Visualizing the PQ curve

Visualizing the PQ curve

Visualizing the PQ curve Miguel Penagos To maintain system stability and manage diverse characteristics and resources, utilities and developers rely on PQ curve analysis. This analysis is particularly important for complying with FERC Order 827 at the Point of...
UK takes action on connection gridlock

UK takes action on connection gridlock

UK takes action on connection gridlock Mahmoud Elkazaz In common with many other countries around the world, the UK’s queue for grid connections has become highly congested in recent years. New initiatives by the country’s regulator – Ofgem – and the UK Government are...
How microgrids are changing the UK electric network

How microgrids are changing the UK electric network

How microgrids are changing the UK electric network Mahmoud Elkazaz & Syahrul Saad The UK electric network is undergoing a transformation with the rise of microgrids. These small-scale, neighbourhood-based power systems are altering how communities receive and...
Resonance management in long transmission lines

Resonance management in long transmission lines

Resonance management in long transmission lines Ajinai Ajinai Delivering a stable and reliable source of power comes with an array of challenges. Among them is parallel line resonance that can occur in shunt compensated transmission lines during unbalanced switching...
Mitigating grid disturbances with power electronic devices

Mitigating grid disturbances with power electronic devices

Mitigating grid disturbances with power electronic devices Daniel Wang With the push to build a more resilient and reliable grid in full swing, the challenge of stabilizing the flow of electricity grows ever more complex. However, despite a profusion of change, some...
The complexity of renewables, Part 10

The complexity of renewables, Part 10

The complexity of renewables, Part 10 Graeme Hutchison In the final part of our ‘Complexity of Renewables’ series, we look at why storage assets need to be more comprehensively considered in security standards to reflect their dual role as non-synchronous generators...