Next Article in Journal
A Transient Seepage–Thermal Stability Model for Cohesionless Soil Slopes in the Semi-Arid Continental Climate of the Canadian Prairies
Next Article in Special Issue
Fast and Robust State Estimation for Active Distribution Networks Considering Measurement Data Fusion and Network Topology Changes
Previous Article in Journal
Too Defeated to Work? The Effects of Dispatched Employees’ Upward Social Comparison on Time Theft
Previous Article in Special Issue
Joint Control Strategy of Energy Storage System and Cutting Machine for Transient Stability of Direct Current Locking Rear Delivery Terminal System
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Risk Assessment for Energy Stations Based on Real-Time Equipment Failure Rates and Security Boundaries

The School of Electrical and Information Engineering, Changsha University of Science and Technology, Changsha 410114, China
*
Author to whom correspondence should be addressed.
Sustainability 2023, 15(18), 13741; https://doi.org/10.3390/su151813741
Submission received: 25 July 2023 / Revised: 31 August 2023 / Accepted: 7 September 2023 / Published: 14 September 2023

Abstract

:
In the context of China’s 2020 dual carbon goals of peak CO2 emissions by 2030 and carbon neutrality by 2060, the security of multi-energy systems is increasingly challenged as clean energy continues to be supplied to the system. This paper proposes a risk assessment and enhancement strategy for distributed energy stations (DESs) based on a security boundary. First, based on the coupling relationship between different energy sources and combining the mutual support relationships between different pieces of equipment, a security boundary for DESs was constructed. Second, based on the characteristics of different sources of equipment failure, the real-time failure probabilities of equipment and pipelines were calculated in order to obtain the security risks of DES operation states based on the security boundary. Finally, for equipment and pipelines at high risk, an economic security enhancement strategy is proposed, and the Pareto solution set is solved using a multi-objective algorithm. The analysis shows that the proposed method can effectively quantify the security risks of energy systems in real time, and the proposed enhancement strategy takes into account both economics and system security.

1. Introduction

With the increasing integration of large quantities of new energy and the growing diversification of loads, the power grids and equipment associated with distributed energy stations (DESs) are gradually becoming more complex and diverse [1,2]. At the same time, the coupling between heterogeneous energy sources is deepening, and any failure in the energy network on one side of a DES may be transmitted to other stations in the network through coupling nodes. For example, in August 2019, a gas station failure in the UK led to low-frequency load shedding in the power grid, causing widespread power supply disruptions. Natural disasters and random unexpected failures pose serious challenges to the stable operation of DESs [3,4], significantly affecting users’ experiences of using energy and society’s energy security. Therefore, it is of great importance and technical value to conduct in-depth research into risk assessment and improvement methods for DESs in the context of random disasters and disturbances.
The security risk assessment of individual energy networks has always been a hot topic of research, and there is already a substantial body of research on the security risks of power systems. The stochastic nature of new energy sources and loads in power systems increases the probability of accidents to some extent [5]. In [6], a risk assessment method for wind power transmission systems is presented, taking into account the correlation between wind resources and loads. In [7], the uncertainty of new energy generation and loads in microgrids is considered, and the probability of power shortages is quantitatively evaluated. Probabilistic power flow, which considers interval characteristics, is widely used to characterize the uncertainties associated with new energy sources and loads [8]. Using the probabilistic power flow method, it is possible to monitor power transformer overloads [9], line overloads [9], voltage violations [10], and other operational risks in the power system. Currently, there is limited research on the security risks of individual natural gas and heat networks. In [11], gas pipeline risk is assessed based on the probability of the occurrence of adverse events and system vulnerability coefficients. In [12], a risk assessment of heat exchangers and the entire heat transfer network is performed, considering the overall system risk. The above security risk studies are only applicable to single energy networks and are not suitable for the broader context of multi-energy and coupled energy systems.
Recently, there have been some studies on the security risk assessment of multi-energy coupled systems; however, they have focused mainly on long-term security risks. In [13], the dynamic characteristics of natural gas and thermal systems are used to propose a method for calculating optimal energy flow for multi-energy systems during accidents, aiming to reduce energy losses during such incidents. The correlation and volatility of energy raw material prices also affect the operational risks of multi-energy systems. In [14], a risk assessment model for energy price uncertainty is developed, and the impact of extreme price uncertainty is quantified using conditional value-at-risk. In [15], a novel risk index that considers the benefits of each operator is introduced to comprehensively describe the security risks of multi-energy coupled systems and the interests of each operator. The semi-invariant method [16] is widely used in risk assessment. In [17], risk parameters such as pressure, frequency, and power are selected in order to calculate the probability distribution of state variables using the semi-invariant method, thereby obtaining a quantitative risk value for the system. Some researchers use interval theory to analyze the security of regional energy systems utilizing renewable energy [18]. In [19], robust security regions are constructed using convex hulls applicable to multi-energy coupled systems to evaluate the operational security of the system. In [20], a real-time scheduling model considering conditional value-at-risk is developed to analyze cost-at-risk for overestimated and underestimated cost scenarios. However, current studies focus mainly on the operational risks arising from random fluctuations of new energy sources and loads, and there is limited research on the risk analysis of distributed energy resources under real-time failure probabilities.
In order to address these problems, this paper carried out a study of the risk assessment and response strategies of DESs, considering system security boundaries and equipment failure rates. Firstly, we analyzed the mutual backup relationship of different pieces of equipment and pipelines and constructed a security boundary model by incorporating the multi-energy flow balance equation; secondly, we propose a method for quantifying the real-time failure probability of equipment and pipelines by integrating the effects of equipment health status, weather conditions, and other risk sources. Finally, we propose an optimal response strategy for energy storage, considering both security and economics for high-risk equipment or pipelines. The analysis showed that the proposed security risk assessment method can effectively quantify the real-time operational risks of energy stations, and the proposed strategy can optimize the energy storage allocation for high-risk nodes, which has particular significance for practical engineering applications.

2. DESs and Security Risk

2.1. DESs

DESs are located on the user side of energy networks and have inherent locational advantages, allowing for the localized consumption of renewable energy [21]. They integrate traditional energy networks with diversified energy demands and supplies, enabling the coupling and coordination of various energy flows in order to achieve efficient utilization of energy and the integration of renewable energy. An interconnected regional DES is illustrated in Figure 1. The DES is built upon the existing power grid and natural gas network and expands the regional heating network based on user demand. To enhance the security and reliability of energy supply, the two regional distribution networks are interconnected through tie lines for power transmission, while the regional gas and heating networks are interconnected through multiple sources to ensure mutual energy supply between regions.

2.2. Security Risk Assessment

The security of a DES refers to its ability to provide uninterrupted and reliable energy to users even in the event of random failures, such as sudden short circuits or unplanned component failures. This is one of the important considerations for ensuring the security and stable operation of the energy station. Compared to the main grid, DESs have a lesser ability to withstand failures. Therefore, a real-time understanding of the security risks of energy stations becomes particularly critical. In the engineering field [22], the classic definition of risk R is given by
R = { S i , P i , x i } ,
where Si represents the scenario where the failure occurred, Pi is the probability of the scene occurring, and xi represents the degree of harm in this scenario. The failure scenario of the energy station can be determined through the predicted accident set; the probability of scenario occurrence is determined by the probability of equipment failure; and the degree of harm in the scenario is determined by the relationship between the real-time operating status of the energy station and the security boundary. The real-time operation status of the energy station alone cannot directly determine the operation status of the energy station after equipment failure. Therefore, the safety boundary is introduced to determine the operation status of the energy station after equipment failure more quickly and intuitively. The safety boundary refers to the maximum energy supply boundary of the energy system in the event of a N-1 failure of equipment or pipeline [23]. Its model can be expressed as
M = { L | f ( L ) = 0 , g ( L ) 0 }
where L is the energy station operating state observation; f ( L ) = 0 denotes the energy station N-1 faulty operation equation constraint; and g ( L ) 0 denotes the energy station N-1 inequality constraint. Therefore, this study analyzed the real-time security risk of energy stations from the perspective of security boundaries and equipment failure probability.

