Optimal distributed energy storage investment scheme for distribution network accommodating high renewable penetration

Xishan Wen, Yi Yu, Zhao Xu, Jian Zhao, Jiayong Li

Research output: Journal article publicationJournal articleAcademic researchpeer-review

14 Citations (Scopus)

Abstract

To counterbalance the significant challenges imposed by renewable distributed generations penetration, this paper discusses the need of distributed energy storage system investment in distribution networks and proposes a robust optimization based storage investment model. The operational constraints of distribution network (e.g., voltage profile and substation capacity limitation) and storage device (e.g., state of energy and charging/discharging limit) are considered to guarantee the technical operation requirements. The proposed model is mathematically formulated as a two-stage robust optimization with uncertainty of renewable distributed generator that is quantified by a polyhedral uncertainty set. The investment-decision variables are optimized in the first stage, and the feasibility in the real-time worst-case scenario is checked in the second stage. A column-and-constraint generation (C&CG) algorithm and the big-M linearization method are employed to solve the associated optimization problem. Numerical experiments on IEEE-37-node and IEEE-123-node distribution networks demonstrate the effectiveness of the proposed model.

Original languageEnglish
Article numbere12002
JournalInternational Transactions on Electrical Energy Systems
Volume29
Issue number7
DOIs
Publication statusPublished - Jul 2019

Keywords

  • distribution network
  • energy storage system
  • solar energy
  • uncertainty set
  • voltage profile
  • wind power

ASJC Scopus subject areas

  • Modelling and Simulation
  • Energy Engineering and Power Technology
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Optimal distributed energy storage investment scheme for distribution network accommodating high renewable penetration'. Together they form a unique fingerprint.

Cite this