Static Security Assessment of Integrated Power Systems with Wind Farms Using Complex Network Theory

سال انتشار: 1404
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 86

فایل این مقاله در 9 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_JOAPE-13-2_007

تاریخ نمایه سازی: 10 شهریور 1403

چکیده مقاله:

Although the presence of clean energy resources in power systems is required to reduce greenhouse gas emissions, system security faces severe challenges due to its increased intelligence and expansion, as well as the high penetration of renewable energy resources. According to new operating policies, power systems should withstand subsequent single contingencies. Also, the effect of electrical and structural characteristics must be considered in power system security assessment. Thus, this paper introduces a comprehensive risk-based approach that quantifies the impact of contingency-induced variation in topology by using complex network theory metrics. Then, it identifies elements that surpass security limitations and eliminates them to execute cascading outage analysis via AC power flow. Lastly, wind power uncertainty and contingency probability are multiplied by the linear combination of electrical and structural consequences, and security status is assigned to each contingency based on its risk value. Additionally, simulations are carried out on modified ۱۱۸ and ۳۰۰ bus IEEE systems, and the extensive results are utilized to demonstrate the effectiveness of the proposed methodology. 

نویسندگان

Farshad Babaei

Department of Electrical Engineering, Azarbaijan Shahid Madani University, Tabriz, Iran.

Amin Safari

Department of Electrical Engineering, Azarbaijan Shahid Madani University, Tabriz, Iran.

Javad Salehi

Department of Electrical Engineering, Azarbaijan Shahid Madani University, Tabriz, Iran.

Hossein Shayeghi

Department of Electrical Engineering, University of Mohaghegh Ardabili, Ardabil, Iran.

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • Limouzadeh and A. Rabiee, “Security constrained reactive power scheduling considering ...
  • Z. A. Bhuiyan, G. J. Anders, J. Philhower, and S. ...
  • S. Kumar, H. Quan, K. Y. Wen, and D. Srinivasan, ...
  • Li and Z. Qi, “Impact of cascading failure based on ...
  • Wang, P. Ju, F. Wu, S. Lei, and X. Pan, ...
  • Ding, K. Yu, C. Wang, and W.-J. Lee, “Transmission line ...
  • Yin, T. Liu, L. Wu, C. He, and Y. Liu, ...
  • Li, Z. Yang, P. Guo, and J. Cheng, “An intelligent ...
  • Wu, H. Chu, and C. Xu, “Risk assessment of windphotovoltaic-hydrogen ...
  • Li, X. Zhang, L. Wu, P. Lu, and S. Zhang, ...
  • Mehdizadeh, R. Ghazi, and M. Ghayeni, “Power system security assessment ...
  • Yorino, M. Abdillah, Y. Sasaki, and Y. Zoka, “Robust power ...
  • Nangrani and S. Bhat, “Smart grid security assessment using intelligent ...
  • K. Tiwary, J. Pal, and C. K. Chanda, “Ann-based faster ...
  • L. Cremer and G. Strbac, “A machine-learning based probabilistic perspective ...
  • Zang, S. Gao, T. Huang, X. Wei, and T. Wang, ...
  • Guo, C. Liang, A. Zocca, S. H. Low, and A. ...
  • Alonso, J. Turanzas, H. Amaris, and A. T. Ledo, “Cyber-physical ...
  • Yang, W. Chen, X. Zhang, and W. Yang, “A graphbased ...
  • Beyza, E. Garcia-Paricio, and J. M. Yusta, “Ranking critical assets ...
  • Dedousis, G. Stergiopoulos, G. Arampatzis, and D. Gritzalis, “A security-aware ...
  • Almaleh and D. Tipper, “Risk-based criticality assessment for smart critical ...
  • D. Hines, I. Dobson, and P. Rezaei, “Cascading power outages ...
  • Nakarmi, M. Rahnamay Naeini, M. J. Hossain, and M. A. ...
  • Chen, S. Ma, K. Sun, X. Yang, C. Zheng, and ...
  • L. Fan, X.-F. He, Y.-Q. Xiao, and Q.-Y. Li, “Vulnerability ...
  • Li, K. Liu, and M. Wang, “Robustness of the chinese ...
  • Xie, X. Tian, L. Kong, and W. Chen, “The vulnerability ...
  • Zhang, L. Jia, J. Ning, Y. Ye, H. Sun, and ...
  • Bose, C. K. Chanda, and A. Chakrabarti, “Vulnerability assessment of ...
  • F. Gharibeh, L. M. Khiavi, M. Farrokhifar, A. Alahyari, and ...
  • Hosseini, A. Safari, and M. Farrokhifar, “Cloud theory-based multi-objective feeder ...
  • Song, Y. Wang, L. Zhao, K. Qin, L. Liang, Z. ...
  • Khan and M. Ghassemi, “A probabilistic approach for analysis of ...
  • Sreedevi, G. Chethan, and P. L. Rao, “Voltage stability analysis ...
  • Texas Reliability Entity, “Assessment of reliability performance for the texas ...
  • Pandiarajan and C. Babulal, “Fuzzy ranking based nondominated sorting genetic ...
  • Yuan, “A study on wide-area measurement-based approaches for power system ...
  • Nesti, J. Nair, and B. Zwart, “Temperature overloads in power ...
  • Chen, S. M. Mazhari, C. Chung, S. O. Faried, and ...
  • نمایش کامل مراجع