2019
DOI: 10.3390/en12040616
|View full text |Cite
|
Sign up to set email alerts
|

Mitigating Energy System Vulnerability by Implementing a Microgrid with a Distributed Management Algorithm

Abstract: This work presents a management strategy for microgrid (MG) operation. Photovoltaic (PV) and wind generators, as well as storage systems and conventional units, are distributed over a wide geographical area, forming a distributed energy system, which is coordinated to face any contingency of the utility company by means of its isolated operation. The management strategy divides the system into three main layers: renewable generation, storage devices, and conventional units. Interactions between devices of the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 26 publications
0
2
0
Order By: Relevance
“…The development and use of modular technologies can greatly enhance prospects for the integration of electricity obtained from diverse sources in a safe, effective, and efficient manner [92,93]. Modular designs can also significantly lessen the severity of consequences of natural disasters, accidents, and other threats to system integrity [94,95].…”
Section: Supporting Design Options That Minimize Vulnerability and Ma...mentioning
confidence: 99%
“…The development and use of modular technologies can greatly enhance prospects for the integration of electricity obtained from diverse sources in a safe, effective, and efficient manner [92,93]. Modular designs can also significantly lessen the severity of consequences of natural disasters, accidents, and other threats to system integrity [94,95].…”
Section: Supporting Design Options That Minimize Vulnerability and Ma...mentioning
confidence: 99%
“…Gautam P used the opportunity graph to describe the attacker's opportunistic advancement process, represented the different paths to the attacker's goal as the attacker's different attack strategies, and used a dynamic algorithm to calculate the average attack cost of behavioral attacks. It is not difficult to see that this method It is "attack-centric", and the method of calculating the average attack cost is obtained empirically, without scientific basis, so the quantitative results cannot well demonstrate the security of the system [4].…”
Section: Introductionmentioning
confidence: 99%