Analysis of voltage profile problems due to the penetration of distributed generation in low-voltage secondary distribution networks

Po Chen Chen, Reynaldo Salcedo, Qingcheng Zhu, Francisco De Leon, Dariusz Czarkowski, Zhong Ping Jiang, Vitaly Spitsa, Zivan Zabar, Resk Ebrahem Uosef

Research output: Contribution to journalArticlepeer-review

Abstract

This paper presents a comprehensive analysis of the possible impacts of different penetration levels of distributed generation (DG) on voltage profiles in low-voltage secondary distribution networks. Detailed models of all system components are utilized in a study that performs hundreds of time-domain simulations of large networked distribution systems using the Electromagnetic Transients Program (EMTP). DGs are allocated in a probabilistic fashion to account for the uncertainties of future installations. The main contribution of this paper is the determination of the maximum amount of DG that secondary distribution networks can withstand without exhibiting undervoltage and overvoltage problems or unexpected load disconnections. This information is important for network planning engineers to facilitate the extension of the maximum penetration limit. The results show that depending on the location, type, and size of the installed DGs, small amounts of DG may cause overvoltage problems. However, large amounts of DG may not cause any voltage problems when properly selected.

Original languageEnglish (US)
Article number6298062
Pages (from-to)2020-2028
Number of pages9
JournalIEEE Transactions on Power Delivery
Volume27
Issue number4
DOIs
StatePublished - 2012

Keywords

  • Distributed generation (DG)
  • low-voltage secondary networks
  • maximum penetration of DG
  • voltage quality

ASJC Scopus subject areas

  • Energy Engineering and Power Technology
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Analysis of voltage profile problems due to the penetration of distributed generation in low-voltage secondary distribution networks'. Together they form a unique fingerprint.

Cite this