3. Security Boundary Analysis Based on Mutual Backup Relationships

By constructing a set of foreseen accidents to determine the failure scenarios, it is possible to explore the mutual backup support relationships between the different pieces of equipment or pipelines under the failure scenarios and calculate the safety boundaries for each piece of equipment in order to quantify the degree of harm from the different failure scenarios.

3.1. Hypothetical Accident Set

The output power of the transmission outlet pipeline is representative of the overall operation of the energy station. It is subject to the capacity limitations of the connected equipment and pipelines and possesses the capability of flow optimization control [24]. Therefore, the transmission pipelines are selected as the object for operational status monitoring, with the front end connected to the key equipment and the back end facing the customer side. The energy station operating state vector L = [L1, L2, …, Lm] is defined to represent the operating state of m key pipelines.
The selected types of random accidents in this study included two main categories: (1) key equipment failures, such as those of transformers, circulating pumps, and combined heat and power (CHP) units; and (2) key pipeline failures, such as those of power buses. By constructing a hypothetical accident set, the weak links in the operational state of the energy station can be identified, thus optimizing its operational state. The hypothetical accident set considers both causal factors, such as capacity configuration between different pieces of equipment, and backup relationships between different components. The symbols in the text are explained in Appendix A.

3.2. Constraint on Multi-Energy Flow Balance

When random failures occur, maintaining the stable operation of an energy station requires fulfilling the energy balance relationships of multiple systems, including the power, thermal, and natural gas systems.

3.2.1. Power System Energy Balance Equation

In the steady-state model of the power system [25], the effects of three-phase imbalance are neglected, and the power flow calculation model is given by
P i = U i j i U j ( G i j cos θ i j + B i j sin θ i j ) ,
Q i = U i j i U j ( G i j sin θ i j B i j cos θ i j ) ,
where Pi and Qi represent the active power and reactive power of the ith node, respectively, Gij and Bij represent the conductance and susceptance between nodes i and j, respectively, and θij represents the phase angle difference between nodes i and j.
CHP units enable combined heat and power production and are important for electrical and thermal coupling. The model is described as
C CHP = P CHP , h P CHP , e ,
where CCHP represents the thermal-to-electric ratio of the CHP unit, which typically ranges from 1.5 to 10, and PCHP,h and PCHP,e represent the thermal and electric power outputs.

3.2.2. Gas System Energy Balance Equation

The model for calculating the natural gas flow [26] containing the compressor is given by
f i j = sgn k i j sgn ( p i 2 p j 2 ) ,
where fij represents the flow from node i to node j, sgn is the sign function, which takes the value 1 when the pressure at node i is greater than that at node j, and −1 otherwise, and kij is the pipe coefficient.
The natural gas transmission process involves pressure loss, which requires the use of compressors for pressurization. The electric compressor model can be described as
P = 0.7457 Q a C 10 3 ( K a 1 a 1 ) ,
where K represents the compression ratio, C is the coefficient related to temperature and efficiency, a is a variable coefficient, and Qa is the compressor flow rate.

3.2.3. Thermal System Energy Balance Equation

The thermal system transfers energy through a medium without, in theory, consuming the medium itself. By applying the principle that the sum of the heads is zero, we can derive the flow model [27] for the thermal system as follows:
B h f = B K g m | m | = 0 ,
where B represents the correlation matrix of the network, m is the branch flow vector, and Kg represents the pipe coefficient, which is given by:
K g = 8 L f D 5 ρ 2 π g ,
where L represents the pipe length, f represents the pipe friction, D represents the pipe diameter, ρ represents the density of the medium, and g is taken as 9.8. The relationship between node power and flow can be expressed as
P = C w m ( T o T i ) ,
where Cw represents the specific heat capacity of the medium, m represents the flow rate in the pipe, and To and Ti represent the outlet and return water temperatures, respectively. To can be expressed as
T o = T a + ( T i T a ) exp ( λ L C w m ) ,
where Ta represents the ambient temperature and λ represents the heat transfer coefficient.
The thermal system requires a circulating pump to maintain system operation, and its required power is given by
P s = m ( p out p in ) 10 6 η ρ ,
where η represents the efficiency of the circulation pump, pout and pin are the outlet and inlet pressures of the medium, respectively, and ρ is the density of the medium.
The energy sources in the thermal system include gas boilers and CHP units. Since the CHP unit has already been modeled in the power system, this section focuses only on the gas boiler. The equation for modeling the gas boiler is given by
P GB = β H m ,
where PGB represents the power output of the gas boiler, β is the boiler efficiency, H is the average heating value of natural gas, and m is the natural gas consumption flow rate of the gas boiler.
By decoupling the multi-energy coupled equipment and separating the different energy subsystems, the power flow calculation is performed using the power flow method. Current power flow calculation methods are mature and will not be described here [16].

3.3. Boundary Analysis Based on Mutual Standby Relationships

In energy stations, standby relationships are common. When a failure occurs, two pieces of equipment (pipelines) or multiple pieces of equipment (pipelines) having a standby relationship with each other can support the load and replace the failed equipment (pipelines). At the same time, in order to improve the security of the energy station, a backup relationship can be formed between two pieces of equipment (pipelines) or multiple pieces of equipment (pipelines) through a contact pipeline. In this paper, the key pipeline output power is selected as the research object for analyzing two types of standby situations for equipment and pipelines.
The first category of cases is the mutual backup relationship for critical equipment. The key equipment is connected to the transmission outlet pipeline, and its boundary model is given by
C i + L i sub L i S m + P + W ,
where L i is the sum of the power outputs of the transmission outlet pipeline connected to the mutual standby related equipment, C i is the sum of the power required for the normal operation of the coupled equipment (including circulating pumps, compressors, etc.), L i sub is the sum of the power outputs of the lower pipeline of the transmission outlet pipeline, P and W are the power outputs of photovoltaic power generation and wind power generation, respectively, connected to the transmission outlet pipeline, S m is the sum of the standby outputs of other equipment under conditions of failure of the equipment, and Sm represents the corresponding pipeline constraints and equipment capacity constraints, the formula for which is given by
S m = min [ C m EQ L m , C m TL L m ] ,
where C m EQ , C m TL represent the capacity of the mth backup equipment and the backup equipment connected to the pipeline capacity, respectively, and Lm represents the mth standby equipment connected to the line with the load power.
The second type of situation is the mutual backup relationship between key pipelines. Due to the complexity of the pipeline network frame, there are generally multiple standby ways. The pipeline La boundary model is given by
C i + L i sub L a S i + max ( S i com ) + P + W ,
where Sicom is the output power of the ith mutually incompatible backup mode. Among these backup relationships, the maximum output backup mode needs to be taken. ΣSi is the sum of the outputs of the backup modes without competing relationships. Sicom and Si both contain pipeline capacity and equipment capacity constraints, and the equations are given by
{ S i = min [ C i EQ L i , C i TL L i ] S i com = min [ C i EQ , com L i com , C m TL , com L i com ] ,
where C i EQ , C i TL represent the ith mutually incompatible backup mode equipment capacity and the pipeline capacity, respectively, C i EQ , com , C i TL , com represent the noncompetitive relationship backup mode equipment capacity and the pipeline capacity, respectively; and Li, Licom represent the ith mutually incompatible and noncompetitive relationship backup mode pipeline, respectively, with the load power. Taking Figure 2 as an example, the following analysis is for the relevant backup relationship and boundary situation of the energy station.

3.3.1. Probability of Renewable Energy Contribution

The security boundary of an energy station varies with the output of renewable energy. Probabilistic modeling of renewable energy output can explore the law of energy station security boundary change with renewable energy output.
The two-parameter-based Weibull model is widely used for stochastic probabilistic modeling of wind turbines [28]. The wind power probability distribution Pwout is given by
f ( V h ) = ( k w c w ) ( V h c w ) ( k w 1 ) exp [ ( V h c w ) k w ] ;
P wout = { 0 , 0 V h V in , V out V h P wmax V h V in V r - V in , V in V h V r P wmax , V r V h V out ,
where kw is the shape factor, cw is the scale factor, Vr, Vh, Vout, and Vin are the rated wind speed, actual wind speed, cut-out wind speed, and cut-in wind speed, respectively, and Pwmax is the maximum output power of the fan.
For the probability distribution of a photovoltaic (PV) power output, a model based on the beta probability distribution can give better results [29]. The power output model of the PV generator set can be expressed as
f ( S h ) = Γ ( α p + β p ) Γ ( α p ) Γ ( β p ) ( S h S r ) α p 1 ( 1 S h S r ) β p 1 ,
P pv , out = { P pv , max S h S r , S h S r P pv , max , S h > S r ,
where ap, βp are shape and scale factors, respectively, Sh, Sr are the actual and rated light intensities, respectively, and Ppv,max is the maximum PV power.

