Next Article in Journal
Tunneling between Multiple Histories as a Solution to the Information Loss Paradox
Previous Article in Journal
Recent Advances in Statistical Theory and Applications
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Dynamic Risk Assessment of Voltage Violation in Distribution Networks with Distributed Generation

Electric Power Science Research Institute, State Grid Hubei Electric Power Co., Ltd., Wuhan 430077, China
*
Author to whom correspondence should be addressed.
Submission received: 8 November 2023 / Revised: 2 December 2023 / Accepted: 13 December 2023 / Published: 15 December 2023
(This article belongs to the Topic Research Frontier in Renewable Energy Systems)

Abstract

:
In response to the growing demand for economic and social development, there has been a significant increase in the integration of distributed generation (DG) into distribution networks. This paper proposes a dynamic risk assessment method for voltage violations in distribution networks with DG. Firstly, considering the characteristics of random variables such as load and DG, a probability density function estimation method based on boundary kernel density estimation is proposed. This method accurately models the probability of random variables under different time and external environmental conditions, such as wind speed and global horizontal radiation. Secondly, to address the issue of correlated DG in the same region, an independent transformation method based on the Rosenblatt inverse transform is proposed, which enhances the accuracy of probabilistic load flow. Thirdly, a voltage violation severity index based on the utility function is proposed. This index, in combination with probabilistic load flow results, facilitates the quantitative assessment of voltage violation risks. Finally, the accuracy of the proposed method is verified on the IEEE-33 system.

1. Introduction

To reduce the consumption of high-carbon-emission fossil fuels, the renewable energy sector has witnessed rapid growth. Photovoltaics (PVs) and wind turbines (WTs) have been extensively constructed, and they have been integrated into the distribution network in the form of distributed generation (DG), gradually transforming the conventional passive distribution network into a complex active distribution network [1,2,3].
Due to the significant influence of natural environmental factors such as solar radiation, PVs exhibit instability, marked by pronounced randomness and fluctuation [4]. Similarly, WTs are constrained by natural factors like wind speed, resulting in strong randomness and uncertainty [5]. The substantial integration of DG and the fluctuating loads introduce various sources of uncertainty into the distribution network system, significantly affecting its stable operation. This elevates the risk of voltage violations at network nodes, posing a considerable challenge to voltage control throughout the entire grid.
Hence, scholars have embarked on research pertaining to voltage violation risk assessment in distribution networks with DG [6,7,8]. However, the majority of these risk assessment studies primarily rely on historical data of DG to determine “static risks” of voltage violations at network nodes. They do not take into account load variations at different times and the influence of external environmental factors on DG. For instance, the load levels are typically lower during the late night compared to the afternoon, and the DG output can significantly differ under varying environmental conditions. These factors can lead to substantial variations in voltage violation risk in the same node at different times on the same day or at the same time on different days. Consequently, it becomes imperative to propose a dynamic risk assessment methodology for voltage violations in distribution networks with DG which can offer information for the coordination and control of network node voltages. Given the complex operating conditions in active distribution networks, deterministic load flow analysis methods often yield imprecise results, necessitating the use of probabilistic load flow (PLF) for analytical computations.
PLF analysis methods can be broadly categorized into three main types: the Monte Carlo Simulation (MCS) [9,10], the Point Estimate Method (PEM) [11,12], and analytical methods [13]. The MCS involves the simulation of numerous random variable samples through sampling, resulting in high accuracy but consuming a significant amount of time for calculations. The PEM approximates the moments of the output variables based on the characteristics of input random variables, but its computational efficiency is closely tied to the number of variables. Analytical methods rely on relationships among input random variables to calculate the probability statistical characteristics of output random variables. The key challenge of analytical methods lies in handling complex convolution calculations. Given the intricacies of convolution operations, it is possible to enhance computational efficiency by substituting convolution calculations with cumulant operations.
Currently, there are three main issues with using the probabilistic load flow based on the cumulant method (PLFCM) for dynamic risk assessment of voltage violations in distribution networks with DG.
The first issue pertains to the accuracy of the probability models for random variables such as load and DG, which directly affect the results of load flow calculations. There are currently two main approaches to describing probability models for random variables: parameter-based methods [14] and non-parameter-based methods [15]. Parameter-based methods begin by assuming that the research subject follows a certain probability distribution based on empirical observations. Then, they calculate the relevant parameter from actual samples to obtain a complete probability density function (pdf). However, due to the randomness of DG and the volatility of load, common probability density forms such as the Beta distribution and Weibull distribution often fail to accurately reflect the actual probability distribution, leading to significant errors. Non-parameter-based methods, on the other hand, do not require prior assumptions about the underlying probability distribution model or prior knowledge. Instead, they directly analyze the probability distribution based on actual data. Kernel density estimation (KDE) is the most widely used non-parameter method [16]. However, a notable characteristic of random variables like load and DG is that they are bounded. Traditional KDE methods, when applied to bounded data, can exhibit boundary effects that subsequently impact the results of probabilistic load flow. Additionally, another prominent feature of DG is its susceptibility to external environmental factors. As is well known, wind speed and global horizontal radiation are the most important factors affecting the output of WT and PV, respectively. How to achieve dynamic probity density estimation for DG remains an unresolved challenge under the influence of both.
The second issue pertains to the prerequisite that input variables must be mutually independent for the application of PLFCM. Due to the consistent characteristics of renewable energy sources in the same or neighboring areas, unit outputs often exhibit similar trends. The existence of correlations between input variables makes it impractical to directly employ this method for probabilistic load flow, necessitating the transformation of correlated outputs into independent ones. Presently, two widely used methods for achieving this are the Orthogonal inverse transform [17] and the Nataf inverse transform [18]. The Orthogonal inverse transform is straightforward and widely applied, while the Nataf inverse transform uses the correlation coefficient matrix, taking into account changes in equivalent correlation coefficients before and after transformation. However, both of these methods rely on the Pearson correlation coefficient and cannot capture nonlinear relationships among DGs. Moreover, they require variables to adhere to specific distribution types to achieve higher accuracy. Furthermore, the most challenging aspect of the Nataf inverse transform is determining the equivalent correlation coefficients. Although some scholars [19] have provided empirical formulas for a certain number of equivalent correlation coefficients for the reference of other researchers, they only cover a limited range of common probability distributions. Addressing how to achieve a more precise and widely applicable independent transformation for random variables is an issue that requires resolution.
The third issue is the establishment of a reasonable risk assessment framework, which is a key factor in achieving voltage violation risk assessment in distribution networks with DG. Risk is a comprehensive measure that combines the probability of an event occurring with the severity of its consequences [20]. When conducting risk assessments, both aspects should be taken into consideration. Traditional risk assessments often focus solely on the probability of a voltage violation occurring, without considering the severity of its consequences. Voltage violation events with a low probability but significant impact should receive more attention than those with a higher probability but less significant consequences. How to accurately portray the severity of losses resulting from risk events is a currently unresolved issue.
To address the aforementioned issues, this paper proposes a dynamic risk assessment method for voltage violations in distribution networks with DG. Firstly, a pdf estimation method is proposed, based on boundary kernel density estimation (BKDE), to overcome the problem of errors at boundary points when handling bounded data. Moreover, considering the significant impact of wind speed and global horizontal radiation on DG, conditional density is introduced to enable the dynamic probability density estimation of DG based on numerical weather prediction (NWP). Secondly, an independent transformation method based on the Rosenblatt inverse transform is proposed. This method accurately characterizes the correlations between DG variables, achieving an independent transformation of variables, and laying the foundation for subsequent PLFCM. Thirdly, a voltage violation severity index based on the utility function is proposed. By combining this index, an integrated risk assessment framework is constructed on the basis of the probability of voltage violations. This framework quantitatively analyzes the dynamic risk of voltage violations in distribution networks with DG at both the node and system levels. Finally, simulation tests on the IEEE-33 system validate the rationality and effectiveness of the proposed method.

