Laboratory of Power Electronics for Energy Conservation and Motor Drive of Hebei Province, Yanshan University, Qinhuangdao 066004, China
Guiliang Yin: Key Laboratory of Power Electronics for Energy Conservation and Motor Drive of Hebei Province, Yanshan University, Qinhuangdao 066004, China
Lingling Sun: Key Laboratory of Power Electronics for Energy Conservation and Motor Drive of Hebei Province, Yanshan University, Qinhuangdao 066004, China
Ahmed Abu-Siada: Electrical and Computer Engineering Discipline, Curtin University, Perth 6102, Australia
Energies, 2022, vol. 15, issue 23, 1-18
Abstract:
Due to the uncertainty of the nodal power caused by the varying renewable energies and the variety of loads, the line power of the distribution network (DN) is uncertainty also. In extreme scenarios, the line power may exceed the loading limits and incur overload violations. In this paper, a risk analysis specifically for overload violations based on the security region of the DN is established. This method takes the N-0 security of the DN as the reference to determine the bidirectional security region and violation distances. The calculation of the probability distribution of the overload violation in the distribution lines is established according to the distribution of node injections of the DN by using the semi-invariant algorithm. By referring to the security boundaries, the optimization model of the anti-violation strategy to minimize the cost of anti-violation is derived, by which the severity of violation risk events is obtained accordingly. Assessment of the risk cost is built with the CVaR index for violation events. Based on the above algorithms, the risk-tolerated scheduling model of the DN is arrived at with the objective of minimizing the comprehensive risk cost and operating cost. Finally, the validity of the proposed method is verified by a modified IEEE 33-node example.
Keywords: cost of anti-violation; risk of overload violation; risk tolerated dispatch; semi-invariant algorithm; security region (search for similar items in EconPapers)
JEL-codes: Q Q0 Q4 Q40 Q41 Q42 Q43 Q47 Q48 Q49 (search for similar items in EconPapers)
Date: 2022
References: View references in EconPapers View complete reference list from CitEc
Citations:
Downloads: (external link)
https://www.mdpi.com/1996-1073/15/23/8781/pdf (application/pdf)
https://www.mdpi.com/1996-1073/15/23/8781/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jeners:v:15:y:2022:i:23:p:8781-:d:980097
Access Statistics for this article
Energies is currently edited by Ms. Agatha Cao
More articles in Energies from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().