3.3.2. Power System Boundary Analysis

The power critical equipment includes CHP units, transformers {T1, T2, T3, T4}, and critical pipelines L = {L|L1, L2, L3, L4, L7, L10}. Since there are obvious differences between equipment failures and pipeline failures, the two are analyzed separately below.
When a failure occurs in transformer T1 or T2, the load carried by the failed transformer can be transferred to another transformer by means of a contact switch between them. Although PV power generation plays a certain role in supplementing the energy of the failed load, it also leads to the problem of probabilistic T1 and T2 boundaries, where the {T1, T2} boundary model is given by
{ L 10 < L 1 L 1 + L 2 < min ( C T 1 , C T 2 ) + P pv , out .
Similarly, wind power generation also probabilizes the T3 and T4 boundaries. The {T3, T4} boundary model can be expressed as
P C i < L 3 + L 4 < min ( C T 3 , C T 4 ) + P wout .
When the CHP unit fails, its load will be supplied by the L10 feeder via the contact line, and the CHP power boundary model is given by
( P CP 1 + P CP 2 ) < L 10 < ( C L 10 L 7 ) .
When the pipeline fails, energy can be supplied to the failed load through other backup pipelines or contact pipelines. When L2 fails, DES 2 supplies energy to the failed load at another station, and the L2 boundary model is given by
0 < L 2 < min [ ( C T 3 + C T 4 + P wout L 3 L 4 ) , ( C L 4 L 4 ) ]   .
When L4 fails, DES 1 supplies energy to L4, and the L4 boundary model is given by
{ L 2 + L 4 > ( P C 1 + P C 2 + P C 3 + P C 4 ) , L 4 < min [ ( C T 1 + C T 2 + P pv , out L 1 L 2 ) ,   ( C L 2 L 2 ) ] .
For the associated pipeline {L7, L10}, when L10 fails, energy is supplied by the CHP unit to the failed line L10. The boundary model for L10 is given by
0 < L 10 < min ( C e CHP L 7 , C L 7 L 7 , L 6 / C CHP , min ) ,
where CeCHP is the maximum electrical capacity of the CHP unit. When L7 fails, energy is supplied from L10 to the failed line L7 via the contact pipelines. The boundary model for L7 is given by
{ L 7 > P CP 1 + P CP 2 , L 7 < min { min [ ( C T 1 + C T 2 + P pv , out L 1 L 2 ) , ( C L 1 L 1 ) ] + min [ ( C T 3 + C T 4 + P wout L 3 L 4 ) , ( C L 3 L 3 ) ] , ( C L 10 L 10 ) } ,  
For the associated pipeline {L3, L10, L1}, when L3 fails, the transformer set and CHP unit of DES 1 supply energy to L3 through the contact pipeline, and the L3 boundary model is given by
{ L 3 > 0 , L 3 < min [ ( C T 1 + C T 2 + P pv , out L 1 L 2 ) , ( C L 1 L 1 ) ] + min [ ( C e CHP L 7 ) , L 6 / C CHP , min , ( C L 7 L 7 ) , ( C L 10 L 10 ) ] .
When L1 fails, DES 2 and the CHP unit supply energy to L1 through the contact line, and then the L1 boundary model is given by
{ L 1 > 0 , L 1 < min [ ( C T 3 + C T 4 + P wout L 3 L 4 ) , ( C L 3 L 3 ) ] + min [ ( C e CHP L 7 ) , ( C L 7 L 7 ) , L 6 / C CHP , min , ( C L 10 L 10 ) ] .

3.3.3. Thermal System Boundary Analysis

The key pieces of equipment in the thermal system are the circulation pumps {CP1, CP2}, the gas boiler (GB), the CHP units, and the key pipelines {L5, L6}. When the GB, CP1, or pipeline L5 fails, the load it carries will be provided by the CHP unit, and then the L5 GB boundary model is given by
0 < L 5 < min [ ( C h CHP L 6 ) , ( C CP 2 L 6 ) , ( C L 6 L 6 ) , ( C CHP , max L 7 L 6 ) ] ,
where ChCHP is the heat capacity of the CHP unit. When the CHP unit, CP2, or L6 fails, the load carried by the failed equipment or pipeline will be provided by the GB and CP1, and then the L6 CHP thermal boundary model is given by
0 < L 6 < min [ ( C GB L 5 ) , ( C CP 1 L 5 ) , ( C L 5 L 5 ) ] ,
where CGB is the capacity of the GB.

3.3.4. Natural Gas System Boundary Analysis

The key pieces of equipment in the natural gas system are the compressors {C1, C2, C3, C4} and the key pipelines {L8, L9}. When C1 or L8 fails, the load carried by L8 will be provided by C2 via L9 and the contact line, and then the C1, L8 boundary model is given by
0 < L 8 < min [ ( C C 2 L 9 ) , ( C L 9 L 9 ) ] .
When C2 or L9 fails, the load carried by L9 will be supplied by C1 via L8 and the contact line, and the boundary model for C2 and L9 is given by
0 < L 9 < min [ ( C C 1 L 8 ) , ( C L 8 L 8 ) ] .

3.3.5. Boundary Solving

According to the multi-energy flow balance constraint and the boundary constraint, the maximum output model of the energy station can be expressed as
max L i s . t . {   h ( L ) = 0   g ¯ g ( L ) g _ .
where:   h ( L ) = 0 contains the set of Equations (3)–(13); g ¯ g ( L ) g _ contains the set of Equation (22) through Equation (34). The large-scale nonlinear programming problem described by Equation (35) can be better solved using the interior point method. Transforming the problem into the general form of the interior point method, the equations can be solved using Lagrangian functions [22], which are not described here. By fixing some of the load-free variables, a set of boundary point solutions can be found, and the energy station boundary can be obtained by fitting the set of boundary point solutions.

4. Methodology for Assessment of DES Security Risks

4.1. Risk Source-Based Failure Analysis

There are three types of risk sources that lead to the failure of energy station equipment or pipelines: (1) equipment health status: equipment aging, defects, age, etc.; (2) external weather conditions: severe weather, etc.; and (3) other factors: electromagnetic environment, thermal environment, etc. According to the relevant literature and historical data [30], equipment health status and weather conditions are the main factors causing equipment failure. The effects of other risk sources vary from scenario to scenario and need to be evaluated by building corresponding models.

4.1.1. Failure Analysis Based on Equipment Health Status

Equipment failure frequency and equipment health status are closely related. China’s State Grid Corporation issued the document Q/GDW 645-2011 Distribution Network Equipment Condition Evaluation Guidelines in 2011, which provides a theoretical reference for the health status of distribution network equipment. Heat network equipment and gas network equipment can be evaluated in terms of equipment condition based on information obtained from online inspection, operational inspection, degree of equipment aging, equipment service life, and operational status. Based on an idea reported in the literature [31], the relationship between equipment failure frequency fi,eq and equipment health state Si is given by
f i , eq = a i · e b i S i + c i ,
where i is the number of the piece of equipment, ai is a proportionality factor, bi is a curvature factor, and ci is a constant. The above three coefficients can be derived from the determination of the maximum failure rate fmax, minimum failure rate fmin, and average failure rate fav of the equipment, and the equations relating them are given by
{ f max = a i × e b i S i + c i , S i = S min f av = a i × e b i S i + c i , S i = S av f min = a i × e b i S i + c i , S i = S max ,
where Smin, Sav, and Smax denote the worst, average, and best state ratings of the equipment, respectively.

