Please use this identifier to cite or link to this item:
|Title:||When the Wind Blows: Vulnerability of Power Networks with High Renewable Penetration|
|School/Discipline:||School of Mathematical Sciences|
|Abstract:||Investigating the vulnerability of power networks gives us insight into the network elements that require reinforcement in order to maintain highly reliable power. The current state of climate has become of increasing concern, and has caused a rapid increase in renewable energy. Unlike conventional generation, renewable energy is highly dependent on the weather, potentially exposing network vulnerabilities to cascading failure and network congestion. A new model of Nesti et al.  investigates emergent cascades that arise from fluctuations in renewable energy. In particular, the authors use the theory of large deviations in order to rank the most-likely initial line failures. On the other hand, there are a number of studies that link frequent congestions to high wind penetration, and use generation re-dispatch in order to estimate wind curtailment. In this thesis, we first extend the initial emergent cascade model, by using the power spectrum to identify significant cycles in solar generation, and find that this decreases the probabilities of line failure. Then, we develop a new long-term congestion management model, which we use to investigate the impact of new wind farm connections on wind curtailment in the South Australian power network. We predict the power output of the new wind farms using a combination of linear regression, ARMA models and quantile regression. We find that the Mid-North has the largest amount of spare network capacity, and that transmission upgrades must coincide with the integration of new wind farms in the South East.|
|Dissertation Note:||Thesis (MPhil) -- University of Adelaide, School of Mathematical Sciences, 2020|
|Provenance:||This electronic version is made publicly available by the University of Adelaide in accordance with its open access policy for student theses. Copyright in this thesis remains with the author. This thesis may incorporate third party material which has been used by the author pursuant to Fair Dealing exceptions. If you are the owner of any included third party copyright material you wish to be removed from this electronic version, please complete the take down form located at: http://www.adelaide.edu.au/legals|
|Appears in Collections:||Research Theses|
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.