2. Pdf Estimation Based on BKDE

KDE is a data-driven, non-parametric method for estimating pdf and has the advantage of being unaffected by the choice of prior models [21]. It is commonly used for data fitting when it is challenging to directly obtain the underlying pdf. This method is suitable for analyzing the probability characteristics of load and DG. Hence, in this paper, the KDE method is employed for estimation.
Given a set of independently and identically distributed data, X1, ..., XN, with an unknown density function f(x), the KDE is calculated as follows:
f ^ X x = 1 N h i = 1 N K x X i h
where K(∙) represents the kernel function; N represents the sample size; h represents the bandwidth; x represents the point at which the kernel density estimate is being calculated; and Xi represents the ith sample.
The choice of the kernel function can indeed influence the results of KDE. Generally, the direction of the sample Xi from the density point x does not affect the estimation, and the closer the distance from x, the more weight should be assigned to Xi. Therefore, a unimodal kernel function centered at 0 is typically chosen. In this paper, the Epanechnikov kernel function is used:
K z = 3 4 1 z 2 I z 1
where I(∙) represents the indicator function, which has a value of 1 when z satisfies the condition and 0 otherwise. Given z = (xXi)/h and substituting (2) into (1), we can obtain the complete formula for the KDE.

2.1. pdf Estimation for Load

Assuming in the distribution network there are NL load nodes, the load data for the distribution network at time i, denoted as P i L , can be expressed as follows:
P i L = P i 1 L P i 2 L P i N L L
where P i k L represents the local load power measurement for node k at time i. Additionally, if there are historical data for the load power for a total of T time, the historical load data, PL, can be described as follows:
P L = P 11 L P 12 L P 1 N L L P 21 L P 22 L P 2 N L L P T 1 L P T 2 L P T N L L
In (4), the data for each load column can be decomposed, based on daily patterns, into two components: the basic data with a daily cycle and the random fluctuation data. Therefore, when performing PLFCM, the pdf for node k at time t can be calculated using the power data set for different days at the same time t, denoted as P t L , k .
P t L , k = P m T d + t k L , m = 0 , 1 , , T T d 1
where Td represents the number of monitoring sample points within one day.
However, a significant characteristic of load is that it is bounded, and its power consumption is always greater than zero. Therefore, when performing KDE, it is necessary to consider the impact of boundary effects.
The expression for the bias of the KDE is as follows:
B i a s f ^ x = h 2 σ k 2 f x 2 + O h 4
where σ k 2 = ∫u2K(u)du, and K(u) is the kernel function as shown in (2).
It can be observed that this bias diminishes as the bandwidth h decreases, approaching 0 at a rate of h2. However, when the pdf has a boundary at 0, the above expression is no longer applicable. Instead, it is replaced by:
E f ^ K x = a 0 x f x h a 1 x f x + O h 2
where ai(x) = 1 x / h uiK(u)du. It can be observed that when xh, a0(x) = 1 and a1(x) = 0, leading to no difference in bias from (6). However, when 0 ≤ x < h, both a0(x) and a1(x) are non-zero, implying that bias is always present at the boundary.
In this case, when another kernel function L(x) is used to estimate f(x) once again, there is as follows:
E f ^ L x = b 0 x f x h b 1 x f x + O h 2
where b0 and b1 are similar to a0 and a1 from (7), except that (8) is specific to L(x). By performing a linear combination of (7) and (8), we can obtain:
b 1 x * E f ^ K x a 1 x * E f ^ L x = b 1 x a 0 x a 1 x b 0 x f x + O h 2
Equation (9) can be equivalently viewed as an estimation of f(x) using a new kernel function. This new kernel function is as follows:
K B x = b 1 x K x a 1 x L x b 1 x a 0 x a 1 x b 0 x
In particular, if L(x) is taken as x*K(x), KB(x) will have a simple form:
K B x = a 2 x a 1 x x K x a 0 x a 2 x a 1 2 x
When xh, the new kernel function KB(x) is the same as K(x), but when 0 ≤ x < h (i.e., at the boundary), it adjusts the original kernel function. When x < 0, the estimated value is taken as 0.
Based on (1), (2), and (11), we can derive the calculation formula for BKDE by substituting (5), which provides the pdf for node k at time t.
Taking an exponential distribution with a parameter of 1 as an example, the performance of BKDE is tested. One thousand random numbers are generated from this exponential distribution, and pdf estimation is performed using both KDE and BKDE. Figure 1 shows the results of these two estimation methods compared to the actual pdf.
Observing Figure 1, it can be seen that, compared to the true density function, the results obtained by KDE exhibit a noticeable decrease at the boundary. In contrast, the results obtained by BKDE closely match the real situation, and the bias issues near the boundary have been significantly improved.