4.1.2. Failure Analysis Based on Weather Factors

Outdoor equipment can be affected by severe weather, which can significantly increase the frequency of equipment failures [32]. Therefore, weather conditions must be taken into account when performing failure analysis on outdoor equipment and pipelines. Commonly used weather models are two-state and multi-state models. A two-state model is used in this paper. If the severity of the weather needs to be accurately described, the multi-state model can be used, where the weather state quantity w is used to describe the severity of the weather. The failure frequency model based on weather factors fj,w is given by
f j , w = { f j , av N j + U j N j ( 1 K j ) , w = 0 f j , av N j + U j U j K j , w = 1 ,
where fj,av is the average failure frequency of the jth piece of equipment, Nj, Uj are the durations of normal and bad weather conditions during the statistical measurement period of the equipment, Kj is the proportion of equipment failure during bad weather: In normal weather, w is taken as 0; in bad weather, w is taken as 1.

4.1.3. Failure Analysis of Other Risk Sources

Other factors, such as the electromagnetic environment and the thermal environment, can also affect the failure frequency of equipment. With the help of weather factor-based failure analysis, the failure model fj,e for other risk sources is given by
f j , e = { n j , i N j , i K j , i , e = i , n j , m N j , m K j , m , e = m ,
where i is the ith state under this factor, using a multi-state model with a total of m states, nj,i is the number of failures of the jth piece of equipment, Nj,i is the time duration of the ith state, and the Kj table is the proportion of failed equipment during bad weather.

4.1.4. Equipment Failure Probability Model

Equipment failure is a random, discrete event whose occurrence is affected by the state of equipment health, weather conditions, and other sources of risk. Equipment failures occur randomly, with a fixed average frequency over time ∆t, and, therefore, the failure probability distribution can be considered a first-order Poisson distribution with respect to time [30]. The probabilities of failure based on equipment state Feq, weather factors Fw, and other risk sources Fe are given by
{ F eq = 1 e f eq Δ t F w = 1 e f w Δ t F e = 1 e f e Δ t ,
where ∆t is the measurement period, feq is the frequency of failure based on equipment status, fw is the frequency of failure based on weather conditions, and fe is the frequency of failure from other risk sources. Although failure events are affected by multiple independent factors, they can occur only once at a certain time. Then, the probability of failure of each factor can be integrated in order to establish the probability model F of equipment failure within the time period ∆t:
F = { F eq , w = 0 ,   e = 0 F eq + F e F eq · F e , w = 0 ,   e = 1 F eq + F w F w · F eq , w = 1 ,   e = 0 1 ( 1 F eq ) ( 1 F w ) ( 1 F e ) , w = 1 ,   e = 1 ,
where w and e denote weather state variables and other factor state variables, respectively.

4.2. Risk Assessment Methodology

The risk assessment needs to take into account both the probability of equipment failure and the operating state of the energy station in the event of a failure. Based on the relationship between the operating point and the security boundary shown in Figure 3, the operating state under failure can be derived.
As can be seen in Figure 3, if the operating state is within the boundary, the system will maintain its original operating state even if a random failure occurs. If the working state is outside the boundary, the system will lose load following the failure. It follows that the security risk index can be defined as:
R = j = 1 N [ r j · F j ( Δ t ) ] ,
r j = { 0 , C j O min ( C j C 0 ) , C j O ,
where Fj(∆t) denotes the probability that the jth piece of equipment fails during time period ∆t, rj denotes the degree of deactivation following failure of this equipment, O denotes a point within the boundary, C0 denotes the state point on the boundary, and Cj denotes the real-time state point.

5. Security Optimization Response Strategy

The method of quantitative security risk assessment identifies weaknesses in the security risks of energy stations. If certain load nodes are at high risk for a long period of time, measures such as adding distributed power sources, lines, and energy storage equipment can be taken to improve security. However, measures such as adding distributed power sources and lines have a single function, while energy storage equipment can smooth out the volatility of renewable energy generation, improve the ability of energy stations to withstand failures, and reduce security risks, making it an ideal security optimization measure.

5.1. Impact of Energy Storage Access on the Boundary

In the case of system failure, energy storage equipment can quickly replenish the energy supply. In addition, the boundary model for the energy station can be adjusted with the output power of the energy storage equipment, for which the adjusted boundary model is given by
C i + L i sub L i S m + P + W + E S ,
C i + L i sub L a S i + max ( S i com ) + P + W + E S ,
where ES is the power of the energy storage equipment; the adjusted boundary is shown in Figure 4.
In Figure 4, the energy station operating state point is outside the boundary without adding energy storage or renewable energy access. When sufficient energy storage equipment and renewable energy generation are added, the energy station’s operating state point will be inside the boundary, thus improving the station’s ability to withstand random failures effectively.

5.2. Energy Storage Configuration Strategy

Although access to energy storage equipment can improve the resilience of energy stations to failure, the operating, maintenance, and installation costs are also relatively high. Therefore, it is also necessary to consider economic factors when configuring energy storage equipment. Taking the power and capacity of energy storage as optimizable variables, a multi-objective planning model based on security and economics was constructed, which is given by
J = min ( F 1 , F 2 ) ,
where F1 indicates the economic function and F2 indicates the security function. The equation for the economic function F1 is given by
F 1 = ρ ( 1 + ρ ) r ( 1 + ρ ) r 1 ( c int   E E int   ES + c int P S int ES ) ,
where ρ is the discount rate, r is the service life, c int E is the cost per unit capacity, E int ES is the capacity of the energy storage equipment, c int P is the cost per unit power, and S int ES is the power output of the energy storage equipment. The security function F2 equation is given by
F 2 = R 0 R 0 = j = 1 N [ r 0 , j ( S ) · F j ( Δ t ) ] j = 1 N [ r 0 , j · F j ( Δ t ) ] ,
where R 0 is the value of the security risk index following energy storage configuration, and R0 is the value of the security risk index before energy storage configuration.
Constraints are added to the constraints of the boundary model but also include additional energy storage constraints:
E ES ,   int   min E int   ES E ES ,   int   max ,
0 < S < C max TL
R 0 = j = 1 N [ r 0 , j ( S ) · F j ( Δ t ) ] < R max ,
where E ES ,   int   min , E ES ,   int   max are the lower and upper limits of the capacity of the energy storage equipment, respectively; C max TL is the maximum capacity of the pipeline connected to the energy storage equipment and Rmax is the maximum risk acceptable for the energy supply of the energy station.
A security- and economics-based energy storage configuration model was constructed, and an improved multi-objective particle swarm algorithm was applied to solve the Pareto solution set; the algorithm flow and improvements are given in Appendix B [33]. The process of quantitative assessment of security risks and response strategies for DESs is shown in Figure 5.

6. Example Analysis

In this paper, we refer to the calculated example to be found in [24] of energy station setting for combined heat and gas supply and modify some of the parameters, as shown in Appendix C Table A2; the topology diagram refers to the referenced study [24].
In actual operation, the equipment has a certain overload capacity. To simplify the operation, the overload capacity factor in this calculation was set to 1, which could be adjusted according to the actual application. The simulation experiment was run on a PC with an AMD Ryzen 7 5700G CPU @ 3.8 GHz with Radeon Graphics and 16 GB of RAM.

