2020
DOI: 10.24200/sci.2020.53865.3460
|View full text |Cite
|
Sign up to set email alerts
|

Security constrained optimal power flow in a power system based on energy storage system with high wind penetration

Abstract: This study is focused on assessing the effect of energy storage system (ESS) presence on security improvement of power systems hosting remarkable renewable energy resources. To this end, ESS presence is suitably included in security-constrained optimal power flow (SCOPF) model; the required technical amendments are hence considered. To launch a realistic model, ramping constraints of thermal units are also taken into account, which, limit the generators from completely responding to power shortfalls. Consideri… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 21 publications
0
4
0
Order By: Relevance
“…Although all scenarios are studied in case 1, the results of only scenarios 2 and 4 are analyzed and discussed in case 1. Moreover, a comparison is established between the results obtained from the central SCOPF model proposed in Reference 37 with the results obtained from the proposed DSCOPF model. The GAMS 38 optimization environment (edition 24.2.1) is used to tackle the proposed model.…”
Section: Results and Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Although all scenarios are studied in case 1, the results of only scenarios 2 and 4 are analyzed and discussed in case 1. Moreover, a comparison is established between the results obtained from the central SCOPF model proposed in Reference 37 with the results obtained from the proposed DSCOPF model. The GAMS 38 optimization environment (edition 24.2.1) is used to tackle the proposed model.…”
Section: Results and Analysismentioning
confidence: 99%
“…Therefore, these constraints would be separated into four constraints. Constraints (36) and (37) are used in the case of conventional generators' outage, and constraints (38) and (39) are employed for the outages of the wind turbine generators. Moreover, the probabilistic representation of the security constraints for the line and tie-line outages are presented in (40) to (43).…”
Section: Probabilistic Reformulationmentioning
confidence: 99%
“…Nevertheless, a representation in dollars/kWh is more frequently employed [101]. The reason for the power outage is irrelevant because the VoLL is an economic indicator [102]. VoLL cannot be directly deduced as market performance because, even if it gives the option of expressing the value of power supply security in monetary terms, there is no market on which power interruptions can be exchanged.…”
Section: Economic Losses Due To Non-delivery Of Powermentioning
confidence: 99%
“…Sustainable electrification renders the need for employing efficient technologies [1]- [2]. In this manner, conservation voltage reduction (CVR) has been well-recognized as a key idea which paves the way to provide sustainable electricity energy.…”
Section: Introductionmentioning
confidence: 99%