2.2. Conditional pdf Estimation for DG

For DG, its generated power is constrained between 0 and its maximum capacity. After normalization to the maximum capacity, its double boundary is [0, 1]. Therefore, when calculating the kernel function as shown in (11), the parameters ai(x) are:
a i x = x 1 / h x / h u i K u d u
In addition to its bounded nature, another significant characteristic of DG is its strong correlation with external factors. For instance, PVs might exhibit significant variations in power data at different times of one day due to differences in radiation. Therefore, the probability model for DG at time t can be characterized jointly by the conditional pdf and the predicted values of conditional variables at time t.
The conditional pdf for DG at time t can be represented as:
f ^ P p t Y = y t = f ^ P , Y p t , y t f ^ Y y t
where pt is the DG output at time t, yt is the predicted value of the conditional variable at time t, f ^ P is the conditional pdf for DG, f ^ Y is the pdf for the conditional variable, and f ^ P , Y is the joint pdf.
Based on Equations (1), (2), and (11), the conditional pdf for DG can be represented as:
f ^ P p t Y = y t = 1 N h 1 h 2 i = 1 N K 1 B p t P i h 1 K 2 B y t Y i h 2 1 N h 2 i = 1 N K 2 B y t Y i h 2
where Pi represents historical samples of DG, Yi represents corresponding historical samples of conditional variables, h1 and h2 are bandwidth parameters, and K 1 B (∙) and K 2 B (∙) are kernel functions.
Different types of DG correspond to different conditional variables. In this paper, the conditional variable for PVs is global horizontal radiation, while for WTs, it is wind speed.

3. PLFCM Based on the Rosenblatt Inverter Transform

3.1. Independent Transform Based on Rosenblatt Inverter Transformation

3.1.1. Joint pdf for DG

Due to the characteristics of wind and solar energy sources, DGs located in close geographical proximity exhibit some level of similarity in their output, showing spatial correlation. The higher the spatial correlation among DGs, the stronger the synchronization between different DGs, making PLFCM more challenging. Therefore, in order to establish a foundation for subsequent Rosenblatt inverse transform and PLFCM, it is essential to accurately characterize the joint pdf of DG.
Assuming that the multivariate data P i 1 D , ..., P i d D (i = 1, ..., N) are historical data from d different DGs ( P 1 D , ..., P d D ), their joint density function can be calculated through KDE using the following equation:
f ^ P 1 D P d D p 1 D , , p d D = 1 N h 1 h d i = 1 N j = 1 d K j p j D P i j D h j
where h1, ..., hd are bandwidth parameters, and Kj(∙) are kernel functions corresponding to the variable P j D (j = 1, ..., d).
Taking into account the boundary characteristics of DG and external conditional factors, the joint pdf for DG at time t can be represented as follows:
f ^ P 1 D , , P d D p 1 t D , , p d t D Y 1 = y 1 t , , Y d = y d t = 1 N h 1 p h d p h 1 y h d y i = 1 N j = 1 d K j B p j t D P i j D h j p k = 1 d K k B y k t Y i j h k y 1 N h 1 y h d y i = 1 N k = 1 d K k B y k t Y i j h k y

3.1.2. Independent Transform

The Rosenblatt transform can directly convert a set of correlated non-normal variables UC = ( U 1 C , U 2 C , ..., U N C )T into independent standard normal variables UI = ( U 1 I , U 2 I ,..., U I n )T. According to the principle of equiprobability marginal transformation, it can be expressed as follows:
Φ u 1 I = F 1 u 1 C Φ u 2 I = F 2 1 u 2 C u 1 C Φ u n I = F n 1 , 2 , , n 1 u n C u 1 C , u 2 C , , u n 1 C
where Φ(∙) represents a cumulative distribution function (CDF) of normal distribution, and F(∙) represents a conditional CDF.
Taking the inverse of (17) will yield the independent standard normal variables UI, which can be expressed as:
u 1 I = Φ 1 F 1 u 1 C u 2 I = Φ 1 F 2 1 u 2 C u 1 C u n I = Φ 1 F n 1 , 2 , , n 1 u n C u 1 C , u 2 C , , u n 1 C
Equation (18) is known as the Rosenblatt transform. It is not influenced by the distribution type or the correlation type and is considered a precise transformation method. The conditional CDF can be obtained by integrating the joint PDF derived from (16).
Through its inverse transform, standard normal variables can be transformed into independent samples of DG, and the basic steps are as follows:
(1) Generate m samples that follow the standard normal distribution functions U 1 I , U 2 I , ..., U n I .
(2) Use (18) to obtain:
u 1 C = F 1 1 Φ u 1 I
From (19), it can obtain m samples of one of the DG, denoted as u 1 C .
(3) Extend to n DG, the following is applicable:
u n C = F n 1 , 2 , , n 1 1 Φ u n I u 1 C , u 2 C , , u n 1 C

3.2. PLFCM

3.2.1. Linearized Load Flow Model

Considering the random variation in node injection power, the polar form of the system power flow equation is Taylor-expanded at the base operating point, retaining only the first-order term, yielding as follows:
Δ X = J 0 1 Δ W = S 0 Δ W Δ Z = G 0 J 0 1 Δ W = T 0 Δ W
where ∆X, ∆W, and ∆Z represent the perturbations in node state variables, node injection power variables, and branch power variables, respectively. S0 and T0 are sensitivity matrices. J0 is the Jacobian matrix obtained in the last iteration of the power flow calculation. G0 = (∂Z/∂X)|X=X0.