6.1. Risk Assessment of Critical Equipment for Energy Stations

Data for the average failure frequency of equipment and pipelines (line failures include switching element failures) in energy stations [30] are listed in Table 1.
Some outdoor equipment in energy stations, such as transformers and overhead lines, are affected by weather, and the failure frequency analysis based on the two-state weather model is given in Table 2.
Based on the failure frequency of equipment, the maximum failure frequency fmax was set to 6f0, and the minimum failure frequency fmin was set to f0/4, according to the actual situation; f0 indicates the average failure frequency. The best, average, and worst state scores for the equipment were 95, 80, and 60, respectively, from which the relationship between each equipment failure frequency and equipment state index was obtained.
Transmission   pipelines :   f eq = 88.09 e 0.08881 S 0.001342 ,
Gas   pipeline :   f eq = 333.5 e 0.1091 S + 0.03095 ,
Heating   pipeline :   f eq = 95.54 e 0.08881 S + 0.001455 ,
Transformer :   f eq = 18.61 e 0.08881 S + 0.002835 ,
CHP :   f eq = 80.65 e 0.07561 S + 0.0012292 ,
GB :   f eq = 93.05 e 0.08881 S + 0.001418 ,
Compressor :   f eq = 62.04 e 0.08881 S + 0.0009451 .
In this energy station, due to the low level of other risks for equipment failure, a failure probability model based on weather conditions and equipment health status was constructed in order to simplify the operation. According to Equation (40), the probability of failure model for each piece of equipment in time ∆t was determined to be
Transformer :   F = { 1 e 0.015 Δ t w = 0 1 e 0.324 Δ t w = 1 ,
CHP :   F = 1 e 0.065 Δ t ,
GB :   F = 1 e 0.075 Δ t ,
Compressor :   F = 1 e 0.05 Δ t .
According to the boundary model described in Section 3.2 and Section 3.3, using the interior point method for calculation, we can obtain each key equipment boundary; part of the power equipment boundary is shown in Figure 6.
The boundary fitting process is illustrated in Figure 6a, and the following boundary fitting process will be omitted. When transformer {T1, T2} fails, the L1 transmitted power is affected by L10 because L10 is the lower pipeline of L1, which leads to the situation that the boundary of {T1, T2} is not fixed. and the boundaries are different due to the different capacities of transformers T1 and T2. When the CHP unit fails, the L10 transmission power is also constrained by L1, and the boundary situation is shown in Figure 6b. The boundary situation of the heat and gas network is shown in Figure 7. Since the power of the circulating pump is matched to the upper unit, only the CHP and GB unit boundaries need to be discussed.
The energy supply vector L(L1, L2, L3, L4, L5, L6, L7, L8, L9, and L10) of the energy station represents the energy station’s operating status. Taking Scenario 1 as an example, the energy station operates for 6 h with state L0(4.033, 3.055, 2.356, 3.922, 1.91, 2.35, 2.733, 2.31, 2.22, 1.944), and the results of the equipment risk assessment are listed in Table 3.
According to Table 3, it can be seen that transformer T1 cuts more load when a failure occurs and has a higher probability of failure compared to other equipment, resulting in higher values of the security risk indicators. In the case of bad weather, the failure rate of transformers rises, and the security risk index increases, although the security and reliability of the energy station are not adversely affected. Although the L1 pipeline is configured with PV, which can play a role in supporting the load, the PV output is limited in bad weather.

6.2. Transmission Pipeline Risk Assessment

The longer the transmission line, the higher the probability of failure. The probability of failure model can be calculated by combining the equipment status of each transmission line with its line length, as shown in Appendix C Table A3. Based on the boundary analysis described in Section 3.2 and Section 3.3, the boundary model for key transmission lines is obtained. The boundary models for power output lines L2 and L4 are shown in Figure 8.
Pipeline L5 is the heat pipeline connected to the CHP unit, and its boundary is constrained by the output force of heat pipeline L6 and power pipeline L7, whose boundary models are shown in Figure 9.
Taking Scenario 1 as an example, the energy station operates in the L0 state, and the risk assessment results for the transmission pipeline are listed in Table 4. The L4 pipeline is longer, has a higher probability of failure, carries more load, and has a higher level of load shedding in case of failure. To improve the security of the L4 pipeline, targeted countermeasures would need to be taken.

6.3. Renewable Energy Access

Renewable energy output is volatile and random, which leads to uncertainty in the boundaries of key pieces of equipment and key pipelines. The calculated examples for PV generation access L1, wind power access L4, and new energy access on the equipment boundary impact are shown in Figure 10.
Although grid-connected renewable energy can increase the supply capacity of the system, the increase is still constrained by the access points’ transmission lines and equipment. As shown in Figure 10, PV output continues to increase; however, the T1 boundary is constrained by the transmission of the L1 pipeline and does not show a continuous increase in some intervals. The wind power output is constrained by the transmission constraints of the L4 pipeline. The pipeline boundary is also affected by the changed renewable energy sources, as Figure 11 shows the pipeline L4 and L2 boundaries under new energy access. The increase in the security boundary following access differs for PV and wind access locations depending on the grid structure subject to the access point.
From Figure 10 and Figure 11, it can be seen that, although the randomness of renewable energy and the change in standby constraints make the pipeline security boundary uncertain, the range of security boundary changes is determined. At the same time, renewable energy not only raises the upper bound of the output of the corresponding pipeline or equipment but also raises the upper bound of the output of the standby pipeline or equipment.

6.4. Security Optimization Response Strategy

With L0 as the long-term operating state, the analysis in Section 6.1 and Section 6.2 shows that L4 has a higher risk value relative to other equipment and pipelines. A multi-objective model for optimal configuration of energy storage was constructed for the pipeline L4 security risk, and the model was solved using an improved particle swarm algorithm to obtain the Pareto front, as shown in Figure 12. Let the energy storage use life be 15 years, the annual cost coefficient be 8%, the unit power cost be 1650 CNY/kW, and the unit capacity cost be 1270 CNY/kWh [34].
As shown in Figure 12, three energy storage configuration options were selected. Configuration I was the most economical choice, with guaranteed security; Configuration II was the relatively economical choice, with high security; and Configuration III was the most secure but least economical choice. Details of the three configuration options are listed in Table 5.

6.5. Contrast Analysis

The security risk assessment method proposed in this paper is an online assessment method based on offline calculated results, and the calculation time limit was greatly reduced compared with the traditional online simulation method. Taking the energy station pipeline as an example, the results for traditional methods of failure probability calculation under different scenarios (parameters given in Appendix C Table A4) were compared with those for the method proposed in this paper, as listed in Table 6. Method I is the traditional method, and Method II is the proposed method.
In Scenario I, the weather conditions were good and the pipeline equipment status was average; the failure probability obtained was consistent with that of the traditional method. In Scenario II, the weather conditions were bad and the pipeline equipment status was average; the failure rate of the power pipeline affected by the weather was significantly higher, while the failure probability of the traditional method remained the same because the weather factor was not considered. In Scenario III, the weather conditions were good and the state of the pipeline equipment varied; the probability of pipeline failure with a better equipment state decreased, and the probability of pipeline failure with a poorer equipment state increased. The traditional method did not consider the effect of equipment status, and the failure probability remained unchanged. In summary, the proposed model for predicting real-time failure probability takes into account the effects of equipment status, weather conditions, and other risk sources, and the real-time failure probability is more suitable for use with the actual operating conditions of equipment and pipelines.

7. Conclusions

To enhance the operational safety and real-time assessment of distributed energy stations, this paper proposes a DES risk assessment and response strategy that considers system safety boundaries and equipment failure rates. By constructing the operational safety boundaries of energy stations and real-time equipment failure probabilities based on multiple risk sources, real-time quantitative risk assessment of DES can be achieved, along with the enhancement of safety for high-risk nodes. Through this study, the following conclusions can be drawn:
(1)
As the coupling between different energy sources deepens, the transferability of faults among different energy sources poses challenges to the operational safety of distributed energy stations. Research on N-1 fault risk assessment methods and response strategies by the operators of DES, who are the actual decision-makers and beneficiaries, can enhance operational reliability and stability.
(2)
The proposed method effectively improves the efficiency of safety risk assessment calculations. By analyzing the mutual backup relationships between different devices and pipelines and constructing the DES safety boundary model, real-time online data assessment of operational status based on offline data are achieved. Compared to traditional online simulation methods, this method enhances computational efficiency.
(3)
Variations in renewable energy output lead to changes in relevant equipment safety boundaries. Due to the stochastic nature of renewable energy output, the safety boundaries of related equipment relying on renewable energy as backup power become uncertain. However, this uncertainty is also constrained by the network structure at connection points.
(4)
The real-time calculation method for equipment failure probabilities proposed in this paper better matches actual equipment conditions. By considering the multi-risk characteristics of equipment health status, weather conditions, and other fault sources, a multi-risk source-based equipment failure probability model is constructed, making it more aligned with actual equipment conditions. Algorithm analysis demonstrates that the proposed method accurately quantifies the operational risks of energy stations.
(5)
For high-risk nodes, an energy storage optimization response strategy considering both economic and safety aspects is proposed, effectively reducing energy storage configuration costs and enhancing the operational safety and reliability of energy stations. This provides a reference for the planning and operation of energy stations.
(6)
In the future, more in-depth consideration will be given to safety risk response strategies and their application in practical engineering to validate their correctness.

