A Study of Distributed Generation System Characteristics and Protective Load Control Strategy

Mu Wei, Zhe Chen

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

396 Downloads (Pure)

Abstract

Due to the smaller inertia feature of a Wind Turbine (WT) involved Distributed Generation System (DGS), the WT’s induction generator are more vulnerable to frequency and voltage disturbances. Therefore the study investigates the
DGS characteristics respectively from power plants, i.e. WTs and load. Two kinds of wind turbines: Doubly-fed Induction Generator (DFIG) and Fixed-speed Wind Turbine (FSWT) are compared in this study. A conventional power system protective scheme may not response promptly, which could lead an
undesired disconnection of WTs for the turbine protection purpose. Consequently a fast protective load control strategy to such a DGS is studied. In order to implement such a strategy a communication system associated with a DGS is configured. With this strategy a precise and prompt load shedding operation can be performed to ensure the stability of a DGS and WTs. The
impacts of load characteristics are analyzed and utilized in the fast control strategy. Subsequently a case study is presented to demonstrate the theoretical investigations and analyses.
Original languageEnglish
Title of host publicationProceedings of the 46th IEEE International Universities’ Power Engineering Conference (UPEC2011)
Number of pages6
PublisherIEEE Press
Publication date2011
Pages1-6
ISBN (Print)978-3-8007-3402-3
Publication statusPublished - 2011
Event46th IEEE International Universities’ Power Engineering Conference (UPEC2011) - Soest , Germany
Duration: 5 Sept 20118 Sept 2011

Conference

Conference46th IEEE International Universities’ Power Engineering Conference (UPEC2011)
Country/TerritoryGermany
CitySoest
Period05/09/201108/09/2011

Fingerprint

Dive into the research topics of 'A Study of Distributed Generation System Characteristics and Protective Load Control Strategy'. Together they form a unique fingerprint.

Cite this