3.2.2. Cumulant Computation

Cumulants can be calculated based on origin moments that do not exceed their order, and in this paper, only the first eight orders are considered. The relationship between various orders of cumulants and origin moments, as well as the specific derivation process, can be found in [22].
For load, the origin moments of all orders can be calculated using the density function obtained from its historical data based on BKDE.
α v = + x v f ^ x d x
where αv represents the vth order origin moment.
For DG variables with correlation, it is necessary to first generate mutually independent samples following the standard normal distribution. Then, using the Rosenblatt inverse transform, independent samples of the DG variables can be obtained. Based on this, the cumulants of that variable can be calculated using the relationship between origin moments and cumulants.
Once the cumulants of the node injection power changes, ΔW, are computed, it can then determine the cumulants of the node state changes, ΔX, and the cumulants of the branch power changes, ΔZ, for each order using the following equation:
Δ X k = S 0 k Δ W D G k + Δ W L k Δ Z k = G 0 J 0 1 k Δ W D G k + Δ W L k
where Δ W D G ( k ) and Δ W L ( k ) represent the kth order cumulants for changes in DG injection power and changes in load injection power, respectively.

3.2.3. Cornish–Fisher Series Expansion

Series expansion can approximate the cumulants of output variables as probability distributions. According to [23], the Cornish–Fisher series provides higher accuracy. Therefore, in this study, the CDF of output variables is obtained using the Cornish–Fisher series.
The approach of the Cornish–Fisher series expansion entails initially selecting a specific quantile, followed by computing the quantiles of the state variable, and ultimately deriving the cumulative distribution of that variable. Assuming α represents the quantile of random variable X, x(α) can be expressed as follows:
x ( α ) = ζ ( α ) + ζ 2 ( α ) 1 6 g 3 + ζ 3 ( α ) 3 ζ ( α ) 24 g 4 2 ζ 3 ( α ) 5 ζ ( α ) 36 g 3 2 + ζ 4 ( α ) 6 ζ 2 ( α ) + 3 120 g 5 +
where ζ(α) = Φ−1(α), and gv represents the vth order normalized cumulant.
By utilizing the relationship x(α) = F−1(α), the CDF F(x) of the output random variable X can be determined, thereby providing the probability of node voltage violation.

4. The Voltage Violation Risk Assessment Metric Based on the Utility Function

This section provides a comprehensive assessment of node voltage violation risk in distribution networks with DG by considering both the probability of voltage violation and the severity of such violation. This approach allows for a quantitative evaluation at both the node and system levels, serving as the basis for coordinated voltage control.

4.1. The Probability of Voltage Violation

The voltage violation probability refers to the likelihood of nodes deviating from the permissible voltage range, encompassing both overvoltage and undervoltage conditions. It can be determined through the previously conducted PLFCM analysis.
r V i = F V i m i n ,     V i < V i m i n 0 ,           V i m i n < V i < V i m a x 1 F V i m a x ,         V i > V i m a x
where r(Vi) represents the voltage violation probability for node i, F(Vi) represents the voltage CDF for node I, and V i m i n , and V i m a x represent the lower and upper voltage limits permissible for node i, respectively.

4.2. The Severity of Voltage Violation

Voltage violation severity reflects the level of severity caused to the system and equipment when the voltage deviates from permissible values. The traditional voltage violation severity function, denoted as Se, is represented by linear functions.
S e = V i V i m a x V i m a x , V i > V i m a x V i m i n V i V i m i n , V i < V i m i n
In reality, many electrical devices exhibit more severe consequences as voltage deviation increases. For instance, a slight voltage deviation from the permissible range might lead to a decrease in product quality in manufacturing equipment, and as the extent of voltage deviation deepens, it can even impact equipment safety, resulting in significant consequences such as equipment damage. Therefore, the severity assessment function should be more sensitive to reflect the consequences when the deviation is severe. This paper employs the utility function to define the severity function of node voltage violation.
S e θ V i = e k θ V i 1 e 1
where k represents the risk factor, and a larger value indicates greater sensitivity to risk. θ(Vi) represents the voltage deviation index, defined as follows:
θ V i = V i m i n V i V B ,     V i < V i m i n 0 ,     V i m i n < V i < V i m a x V i V i m a x V B , V i > V i m a x

4.3. The Comprehensive Assessment of Voltage Violation

Taking into account both voltage violation probability and the severity of such violations, the comprehensive risk index for voltage violation of node i, Ri, and the system-level comprehensive risk index Rs, can be defined as follows:
R i = V i m i n f V i S e θ V i d V i + V i m a x + f V i S e θ V i d V i
R s = i = 1 n R i
where n represents the number of system nodes, and f(Vi) represents the voltage pdf of node i, which can be derived from F(Vi) using numerical differentiation.

5. The Process of the Proposed Method

The method proposed in this paper enables dynamic risk assessment of voltage violation in distribution networks with DG, which is crucial for coordinated voltage control. The specific flow chart of the method is depicted in Figure 2 and comprises three main steps:
Step 1: Probability Density Function Estimation. Accurate pdfs are obtained through BKDE, utilizing historical data for both load and DG, while also accounting for the influence of external factors.
Step 2: Probability Load Flow Calculation. Considering the correlation between DGs, independent DG variables are obtained through the Rosenblatt inverse transform. Based on these variables, PLFCM is applied to compute the probability distribution of node voltages.
Step 3: Risk Assessment. The severity of voltage violation at the node is considered through the application of the utility function, and this, combined with the results of PLFCM, yields dynamic risk assessment outcomes at both the node and system levels.