Author Contributions

Conceptualization, Y.L. and F.J.; methodology, Y.L.; software, Z.L.; validation, Y.L. and S.L.; formal analysis, Y.L.; investigation, Z.L.; resources, S.L.; data curation, S.L.; writing—original draft preparation, Y.L.; writing—review and editing, F.J.; visualization, S.L.; supervision, Z.L.; project administration, Z.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Hunan Provincial Department of Education, grant number 20B029.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data available in a publicly accessible repository.

Conflicts of Interest

The authors declare no conflict of interest. The funders had no role in the design of this study; in the collection, analysis, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.

Appendix A

Table A1. Description of variables in the text.
Table A1. Description of variables in the text.
SymbolMeaningSymbolMeaning
Lthe energy station operating state observationmthe natural gas consumption flow rate of the gas boiler
Pithe active power of the ith node L i the sum of the power outputs of the transmission outlet pipeline connected to the mutual standby related equipment
Qithe reactive power of the ith node C i the sum of the power required for the normal operation of the coupled equipment (including circulating pumps, compressors, etc.)
Gijthe conductance between nodes i and j L i sub the sum of the power outputs of the lower pipeline of the transmission outlet pipeline
Bijthe susceptance between nodes i and jPthe power outputs of photovoltaic power generation
θijthe phase angle difference between nodes i and jWthe power outputs of wind power generation
CCHPthe thermal-to-electric ratio of the CHP unit S m the sum of the standby outputs of other equipment under conditions of failure of the equipment
PCHP,hthe thermal power outputs C m EQ the capacity of the mth backup equipment connected to the pipeline capacity
PCHP,ethe electric power outputs C m TL the capacity of the mth of backup equipment connected to the pipeline capacity
fijthe flow from node i to node jSicomthe output power of the ith mutually incompatible backup mode
kijthe pipe coefficientΣSithe sum of the outputs of the backup modes without competing relationships
Kthe compression ratio C i EQ , com the noncompetitive relationship of backup mode equipment capacity
Cthe coefficient related to temperature and efficiency C i TL , com the noncompetitive relationship backup mode the pipeline capacity
avariable coefficientLicomthe ith mutually noncompetitive relationship backup mode pipeline
Qathe compressor flow ratekwthe shape factor
Bthe correlation matrix of the networkcwthe scale factor
mthe branch flow vectorVrthe rated wind
Kgthe pipe coefficientVhthe actual wind speed
fthe pipe frictionVoutthe cut-out wind speed
Dthe pipe diameterVinthe cut-in wind speed
ρthe density of the mediumPwmaxthe maximum output power of the fan
Cwthe specific heat capacity of the mediumapthe shape factors
Tothe outlet water temperaturesβpthe scale factors
Tithe return water temperaturesShthe actual light intensities
Tathe ambient temperatureSrthe rated light intensities
λthe heat transfer coefficient.Lithe Load carried by the ith pipeline
ηthe efficiency of the circulation pumpCLithe capacity of the ith pipeline
poutthe outlet pressures of the mediumTithe Transformer i
pinthe inlet pressures of the mediumCTithe capacity of the ith transformer
ρdensity of the mediumCGBthe capacity of gas boilers
PGBthe power output of the gas boilerCCPithe capacity of the ith circulation pump
βthe boiler efficiencyCCithe capacity of the ith compressor
Hthe average heating value of natural gasaiproportionality factor
bicurvature factorfmaxthe maximum failure rate
fminminimum failure ratefavaverage failure rate
Sminthe worst state ratings of the equipmentSavthe average state ratings of the equipment
Smaxthe best state ratings of the equipmentfj,wThe failure frequency model based on weather factors
fj,avthe average failure frequency of the jth piece of equipmentNjthe duration of normal weather conditions
Ujthe duration of bad weather conditionsKjthe proportion of equipment failures during bad weather
fj,ethe failure model of other risk sourcesnj,ithe number of failures of the jth piece of equipment
Nj,ithe time duration of the ith stateKjthe proportion of failed equipment during bad weather
tthe measurement periodfeqthe frequency of failure based on equipment status
fwthe frequency of failure based on weather conditionsfethe frequency of failure from other risk sources
Rthe security risk indexFj(∆t)the probability that the jth piece of equipment fails
rjthe degree of deactivation following the failure of this equipmentOa point within the boundary
C0the state point on the boundaryCjthe real-time state point
ESthe power of the energy storage equipmentF1the economic function
F2the security functionρthe discount rate
rthe service life c int E the cost per unit capacity
E int ES the capacity of the energy storage equipment c int P the cost per unit power
S int ES the power output of the energy storage equipment R 0 the value of the security risk index following energy storage configuration
R0the value of the security risk index before energy storage configuration E ES ,   int   min the lower limits of the capacity of the energy storage equipment
E ES ,   int   max the upper limits of the capacity of the energy storage equipment C max TL the maximum capacity of the pipeline connected to the energy storage equipment
Rmaxthe maximum risk acceptable for the energy supply of the energy station.

Appendix B

Figure A1. Flow chart of an improved multi-objective particle swarm optimization algorithm.
Figure A1. Flow chart of an improved multi-objective particle swarm optimization algorithm.
Sustainability 15 13741 g0a1

Appendix C

Table A2. Main parameters of a distributed energy station.
Table A2. Main parameters of a distributed energy station.
EquipmentEquipment ParametersEquipment Capacity
DES 1PVShape factor: 0.79
Scale factor: 1.87
Rated light intensity: 700
Total photovoltaic capacity: 4 MW
TT1: 35/11 kV
T2: 35/11 kV
T1: 5 MVA
T2: 6 MVA
GBEnergy conversion efficiency: 0.96 MW
C1, C2boost ratio: 1.26 MW
CHP CCHP,min: 1.5
CCHP,max: 10
Electrical capacity: 3 MW
Heat capacity: 4 MW
DES 2WTGScale factor: 2.15
Shape factor: 15
Cut-in wind speed: 4 m/s
Rated wind speed: 15 m/s
Cut-out wind speed: 25 m/s
Total fan capacity: 4 MW
TransformerT3: 35/11 kV
T4: 35/11 kV
T3: 6 MVA
T4: 6 MVA
CompressorC1 Boost ratio: 1.20
C2 Boost ratio: 1.20
6 MW
Key PipelinesPower pipelines I(L1, L2, L10, L7)
Voltage rating: 10 kV
Capacity: 6.31 MVA
Power pipelines II(L3, L4)
Voltage rating: 10 kV
Capacity: 7.5 MVA
Heat network pipelineWater supply temperature: 100 °C
Water supply temperature: 49–50 °C
Capacity: 89.81 m3/h
Natural gas pipelineSub-pressure natural gas pipeline network
pressure: 0.8~1.6 MPa
0.334 MMCFD2
Table A3. Key pipeline parameters and failure probability models.
Table A3. Key pipeline parameters and failure probability models.
LineLengthFailure Probability Model
L1800 m F = { 1 e 0.0568 Δ t w = 0 1 e 1.3392 Δ t w = 1
L2860 m F = { 1 e 0.06106 Δ t w = 0 1 e 1.43964 Δ t w = 1
L3700 m F = { 1 e 0.0497 Δ t w = 0 1 e 1.1718 Δ t w = 1
L41300 m F = { 1 e 0.0923 Δ t w = 0 1 e 2.1762 Δ t w = 1
L5900 m F = 1 e 0.0693 Δ t
L6950 m F = 1 e 0.07315 Δ t
L7750 m F = { 1 e 0.05325 Δ t w = 0 1 e 1.2555 Δ t w = 1
L81600 m F = 1 e 0.136 Δ t
L91760 m F = 1 e 0.1496 Δ t
L10400 m F = { 1 e 0.015 Δ t w = 0 1 e 1.2555 Δ t w = 1
Table A4. Pipeline status in different scenarios.
Table A4. Pipeline status in different scenarios.
Equipment StatusScenario IScenario IIScenario III
L1808070
L2808090
L3808090
L4808090
L5808070
L6808070
L7808090
L8808070
L9808080
L10808060
WeatherGoodBadGood

