Reliability evaluation of demand response to increase distribution network utilisation

A. L. A. Syrri, P. Mancarella

Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

Abstract

In response to distribution network challenges such as increasing demand, infrastructure ageing and integration of distributed generation, alternative approaches are being sought to release existing network capacity, before proceeding to new investments. Considering that most distribution networks in the UK are typically designed as a ring but operated radially, this paper discusses the effect of a loop operation aimed at maximizing the capacity utilisation of the existing asset. In this context, demand response schemes are implemented as a corrective action following a contingency with the aim of maintaining the system within its limits. Sequential Monte Carlo Simulations (SMCS) are used to quantify the reliability performance under different scenarios, also considering the influence of Information and Communications Technology (ICT) and automatic control schemes. Simulation studies have been performed on real UK distribution networks, showing the impact of different types of operation. The results indicate that a radial operation with automated interconnection with other circuits could result in comparable performance indicators and capacity increase as a ring operation.
Original languageEnglish
Title of host publicationhost publication
PublisherIEEE
Publication statusPublished - 2014
EventProbabilistic Methods Applied to Power Systems (PMAPS), 2014 International Conference on - Durham, UK
Duration: 1 Jan 1824 → …

Conference

ConferenceProbabilistic Methods Applied to Power Systems (PMAPS), 2014 International Conference on
CityDurham, UK
Period1/01/24 → …

Keywords

  • corrective security; demand response; meshed operation; reliability assessment; sequential Monte Carlo simulations

Fingerprint

Dive into the research topics of 'Reliability evaluation of demand response to increase distribution network utilisation'. Together they form a unique fingerprint.

Cite this