6. Case Study

Due to the confidentiality requirement, real grid data are difficult to obtain, so the case study in this paper is conducted using an improved IEEE-33 system, as depicted in Figure 3. A WT with a capacity of 600 kW is connected to node 26, while two PVs are connected to node 33 and node 15 with capacities of 500 kW and 450 kW, respectively. The daytime DG penetration rate is approximately 30%. The output data for WTs and PVs is real and derived from a WT and PVs located in a specific region in northwest China, along with historical weather records providing the corresponding wind speed and global horizontal radiation data. To better simulate the probability density of the 24 h base load, the ratio of the load for each hour relative to the maximum load of that node is defined according to the solid line in Figure 4. In accordance with daily patterns, the load can be decomposed into two components: periodic base data and random fluctuation data. To reflect the load’s volatility, the standard deviation of the load is set to 20%. Following the three-sigma rule, it can be considered that the load ratios at each time fall within the shaded area of Figure 4.
In this section, the accuracy of pdf modeling under real data using BKDE and KDE is compared. Subsequently, the effectiveness of the proposed method for risk assessment is validated through simulations in two cases: when there is abundant radiation and high wind speed resulting in higher DG output during the daytime, and when there is no radiation at night coupled with low wind speed leading to reduced DG output.

6.1. The Performance of pdf Modeling

Section 2.1 compares the pdf modeling results of BKDE and KDE with simulation data through a simple example. Here, the accuracy of the modeling of the two is compared again through real DG data. Since the real pdf of the DG data is unknown, the relative error between the mean and variance of the modeled pdf and the mean and variance of the real measured data is used as the criterion for comparison. When using the measured data for PV, the data for the time when the PV is not producing power at night were removed. The results are presented in Table 1. Figure 5, Figure 6 and Figure 7 show histograms of the DG real data as well as the pdfs calculated by BKDE and KDE.
The results from Figure 5, Figure 6 and Figure 7 reveal that KDE exhibits a segment of density curve near the boundary points that markedly contradicts the actual histogram trend, whereas BKDE yields results consistent with the actual trend. It can be affirmed that the results from BKDE are more in line with the actual data-based histogram compared to KDE.
R E = V a l u e c V a l u e r V a l u e r × 100 %
where Valuec represents the mean or variance of the modeled pdf, and Valuer represents the mean or variance of the real measured data.

6.2. Case 1: High DG Output

Assuming that, based on NWP, the wind speed forecast for WT at 11 a.m. on a certain day is 10 m/s, and the global horizontal radiation at PV1 is 850 W/m2, while at PV2, it is 900 W/m2. Based on the BKDE, the pdfs and CDFs of WT, PV1, and PV2 can be obtained, as shown in Figure 8, along with the joint pdf and joint CDF between these variables, as illustrated in Figure 9, Figure 10 and Figure 11.
From the above figures, it is evident that the variables WT, PV1, and PV2 do not satisfy the condition of mutual independence between them. Therefore, it is not possible to directly perform PLFCM, and an independent transformation is required.
After performing the Rosenblatt inverse transformation, the correlated DG variables were transformed to become independent samples. Table 2 and Table 3 present the Pearson correlation coefficient, Kendall correlation coefficient, and Spearman correlation coefficient between WT, PV1, and PV2 before and after the transformation. The results indicate that after the transformation, the absolute values of the correlation coefficients between DG variables were largely reduced to below 0.1, significantly decreasing their correlations and rendering them nearly independent.
In this paper, the accuracy of the proposed method is validated through the MCS method for PLF. Additionally, a method based on Orthogonal inverse transform is employed to calculate PLF for comparative purposes. To account for the correlation, the MCS method used DG data that originally had correlations before the independence transformation. It employed random sampling based on the joint pdf of the DG variables obtained previously.
In total, the MCS method conducted 20,000 random samples, performed deterministic load flow, and obtained the pdf of node voltages. Figure 12 illustrates the voltage pdf of three DG-connected nodes and the last node 18.
Due to space limitations, it is difficult to plot the pdf of all nodes under the three different methods. Therefore, in this paper, the results of the MCS method are used as the standard to calculate the relative errors of the mean and variance obtained by both the PLFCM with Rosenblatt inverse transform and PLFCM with Orthogonal inverse transform. The results are shown in Table 4.
Observing Figure 12, it can be noted that the results obtained from the PLFCM based on BKDE and Rosenblatt inverse transformation are in good agreement with the outcomes of the MCS method. Node 26 is located in the middle of the radial distribution network and has a WT connection, which is why its voltage remains within the allowable range without violations. However, nodes 33, 15, and 18 are situated at the endpoints of the distribution network. Despite having DG support at these nodes or in their vicinity, voltage violations below the lower limit still occur due to the impedance losses in the transmission lines.
Moreover, as can be seen from Table 4, the error of PLFCM based on the Orthogonal inverse transform is significantly larger than that of PLFCM based on the Rosenblatt inverse transform proposed in this paper. This is due to the fact that the Orthogonal inverse transform is unable to characterize the nonlinear relationship that exists between the DG variables.
The time used for the calculation of the three methods is shown in Table 5.
By comparing the computation times in Table 5, it can be found that the computation time of PLFCM with Rosenblatt inverse transform and PLFCM with Orthogonal inverse transform is greatly reduced and the computation efficiency is improved compared with the MCS method. Through the above analysis, in general, the method proposed in this paper has high accuracy and prediction precision, and the calculation time is greatly reduced.
The corresponding risk indexes can be calculated based on the node voltage violation probability combined with the severity of the violation. A risk factor of three is assigned to regular nodes, while a risk factor of four is assigned to DG-connected nodes. Table 6 presents the voltage violation probability and risk indexes for each node. Nodes with risk indexes above 0.01 are considered high risk, while those between 0.0001 and 0.01 are categorized as medium risk, values below 0.0001 are classified as low risk, and a risk index of 0 indicates no risk. Figure 13 illustrates the risk zones of the system at different levels at 11 a.m.

6.3. Case 2: Low DG Output

Assuming that, based on NWP, the wind speed forecast for WT at 9 p.m. on a certain day is 6 m/s. Since it is night-time, the global horizontal radiation is zero, resulting in no power output from PV1 and PV2. Utilizing the BKDE, the pdf and CDF for WT can be obtained, as shown in Figure 14.
As there is only one DG generating power at this moment, there is no correlation among multiple DGs. Hence, the PLFCM can be performed directly as there is no need for independent transformation. So in this section, only two methods are used for calculating the pdf of voltage, which are PLFCM and MCS. The sampling number of the MCS is still 20,000 times. The pdf of voltage at the WT-connected node and the last node 18 are shown in Figure 15. Table 7 illustrates the relative errors of the mean and variance of each node. Table 8 demonstrates the computation time for both methods.
From Figure 15, it can be observed that despite the relatively low WT output, node 26, due to its location and reduced load, maintains its voltage within the normal range. However, the end-node 18 experiences consistently low voltage levels during the night due to the lack of nearby PV power support. The voltage violation probability and risk indexes for each node at this time are presented in Table 9. Figure 16 illustrates the risk levels of the system at 9 p.m.

7. Conclusions

A dynamic risk assessment method for voltage violation in distribution networks with DG is proposed in this paper, which mainly contributes to the following three points.
Firstly, a pdf modeling method based on BKDE and conditional density is proposed. This method provides a more accurate representation of stochastic variables with boundary constraints, such as load and DG. Simulation results on actual DG data indicate that the relative errors of mean and variance using this method are approximately one-third of those obtained with KDE.
Secondly, to address the correlation between DG variables within the same region, an independent transformation method based on the Rosenblatt inverter transformation is proposed. This method has the capability to reduce the absolute values of correlation coefficients between random variables to below 0.1, laying the foundation for accurate PLFCM. Compared to the PLFCM based on the Orthogonal inverse transform, the proposed method demonstrates a reduction of one to two orders of magnitude in the relative errors of mean and variance, with comparable computational times.
Finally, an index for the severity of voltage violation, based on a utility function, is proposed. This index, combined with the voltage violation probability, quantitatively characterizes the risk of voltage violation at nodes and provides essential information for coordinated voltage control.

Author Contributions

Conceptualization, W.H. and Y.L.; methodology, F.Y.; software, Y.S.; validation, H.C. and F.Y.; formal analysis, W.H.; investigation, Y.L.; resources, Z.Y.; data curation, Y.S.; writing—original draft preparation, W.H.; writing—review and editing, H.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research is supported by the project of State Grid Hubei Electric Power Co., Ltd. (B11532222261).