References

  1. Jiang, F.; Peng, X.; Tu, C.; Guo, Q.; Deng, J.; Dai, F. An improved hybrid parallel compensator for enhancing PV power transfer capability. IEEE Trans. Ind. Electron. 2021, 69, 11132–11143. [Google Scholar] [CrossRef]
  2. Jiang, F.; Tu, C.; Guo, Q.; Shuai, Z.; He, X.; He, J. Dual-functional dynamic voltage restorer to limit fault current. IEEE Trans. Ind. Electron. 2018, 66, 5300–5309. [Google Scholar] [CrossRef]
  3. Liang, X.; Jiang, F.; Peng, X.; Xiong, L.; Jiang, Y.; Gautam, S.; Li, Z. Improved Hybrid Reactive Power Compensation System Based on FC and STATCOM and Its Control Method. Chin. J. Electr. Eng. 2022, 8, 29–41. [Google Scholar] [CrossRef]
  4. Qiu, Y.; Li, Q.; Ai, Y.; Chen, W.; Benbouzid, M.; Liu, S.; Gao, F. Two-stage distributionally robust optimization-based coordinated scheduling of integrated energy system with electricity-hydrogen hybrid energy storage. Prot. Control. Mod. Power Syst. 2023, 81, 33. [Google Scholar] [CrossRef]
  5. Negnevitsky, M.; Nguyen, D.H.; Piekutowski, M. Risk assessment for power system operation planning with high wind power penetration. IEEE Trans. Power Syst. 2014, 30, 1359–1368. [Google Scholar] [CrossRef]
  6. Li, X.; Zhang, X.; Wu, L.; Lu, P.; Zhang, S.H. Transmission line overload risk assessment for power systems with wind and load-power generation correlation. IEEE Trans. Smart Grid 2015, 6, 1233–1242. [Google Scholar] [CrossRef]
  7. Luo, J.; Li, H.; Wang, S. A quantitative reliability assessment and risk quantification method for microgrids considering supply and demand uncertainties. Appl. Energy 2022, 328, 120130. [Google Scholar] [CrossRef]
  8. Laowanitwattana, J.; Uatrongjit, S. Probabilistic power flow analysis based on partial least square and arbitrary polynomial chaos expansion. IEEE Trans. Power Syst. 2021, 37, 1461–1470. [Google Scholar] [CrossRef]
  9. Xia, S.; Song, L.; Wu, Y.; Ma, Z.J.; Jing, J.P.; Ding, Z.H.; Li, G.Y. An integrated LHS–CD approach for power system security risk assessment with consideration of source–network and load uncertainties. Processes 2019, 7, 900. [Google Scholar] [CrossRef]
  10. Ye, K.; Zhao, J.; Zhang, H.; Zhang, Y.C. Data-driven probabilistic voltage risk assessment of miniwecc system with uncertain PVs and wind generations using realistic data. IEEE Trans. Power Syst. 2022, 37, 4121–4124. [Google Scholar] [CrossRef]
  11. Urbanik, M.; Tchórzewska-Cieślak, B.; Pietrucha-Urbanik, K. Analysis of the safety of functioning gas pipelines in terms of the occurrence of failures. Energies 2019, 12, 3228. [Google Scholar] [CrossRef]
  12. Nemet, A.; Klemeš, J.J.; Moon, I.; Kravanja, Z. Safety analysis embedded in heat exchanger network synthesis. Comput. Chem. Eng. 2017, 107, 357–380. [Google Scholar] [CrossRef]
  13. Cao, M.; Shao, C.; Hu, B.; Xie, K.G.; Li, W.Y.; Peng, L.B.; Zhang, W.X. Reliability assessment of integrated energy systems considering emergency dispatch based on dynamic optimal energy flow. IEEE Trans. Sustain. Energy 2021, 13, 290–301. [Google Scholar] [CrossRef]
  14. Mu, Y.; Wang, C.; Cao, Y.; Jia, H.J.; Zhang, Q.Z.; Yu, X.D. A CVAR-based risk assessment method for park-level integrated energy system considering the uncertainties and correlation of energy prices. Energy 2022, 247, 123549. [Google Scholar] [CrossRef]
  15. Wang, C.; Yan, C.; Li, G.; Liu, S.Y.; Bie, Z.H. Risk assessment of integrated electricity and heat system with independent energy operators based on Stackelberg game. Energy 2020, 198, 117349. [Google Scholar] [CrossRef]
  16. Zhang, Y.; Yang, Z.; Ji, X.; Zhang, X.; Yu, Z.H.; Wu, F.C. Robust optimization of the active distribution network involving risk assessment. Front. Energy Res. 2022, 10, 963576. [Google Scholar] [CrossRef]
  17. Xie, H.; Chen, H.; Deng, X.; Zhang, P.; Sun, Q. Electric-gas integrated energy system operational risk assessment based on improved k-means clustering technology and semi-invariant method. Proc. CSEE 2020, 40, 59–69. [Google Scholar] [CrossRef]
  18. Wang, D.; Li, S.; Jia, H.; Xiao, J.; Guo, Y. Research on interval security region of regional integrated energy system integrated with renewable energy sources, part I: Concepts, modeling and dimension reduction observation. Proc. CSEE 2022, 42, 3188–3204. [Google Scholar] [CrossRef]
  19. Chen, S.; Wei, Z.; Sun, G.; Wei, W.; Wang, D. Convex hull based robust security region for electricity-gas integrated energy systems. IEEE Trans. Power Syst. 2018, 34, 1740–1748. [Google Scholar] [CrossRef]
  20. Shi, J.; Wang, Y.; Fu, R.; Zhang, J. Operating strategy for local-area energy systems integration considering uncertainty of supply-side and demand-side under conditional value-at-risk assessment. Sustainability 2017, 9, 1655. [Google Scholar] [CrossRef]
  21. Zong, X.; Yuan, Y. Two-stage robust optimization of regional integrated energy systems considering uncertainties of distributed energy stations. Front. Energy Res. 2023, 11, 1135056. [Google Scholar] [CrossRef]
  22. Cherdantseva, Y.; Burnap, P.; Blyth, A.; Eden, P.; Jones, K.; Soulsby, H.; Stoddart, K. A review of cyber security risk assessment methods for SCADA systems. Comput. Secur. 2016, 56, 1–27. [Google Scholar] [CrossRef]
  23. Xiao, J.; Lin, X.; Jiao, H.; Song, C.; Zhou, H.; Zu, G.; Wang, D. Model, calculation, and application of available supply capability for distribution systems. Appl. Energy 2023, 348, 121489. [Google Scholar] [CrossRef]
  24. Liu, L.; Wang, D.; Hou, K.; Jia, H.J.; Li, S.Y. Region model and application of regional integrated energy system security analysis. Appl. Energy 2020, 260, 114268. [Google Scholar] [CrossRef]
  25. Zhou, B.; Fang, J.; Ai, X.; Yao, W.; Chen, Z.; Wen, J. Pyramidal approximation for power flow and optimal power flow. IET Gener. Transm. Distrib. 2020, 14, 3774–3782. [Google Scholar] [CrossRef]
  26. Ding, T.; Jia, W.; Shahidehpour, M. A convex energy-like function for reliable gas flow solutions in gas transmission systems. IEEE Trans. Power Syst. 2021, 36, 4876–4879. [Google Scholar] [CrossRef]
  27. Gomariz, F.P.; López, J.M.C.; Munoz, F.D. An analysis of low flow for solar thermal system for water heating. Sol. Energy 2019, 179, 67–73. [Google Scholar] [CrossRef]
  28. Zhang, S.; Cheng, H.; Li, K.; Tai, N.; Wang, D.; Li, F. Multi-objective distributed generation planning in distribution network considering correlations among uncertainties. Appl. Energy 2018, 226, 743–755. [Google Scholar] [CrossRef]
  29. Ren, Z.; Yan, W.; Zhao, X.; Li, W.; Yu, J. Chronological probability model of photovoltaic generation. IEEE Trans. Power Syst. 2013, 29, 1077–1088. [Google Scholar] [CrossRef]
  30. Shi, C.; Ning, X.; Sun, Z.; Kang, C.; Du, Y.; Ma, G. Quantitative risk assessment of distribution network based on real-time health index of equipment. High Volt. Eng. 2018, 44, 534–540. [Google Scholar] [CrossRef]
  31. Brown, R.E.; Frimpong, G.; Willis, H.L. Failure Rate Modeling Using Equipment Inspection Data. IEEE Trans. Power Syst. 2004, 19, 782–787. [Google Scholar] [CrossRef]
  32. Wang, Y.; Chen, L.; Yao, M.; Li, X. Evaluating weather influences on transmission line failure rate based on scarce fault records via a bi-layer clustering technique. IET Gener. Transm. Distrib. 2019, 13, 5305–5312. [Google Scholar] [CrossRef]
  33. Zhang, X.; Zheng, X.; Cheng, R.; Qiu, J.; Jin, Y. A competitive mechanism based multi-objective particle swarm optimizer with fast convergence. Inf. Sci. 2018, 427, 63–76. [Google Scholar] [CrossRef]
  34. Guo, Y.; Wang, D.; Li, S.; Jia, H.; Li, J.; Zheng, Y.; Yang, Z. Optimal allocation of energy storage in regional integrated energy system based on security region. Power Syst. Technol. 2022, 46, 604–612. [Google Scholar] [CrossRef]
Figure 1. Schematic diagram of a network of distributed energy stations.
Figure 1. Schematic diagram of a network of distributed energy stations.
Sustainability 15 13741 g001
Figure 2. Schematic diagram of a distributed energy station.
Figure 2. Schematic diagram of a distributed energy station.
Sustainability 15 13741 g002
Figure 3. The relationship between the operating point and the security boundary.
Figure 3. The relationship between the operating point and the security boundary.
Sustainability 15 13741 g003
Figure 4. Schematic diagram of the impact of energy storage on security boundaries.
Figure 4. Schematic diagram of the impact of energy storage on security boundaries.
Sustainability 15 13741 g004
Figure 5. Security risk assessment and improvement strategy.
Figure 5. Security risk assessment and improvement strategy.
Sustainability 15 13741 g005
Figure 6. Power equipment boundary. (a) (T1, T2) failure condition; (b) CHP unit failure condition.
Figure 6. Power equipment boundary. (a) (T1, T2) failure condition; (b) CHP unit failure condition.
Sustainability 15 13741 g006
Figure 7. Security boundary of thermal and gas equipment. (a) (CHP, GB) failure condition; (b) (C1, C2) unit failure.
Figure 7. Security boundary of thermal and gas equipment. (a) (CHP, GB) failure condition; (b) (C1, C2) unit failure.
Sustainability 15 13741 g007
Figure 8. Power line security boundary. (a) L2 security boundary; (b) L4 security boundary.
Figure 8. Power line security boundary. (a) L2 security boundary; (b) L4 security boundary.
Sustainability 15 13741 g008
Figure 9. Thermal pipeline security boundary.
Figure 9. Thermal pipeline security boundary.
Sustainability 15 13741 g009
Figure 10. Equipment security boundary under new energy access. (a) T1 security boundary; (b) T4 security boundary.
Figure 10. Equipment security boundary under new energy access. (a) T1 security boundary; (b) T4 security boundary.
Sustainability 15 13741 g010
Figure 11. L2 security boundary under new energy access.
Figure 11. L2 security boundary under new energy access.
Sustainability 15 13741 g011
Figure 12. Energy storage optimization configuration scheme set to the Pareto frontier.
Figure 12. Energy storage optimization configuration scheme set to the Pareto frontier.
Sustainability 15 13741 g012
Table 1. Mean failure frequency of critical equipment.
Table 1. Mean failure frequency of critical equipment.
Key EquipmentAverage Failure FrequencyKey EquipmentAverage Failure Frequency
Transmission pipeline0.071Gas pipeline0.085
Heating pipeline0.077Transformer0.015
CHP unit (with circulation pump)0.065GB unit(including circulation pump)0.075
Compressor0.05
Table 2. Equipment failure frequency under different weather conditions.
Table 2. Equipment failure frequency under different weather conditions.
Outdoor EquipmentFailure Frequency
Normal WeatherBad Weather
Transmission pipeline0.0251.603
Transformer0.0060.309
Table 3. Key equipment risk assessment results.
Table 3. Key equipment risk assessment results.
Failure EquipmentEquipment StatusFailure ProbabilityLoss of Load LevelRisk Assessment
T1801.0274 × 10−52.088 MVA21.45
T2856.5194 × 10−61.088 MVA7.093
T3801.0274 × 10−50.278 MVA2.856
T4856.5194 × 10−60.278 MVA1.812
GB 805.1369 × 10−50.26 MW13.355
CHP804.452 × 10−5heat 0 MW
electronic 0 MVA
0
C1803.4246 × 10−50.03 MW1.0273
C2901.3709 × 10−50.03 MW0.4112
Table 4. Key pipeline risk assessment results.
Table 4. Key pipeline risk assessment results.
Failure PipelineEquipment StatusFailure ProbabilityLoss of Load LevelRisk Assessment
L1803.8903 × 10−500
L2804.1821 × 10−500
L3803.4041 × 10−500
L4806.3217 × 10−50.667 MVA42.1657
L5804.7465 × 10−50.26 MW12.34
L6805.0101 × 10−500
L7803.6472 × 10−500
L8809.314 × 10−50.03 MW2.7942
L9801.0246 × 10−40.03 MW3.0738
L10801.0274 × 10−51.677 MVA17.229
Table 5. Three different energy storage configuration schemes.
Table 5. Three different energy storage configuration schemes.
Configuration OptionRisk ValueCost/CNYPowerCapacity
Configuration I034,8410.667 MW1.4822 MWh
Configuration II−2002,001,1003.831 MW8.513 MWh
Configuration III−431.966.5135 × 1067.5 MW30.763 MWh
Table 6. Comparison of failure probability in different scenarios.
Table 6. Comparison of failure probability in different scenarios.
LineScenario I (×10−5)Scenario II (×10−5)Scenario III (×10−5)
Method IMethod IIMethod IMethod IIMethod IMethod II
L13.89033.89033.890391.6833.89039.5595
L24.18214.18214.182198.5564.18211.674
L33.40413.40413.404180.2283.40411.3626
L46.32176.32176.3217148.946.32172.5305
L54.74654.74654.74654.74654.746511.664
L65.01015.01015.01015.01015.010112.312
L73.64723.64723.647285.9563.64721.4599
L89.3149.3149.3149.3149.31414.233
L910.24610.24610.24610.24610.2462.7813
L101.02741.02741.027445.8521.027411.67
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Luo, Y.; Li, Z.; Li, S.; Jiang, F. Risk Assessment for Energy Stations Based on Real-Time Equipment Failure Rates and Security Boundaries. Sustainability 2023, 15, 13741. https://doi.org/10.3390/su151813741

AMA Style

Luo Y, Li Z, Li S, Jiang F. Risk Assessment for Energy Stations Based on Real-Time Equipment Failure Rates and Security Boundaries. Sustainability. 2023; 15(18):13741. https://doi.org/10.3390/su151813741

Chicago/Turabian Style

Luo, Yongheng, Zhonglong Li, Sen Li, and Fei Jiang. 2023. "Risk Assessment for Energy Stations Based on Real-Time Equipment Failure Rates and Security Boundaries" Sustainability 15, no. 18: 13741. https://doi.org/10.3390/su151813741

APA Style

Luo, Y., Li, Z., Li, S., & Jiang, F. (2023). Risk Assessment for Energy Stations Based on Real-Time Equipment Failure Rates and Security Boundaries. Sustainability, 15(18), 13741. https://doi.org/10.3390/su151813741

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop