A Heuristic-Driven Charging Strategy of Electric Vehicle for Grids with High EV Penetration

Bahman Ahmadi*, Elham Shirazi

*Corresponding author for this work

Research output: Contribution to journalArticleAcademicpeer-review

8 Downloads (Pure)

Abstract

The widespread adoption of electric vehicles (EVs) poses challenges associated with charging infrastructures and their impact on the electrical grid. To address these challenges, smart charging approaches have emerged as a key solution that optimizes charging processes and contributes to a smarter and more efficient grid. This paper presents an innovative multi-objective optimization framework for EV smart charging (EVSC) using the Dynamic Hunting Leadership (DHL) method. The framework aims to improve the voltage profile of the system in addition to eliminating voltage violations and energy not supplied (ENS) to EVs within the network. The proposed approach considers both residential EV chargers and parking stations, incorporating realistic EV charger behaviors based on constant current charging and addressing the problem as a mixed integer non-linear programming (MINLP) problem. The performance of the optimization method is evaluated on a distribution network with varying levels of EV penetration connected to the chargers in the grid. The results demonstrate the effectiveness of the DHL algorithm in minimizing conflicting objectives and improving the grid’s voltage profile while considering operational constraints. This study provides a road map for EV aggregators and EV owners, guiding them on how to charge EVs based on preferences while minimizing adverse technical impacts on the grid.

Original languageEnglish
Article number6959
JournalEnergies
Volume16
Issue number19
DOIs
Publication statusPublished - Oct 2023

Keywords

  • Charging strategy
  • DSistribution network
  • Electric vehicle
  • Optimization algorithm
  • Smart grid

Fingerprint

Dive into the research topics of 'A Heuristic-Driven Charging Strategy of Electric Vehicle for Grids with High EV Penetration'. Together they form a unique fingerprint.

Cite this