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Ehsan, A.; Yang, Q. State-of-the-art techniques for modelling of uncertainties in active distribution network planning: A review. Appl. Energy 2019, 239, 1509–1523. [Google Scholar] [CrossRef]
  2. Wang, Y.; Ma, H.; Xiao, X.; Wang, Y.; Zhang, Y.; Wang, H. Harmonic State Estimation for Distribution Networks Based on Multi-Measurement Data. IEEE Trans. Power Deliv. 2023, 38, 2311–2325. [Google Scholar] [CrossRef]
  3. Mansouri, N.; Lashab, A.; Guerrero, J.M.; Cherif, A. Photovoltaic power plants in electrical distribution networks: A review on their impact and solutions. IET Renew. Power Gener. 2020, 14, 2114–2125. [Google Scholar] [CrossRef]
  4. Palahalli, H.; Maffezzoni, P.; Gruosso, G. Gaussian Copula Methodology to Model Photovoltaic Generation Uncertainty Correlation in Power Distribution Networks. Energies 2021, 14, 2349. [Google Scholar] [CrossRef]
  5. Toft, H.S.; Svenningsen, L.; Sørensen, J.D.; Moser, W.; Thøgersen, M.L. Uncertainty in wind climate parameters and their influence on wind turbine fatigue loads. Renew. Energy 2016, 90, 352–361. [Google Scholar] [CrossRef]
  6. Ye, K.; Zhao, J.; Zhang, H.; Zhang, Y. Data-Driven Probabilistic Voltage Risk Assessment of MiniWECC System with Uncertain PVs and Wind Generations using Realistic Data. IEEE Trans. Power Syst. 2022, 37, 4121–4124. [Google Scholar] [CrossRef]
  7. Tourandaz Kenari, M.; Sepasian, M.S.; Setayesh Nazar, M. Probabilistic assessment of static voltage stability in distribution systems con-sidering wind generation using catastrophe theory. IET Gener. Transm. Distrib. 2019, 13, 2856–2865. [Google Scholar] [CrossRef]
  8. Deng, W.; Zhang, B.; Ding, H.; Li, H. Risk-Based Probabilistic Voltage Stability Assessment in Uncertain Power System. Energies 2017, 10, 180. [Google Scholar] [CrossRef]
  9. Fang, S.; Cheng, H.; Xu, G. A Modified Nataf Transformation-based Extended Quasi-Monte Carlo Simulation Method for Solving Probabilistic Load Flow. Electr. Power Compon. Syst. 2016, 44, 1735–1744. [Google Scholar] [CrossRef]
  10. Xie, Z.Q.; Ji, T.Y.; Li, M.S.; Wu, Q.H. Quasi-Monte Carlo Based Probabilistic Optimal Power Flow Considering the Correlation of Wind Speeds Using Copula Function. IEEE Trans. Power Syst. 2018, 33, 2239–2247. [Google Scholar] [CrossRef]
  11. Mohammadi, M.; Shayegani, A.; Adaminejad, H. A new approach of point estimate method for probabilistic load flow. Int. J. Electr. Power Energy Syst. 2013, 51, 54–60. [Google Scholar] [CrossRef]
  12. Zou, B.; Xiao, Q. Probabilistic load flow computation using univariate dimension reduction method. Int. Trans. Electr. Energy Syst. 2014, 24, 1700–1714. [Google Scholar] [CrossRef]
  13. Singh, V.; Moger, T.; Jena, D. Probabilistic Load Flow for Wind Integrated Power System Considering Node Power Uncertainties and Random Branch Outages. IEEE Trans. Sustain. Energy 2023, 14, 482–489. [Google Scholar] [CrossRef]
  14. Wang, Y.; Yu, M.; Ma, X.; Xiao, X.; Wang, C.; Liu, C. A General Harmonic Probability Model based on Load Operating states identification. IEEE Trans. Power Deliv. 2022, 38, 2247–2260. [Google Scholar] [CrossRef]
  15. Funke, B.; Kawka, R. Nonparametric density estimation for multivariate bounded data using two non-negative multipli-cative bias correction methods. Comput. Stat. Data Anal. 2015, 92, 148–162. [Google Scholar] [CrossRef]
  16. Zhang, Y.; Wang, J.; Luo, X. Probabilistic wind power forecasting based on logarithmic transformation and boundary kernel. Energy Convers. Manag. 2015, 96, 440–451. [Google Scholar] [CrossRef]
  17. Chen, W.; Yan, H.; Pei, X.; Wu, B. Probabilistic load flow calculation in distribution system considering the stochastic char-acteristic of wind power and electric vehicle charging load. In Proceedings of the 2016 IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC), Xi’an, China, 25–28 October 2016; pp. 1861–1866. [Google Scholar]
  18. Zhu, Z.; Lu, S.; Peng, S. An Improved Stochastic Response Surface Method Based Probabilistic Load Flow for Studies on Correlated Wind Speeds in the AC/DC Grid. Energies 2018, 11, 3501. [Google Scholar] [CrossRef]
  19. Der Kiureghian, A.; Liu, P.L. Structural Reliability under Incomplete Probability Information. J. Mech. Eng. 1986, 112, 85–104. [Google Scholar] [CrossRef]
  20. Aven, T. On how to define, understand and describe risk. Reliab. Eng. Syst. Saf. 2010, 95, 623–631. [Google Scholar] [CrossRef]
  21. Kiefer, M.; Heimel, M.; Breß, S.; Markl, V. Estimating join selectivities using bandwidth-optimized kernel density models. Proc. VLDB Endow. 2017, 10, 2085–2096. [Google Scholar] [CrossRef]
  22. Helias, M.; Dahmen, D. Statistical Field Theory for Neural Networks; Lecture Notes in Physics; Springer: Cham, Switzerland, 2020; Volume 970. [Google Scholar]
  23. Guo, X.J.; Cai, D.F. Comparison of probabilistic load flow calculation based on cumulant method among different series expansions. Electr. Power Autom. Equip. 2013, 33, 85–90+110. [Google Scholar]
Figure 1. Results of the two estimation methods with the actual pdf.
Figure 1. Results of the two estimation methods with the actual pdf.
Entropy 25 01662 g001
Figure 2. The flow chart of the proposed method.
Figure 2. The flow chart of the proposed method.
Entropy 25 01662 g002
Figure 3. Improved IEEE-33 system.
Figure 3. Improved IEEE-33 system.
Entropy 25 01662 g003
Figure 4. Load ratio at different times.
Figure 4. Load ratio at different times.
Entropy 25 01662 g004
Figure 5. Histograms of the WT and the pdfs calculated by BKDE and KDE.
Figure 5. Histograms of the WT and the pdfs calculated by BKDE and KDE.
Entropy 25 01662 g005
Figure 6. Histograms of the PV1 and the pdfs calculated by BKDE and KDE.
Figure 6. Histograms of the PV1 and the pdfs calculated by BKDE and KDE.
Entropy 25 01662 g006
Figure 7. Histograms of the PV2 and the pdfs calculated by BKDE and KDE.
Figure 7. Histograms of the PV2 and the pdfs calculated by BKDE and KDE.
Entropy 25 01662 g007
Figure 8. The pdfs and CDFs of WT, PV1, and PV2.
Figure 8. The pdfs and CDFs of WT, PV1, and PV2.
Entropy 25 01662 g008
Figure 9. The joint pdf and joint CDF between WT and PV1.
Figure 9. The joint pdf and joint CDF between WT and PV1.
Entropy 25 01662 g009
Figure 10. The joint pdf and joint CDF between WT and PV2.
Figure 10. The joint pdf and joint CDF between WT and PV2.
Entropy 25 01662 g010
Figure 11. The joint pdf and joint CDF between PV1 and PV2.
Figure 11. The joint pdf and joint CDF between PV1 and PV2.
Entropy 25 01662 g011
Figure 12. The voltage pdf of node. (a) node 26. (b) node 33. (c) node 15. (d) node 18.
Figure 12. The voltage pdf of node. (a) node 26. (b) node 33. (c) node 15. (d) node 18.
Entropy 25 01662 g012
Figure 13. Risk level chart for system in case 1.
Figure 13. Risk level chart for system in case 1.
Entropy 25 01662 g013
Figure 14. The pdf and CDF of WT.
Figure 14. The pdf and CDF of WT.
Entropy 25 01662 g014
Figure 15. The voltage pdf of node. (a) node 26. (b) node 18.
Figure 15. The voltage pdf of node. (a) node 26. (b) node 18.
Entropy 25 01662 g015
Figure 16. Risk level chart for system in case 2.
Figure 16. Risk level chart for system in case 2.
Entropy 25 01662 g016
Table 1. The relative errors of BKDE and KDE.
Table 1. The relative errors of BKDE and KDE.
BKDEKDE
RE of Mean (%)RE of Variance (%)RE of Mean (%)RE of Variance (%)
WT5.3510.2015.5527.43
PV10.0702.420.237.96
PV20.0512.980.188.07
Table 2. Correlation coefficients before transformation.
Table 2. Correlation coefficients before transformation.
PearsonKendallSpearman
WT/PV1−0.2913−0.2144−0.2922
WT/PV2−0.2882−0.2126−0.2896
PV1/PV20.99260.95110.9937
Table 3. Correlation coefficients after transformation.
Table 3. Correlation coefficients after transformation.
PearsonKendallSpearman
WT/PV1−0.0873−0.1193−0.0800
WT/PV2−0.0925−0.0625−0.0929
PV1/PV20.12560.07950.1004
Table 4. The relative errors of PLFCM with Rosenblatt inverse transform and PLFCM with Orthogonal inverse transform.
Table 4. The relative errors of PLFCM with Rosenblatt inverse transform and PLFCM with Orthogonal inverse transform.
Node No.PLFCM with Rosenblatt Inverse TransformPLFCM with Orthogonal Inverse Transform
RE of Mean (%)RE of Variance (%)RE of Mean (%)RE of Variance (%)
26.1626 × 10−50.87110.001222.0573
33.3372 × 10−41.12960.007823.3937
40.00160.53520.015930.5238
50.00270.31390.024734.2327
60.00470.28040.040432.7683
70.00430.22300.032934.4186
80.00420.44600.011933.8826
90.00390.52580.011830.8185
100.00390.53580.028837.4144
110.00380.54570.031130.5229
120.00380.55380.035036.3805
130.00400.53330.043736.2802
140.00450.44950.044832.3938
150.00520.42620.040632.8715
160.00580.36880.044737.9928
170.0060.31730.050933.5184
180.00720.30270.053131.7283
191.2526 × 10−41.10320.001218.1156
208.4721 × 10−42.60080.00186.5230
218.8285 × 10−42.49500.00195.9387
228.6273 × 10−42.86940.00184.9922
236.0421 × 10−42.20210.005914.0596
240.00242.98330.00407.3964
250.00392.81850.00255.7725
260.00530.16650.052531.4057
270.00580.39030.074430.1177
280.00651.26710.154822.8691
290.00651.65730.217919.4942
300.00701.68060.269318.1796
310.00801.19130.43107.4600
320.00821.04590.49911.9288
330.00830.95700.598122.9691
Table 5. Computation time of three methods.
Table 5. Computation time of three methods.
MethodMCS of 20,000 TimesPLFCM with Rosenblatt Inverse TransformPLFCM with Orthogonal Inverse Transform
Time (s)305.462.152.06
Table 6. The voltage violation probability and risk indexes for the nodes in case 1.
Table 6. The voltage violation probability and risk indexes for the nodes in case 1.
Node No.Probability (%)IndexesNode No.Probability (%)Indexes
2001900
3002000
4002100
5002200
6002300
7002400
8002500
90.0013.412 × 10−92600
100.05123.342 × 10−72700
110.0876.445 × 10−7280.0724.723 × 10−7
120.1851.705 × 10−62910.8883.293 × 10−4
132.1993.892 × 10−53025.7631.094 × 10−3
144.3079.117 × 10−53139.4452.087 × 10−3
154.2631.236 × 10−43240.4842.195 × 10−3
169.2082.405 × 10−43335.6882.451 × 10−3
1722.1887.548 × 10−4system\0.0104
1827.3721.010 × 10−3
Table 7. The relative errors of PLFCM.
Table 7. The relative errors of PLFCM.
Node No.RE of Mean (%)RE of Variance (%)Node No.RE of Mean (%)RE of Variance (%)
24.7903 × 10−41.5650181.2851 × 10−42.1548
30.00301.7234195.5308 × 10−41.5532
40.00292.8588201.3169 × 10−42.8045
50.00291.9286213.2046 × 10−42.9817
60.00142.3425223.7397 × 10−43.1784
70.00143.1850230.00551.7064
80.00132.6184240.01091.8469
98.6506 × 10−42.5399250.01482.3036
105.2550 × 10−41.4705260.00122.4474
115.0435 × 10−42.4533270.00112.5679
124.6079 × 10−42.3993280.00142.1355
137.9488 × 10−43.2392290.00422.3226
140.00133.2261300.00491.3542
159.9030 × 10−42.2084310.00332.1923
166.5868 × 10−43.1785320.00312.1712
173.5136 × 10−42.1632330.00312.1663
Table 8. Computation time of two methods.
Table 8. Computation time of two methods.
MethodMCS of 20,000 TimesPLFCM
Time (s)133.662.07
Table 9. The voltage violation probability and risk indexes for the nodes in case 2.
Table 9. The voltage violation probability and risk indexes for the nodes in case 2.
Node No.Probability (%)IndexesNode No.Probability (%)Indexes
2001900
3002000
4002100
5002200
6002300
70.00041.945 × 10−92400
80.11.075 × 10−52500
956.6721.819 × 10−32600
1098.6120.0101270.0094.600 × 10−8
1199.33160.01032868.1553.263 × 10−3
1299.8310.01212999.3000.0139
131000.02093099.9160.0190
141000.02413199.9970.0250
151000.0352321000.0263
161000.0281331000.0359
171000.0311system\0.329
181000.0320
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Hu, W.; Yang, F.; Shen, Y.; Yang, Z.; Chen, H.; Lei, Y. Dynamic Risk Assessment of Voltage Violation in Distribution Networks with Distributed Generation. Entropy 2023, 25, 1662. https://doi.org/10.3390/e25121662

AMA Style

Hu W, Yang F, Shen Y, Yang Z, Chen H, Lei Y. Dynamic Risk Assessment of Voltage Violation in Distribution Networks with Distributed Generation. Entropy. 2023; 25(12):1662. https://doi.org/10.3390/e25121662

Chicago/Turabian Style

Hu, Wei, Fan Yang, Yu Shen, Zhichun Yang, Hechong Chen, and Yang Lei. 2023. "Dynamic Risk Assessment of Voltage Violation in Distribution Networks with Distributed Generation" Entropy 25, no. 12: 1662. https://doi.org/10.3390/e25121662

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop