Increasing use of renewable energy sources, liberalized energy markets and most importantly, the integrations of various monitoring, measuring and communication infrastructures into modern power system network offer the opportunity to build a resilient and efficient grid. However, it also brings about various threats of instabilities and security concerns in form of cyberattack, voltage instability, power quality (PQ) disturbance among others to the complex network. The need for efficient methodologies for quicker identification and detection of these problems have always been a priority to energy stakeholders over the years. In recent times, machine learning techniques (MLTs) have proven to be effective in numerous applications including power system studies. In the literature, various MLTs such as artificial neural networks (ANN), Decision Tree (DT), support vector machines (SVM) have been proposed, resulting in effective decision making and control actions in the secured and stable operations of the power system. Given this growing trend, this paper presents a comprehensive review on the most recent studies whereby MLTs were developed for power system security and stability especially in cyberattack detections, PQ disturbance studies and dynamic security assessment studies. The aim is to highlight the methodologies, achievements and more importantly the limitations in the classifier(s) design, dataset and test systems employed in the reviewed publications. A brief review of reinforcement learning (RL) and deep reinforcement learning (DRL) approaches to transient stability assessment is also presented. Finally, we highlighted some challenges and directions for future studies.
Abstract:The role of Demand Side Management (DSM) with Distributed Energy Storage (DES) has been gaining attention in recent studies due to the impact of the latter on energy management in the smart grid. In this work, an Energy Scheduling and Distributed Storage (ESDS) algorithm is proposed to be installed into the smart meters of Time-of-Use (TOU) pricing consumers possessing in-home energy storage devices. Source of energy supply to the smart home appliances was optimized between the utility grid and the DES device depending on energy tariff and consumer demand satisfaction information. This is to minimize consumer energy expenditure and maximize demand satisfaction simultaneously. The ESDS algorithm was found to offer consumer-friendly and utility-friendly enhancements to the DSM program such as energy, financial, and investment savings, reduced/eliminated consumer dissatisfaction even at peak periods, Peak-to-Average-Ratio (PAR) demand reduction, grid energy sustainability, socio-economic benefits, and other associated benefits such as environmental-friendliness.
In today’s grid, the technological based cyber-physical systems have continued to be plagued with cyberattacks and intrusions. Any intrusive action on the power system’s Optimal Power Flow (OPF) modules can cause a series of operational instabilities, failures, and financial losses. Real time intrusion detection has become a major challenge for the power community and energy stakeholders. Current conventional methods have continued to exhibit shortfalls in tackling these security issues. In order to address this security issue, this paper proposes a hybrid Support Vector Machine and Multilayer Perceptron Neural Network (SVMNN) algorithm that involves the combination of Support Vector Machine (SVM) and multilayer perceptron neural network (MPLNN) algorithms for predicting and detecting cyber intrusion attacks into power system networks. In this paper, a modified version of the IEEE Garver 6-bus test system and a 24-bus system were used as case studies. The IEEE Garver 6-bus test system was used to describe the attack scenarios, whereas load flow analysis was conducted on real time data of a modified Nigerian 24-bus system to generate the bus voltage dataset that considered several cyberattack events for the hybrid algorithm. Sising various performance metricion and load/generator injections, en included in the manuscriptmulation results showed the relevant influences of cyberattacks on power systems in terms of voltage, power, and current flows. To demonstrate the performance of the proposed hybrid SVMNN algorithm, the results are compared with other models in related studies. The results demonstrated that the hybrid algorithm achieved a detection accuracy of 99.6%, which is better than recently proposed schemes.
The contributions of Distributed Energy Generation (DEG) and Distributed Energy Storage (DES) for Demand Side Management (DSM) purposes in a smart macrogrid or microgrid cannot be over-emphasised. However, standalone DEG and DES can lead to under-utilisation of energy generation by consumers and financial investments; in grid-connection mode, though, DEG and DES can offer arbitrage opportunities for consumers and utility provider(s). A grid-connected smart microgrid comprising heterogeneous (active and passive) smart consumers, electric vehicles and a large-scale centralised energy storage is considered in this paper. Efficient energy management by each smart entity is carried out by the proposed Microgrid Energy Management Distributed Optimisation Algorithm (MEM-DOA) installed distributively within the network according to consumer type. Each smart consumer optimises its energy consumption and trading for comfort (demand satisfaction) and profit. The proposed model was observed to yield better consumer satisfaction, higher financial savings, and reduced Peak-to-Average-Ratio (PAR) demand on the utility grid. Other associated benefits of the model include reduced investment on peaker plants, grid reliability and environmental benefits. The MEM-DOA also offered participating smart consumers energy and tariff incentives so that passive smart consumers do not benefit more than active smart consumers, as was the case with some previous energy management algorithms.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.