Analyzing the Diverse Impacts of Conventional Distributed Energy Resources on Distribution System
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 10
Abstract
In recent years, the rapid boost in energy demand around the globe has put power system in stress. To fulfill the energy demands and confine technical losses, researchers are eager to investigate the diverse impacts of Distributed Generation (DG) on the parameters of distribution network. DG is becoming even more attractive to power producing companies, utilities and consumers due to production of energy near to load centers. Reduction in power losses, better voltage profile and less environmental impact are the benefits of DG. Besides renewable energy resources, conventional energy resources are also a viable option for DG. This research aims to analyze the impact of localized synchronous and induction generators on distributions network. The main objectives are to find optimal type, size and location of DG in distribution network to have better impact on voltage profile and reduction in power losses. Using worldwide recognized software tool ETAP and Kohat road electricity distribution network as a test case. Results depicted that at certain buses, positive impacts on voltage profile were recorded while almost 20% of power losses were decreased when synchronous generator as DG unit was injected in distribution network. Injecting induction generator as DG unit, the results showed increase in power losses due to absorption of reactive power, while improving voltage profile by injecting active power.
Authors and Affiliations
Muhammad Aamir Aman, Sanaullah Ahmad, Azzam ul Asar, Babar Noor
Developing a Stochastic Input Oriented Data Envelopment Analysis (SIODEA) Model
Data Envelopment Analysis (DEA) is a powerful quantitative tool that provides a means to obtain useful information about efficiency and performance of firms, organizations, and all sorts of functionally similar, relative...
New Transport Layer Security using Metaheuristics and New Key Exchange Protocol
The easiness of data transmission is one of the information security flaws that needs to be handled rigorously. It makes eavesdropping, tampering and message forgery by malicious more simple. One of the protocols develop...
Efficient Key Agreement and Nodes Authentication Scheme for Body Sensor Networks
Technological evolvement of Wireless Sensor Networks (WSNs) gave birth to an attractive research area for health monitoring called Body Sensor Network (BSN). In BSN tiny sensor nodes sense physiological data of patients...
An Extended Consistent Fuzzy Preference Relation to Evaluating Website Usability
In the current era, website developers recognize usability evaluation as a significant factor in the quality and success of e-commerce websites. Fuzzy Analytical Hierarchy Process (FAHP) is one method to measure the usab...
Performances Analysis of a SCADA Architecture for Industrial Processes
SCADA (Supervisory Control And Data Acquisition) systems are used to monitor and control various industrial processes, and have been continuously developed in order to incorporate the new technologies from software devel...