Generic placeholder image

Recent Advances in Electrical & Electronic Engineering

Editor-in-Chief

ISSN (Print): 2352-0965
ISSN (Online): 2352-0973

Research Article

Analysis on the Penetration Level of Wind Farm Considering Transient Stability Constraint and Uncertainty of Wind Power

Author(s): Bai Hao*, Huang Andi and Zhou Changcheng

Volume 13, Issue 7, 2020

Page: [1078 - 1086] Pages: 9

DOI: 10.2174/2352096513999200421161655

Price: $65

Abstract

Background: The penetration level of a wind farm with transient stability constraint and static security constraint has been a key problem in wind power applications.

Objective: The study explores maximum penetration level problem of wind considering transient stability constraint and uncertainty of wind power out, based on credibility theory and corrected energy function method.

Methods: According to the corrected energy function, the transient stability constraint of the power grid is transferred to the penetration level problem of a wind farm. Wind speed forecast error is handled as a fuzzy variable to express the uncertainty of wind farm output. Then this paper builds a fuzzy chance-constrained model to calculate wind farm penetration level. To avoid inefficient fuzzy simulation, the model is simplified to a mixed integer linear programming model.

Results: The results validate the proposed model and investigate the influence of grid-connection node, wind turbine characteristic, fuzzy reliability index, and transient stability index on wind farm penetration level.

Conclusion: The result shows that the model proposed in this study can consider the uncertainty of wind power out and establish a quantitative transient stability constraint to determine the wind farm penetration level with a certain fuzzy confidence level.

Keywords: Penetration level, wind farm, transient stability, credibility, fuzzy chance constrained model, uncertainty.

Graphical Abstract
[1]
J.G. Slootweg, and W.L. Kling, "The impact of large scale wind power generation on power system oscillations", Electr. Power Syst. Res., vol. 67, pp. 9-20, 2003.
[http://dx.doi.org/10.1016/S0378-7796(03)00089-0]
[2]
C. Xia, and H. Cui, "Q. Wang, and Y. Zhang, “Penetration capacity calculation for distributed generation considering static security constraints", Power Syst. Technol., vol. 33, pp. 96-100, 2009.
[3]
D. Gautam, V. Vittal, and T. Harbour, Impact of increased penetration of DFIG-based wind turbine generators on transient and small signal stability [of power systems.IEEE Trans. Power Syst., vol. 24, pp. 1426-1434, 2009,
[http://dx.doi.org/10.1109/TPWRS.2009.2021234]
[4]
V. Van Thong, and R. Belmans, "Maximum penetration level of distributed generation with safety criteria", Eur. Trans. Electr. Power, vol. 20, pp. 367-381, 2010.
[http://dx.doi.org/10.1002/etep.319]
[5]
M.A. El-Kady, C.K. Tang, V.F. Carvalho, A.A. Fouad, and V. Vittal, "Dynamic security assessment utilizing the transient energy function method", IEEE Trans. Power Syst., vol. 1, pp. 284-291, 1986.
[http://dx.doi.org/10.1109/TPWRS.1986.4334995]
[6]
F.A. Rahimi, M.G. Lauby, J.N. Wrubel, and K.L. Lee, "Evaluation of the transient energy function method for on-line dynamic security analysis", IEEE Trans. Power Syst., vol. 8, pp. 497-507, 1993.
[http://dx.doi.org/10.1109/59.260834]
[7]
D. Fang, T.S. Chung, Y. Zhang, and W. Song, "Transient stability limit conditions analysis using a corrected transient energy function approach", IEEE Trans. Power Syst., vol. 15, no. 2, pp. 804-810, 2000.
[http://dx.doi.org/10.1109/59.867177]
[8]
D.Z. Fang, L. Jing, and T.S. Chung, "Corrected transient energy function-based strategy for stability probability assessment of power systems", IET Gener. Transm. Distrib., vol. 2, pp. 424-432, 2008.
[http://dx.doi.org/10.1049/iet-gtd:20070218]
[9]
N. Zhang, Z. Hu, X. Han, J. Zhang, and Y. Zhou, "A fuzzy chance-constrained program for unit commitment problem considering demand response, electric vehicle and wind power", Int. J. Electr. Power Energy Syst., vol. 65, pp. 201-209, 2015.
[http://dx.doi.org/10.1016/j.ijepes.2014.10.005]
[10]
W. Cheng, and H. Zhang, "A dynamic economic dispatch model incorporating wind power based on chance constrained programming", Energies, vol. 8, pp. 233-256, .
[http://dx.doi.org/10.3390/en8010233]
[11]
B. Liu, "A survey of credibility theory", Fuzzy Optim. Decis. Making, vol. 5, no. 4, pp. 387-408, .
[http://dx.doi.org/10.1007/s10700-006-0016-x]
[12]
L.L. Grigsby, Power system stability and control., CRC press, 2016.
[13]
M.A. Pai, M. Laufenberg, and P.W. Sauer, Some clarifications in the transient energy function method. Int. J. Elec. Power Energ. Syst., vol. 18, pp. 65-72,
[14]
R. Agrawal, and D. Thukaram, "Support vector clustering-based direct coherency identification of generators in a multi-machine power system", IET Gener. Transm. Distrib., vol. 7, pp. 1357-1366, .
[http://dx.doi.org/10.1049/iet-gtd.2012.0681]
[15]
M.A. Chowdhury, N. Hosseinzadeh, W.X. Shen, and H.R. Pota, "Comparative study on fault responses of synchronous generators and wind turbine generators using transient stability index based on transient energy function", Int. J. Electr. Power Energy Syst., vol. 51, pp. 145-152, .
[http://dx.doi.org/10.1016/j.ijepes.2013.02.025]
[16]
B. Liu, "Toward fuzzy optimization without mathematical ambiguity", Fuzzy Optim. Decis. Making, vol. 1, pp. 43-63, .
[http://dx.doi.org/10.1023/A:1013771608623]
[17]
B. Liu, and B. Liu, Theory and practice of uncertain programming., vol. Vol. 239. Springer, 2009.
[http://dx.doi.org/10.1007/978-3-540-89484-1]
[18]
R.H. Liang, and J. Liao, "A fuzzy-optimization approach for generation scheduling with wind and solar energy systems", IEEE Trans. Power Syst., vol. 22, pp. 1665-1674, .
[http://dx.doi.org/10.1109/TPWRS.2007.907527]
[19]
O. Alsac, and B. Stott, "Optimal load flow with steady-state security", IEEE Trans. Power Apparatus Syst, pp. 745-751, 1974.
[http://dx.doi.org/10.1109/TPAS.1974.293972]
[20]
F. Milano, "An open source power system analysis toolbox", IEEE Trans. Power Syst., vol. 20, pp. 1199-1206, 2005.
[http://dx.doi.org/10.1109/TPWRS.2005.851911]
[21]
F. Milano, Power system analysis toolbox quick reference manual for PSAT version 2.1. 2., 2008,
[22]
SimPowerSystems, U.S.G. Version 4., The MathWorks Inc., 2006.
[23]
H.M. Ayres, W. Freitas, M.C. De Almeida, and L. Da Silva, "Method for determining the maximum allowable penetration level of distributed generation without steady-state voltage violations", IET Gener. Transm. Distrib., vol. 4, pp. 495-508, 2010.
[http://dx.doi.org/10.1049/iet-gtd.2009.0317]
[24]
L.Z. Xu, Y. Liu, Y.B. Liu, and M. Bazargan, "Node importance classified comprehensive assessment", Zhongguo Dianji Gongcheng Xuebao, vol. 34, pp. 1609-1617, 2014.

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy