Region based reconfiguration of distribution network: A post-contingency security solution

The N-1 security principle is a key principle for distribution operation. However, it is not taken into account in modern distribution network reconfiguration models, which cannot satisfy security demands. And in order to solve this fundamental problem, this paper proposes a new reconfiguration meth...

Full description

Bibliographic Details
Main Authors: Jia Liu, Zao Tang, Peter Pingliang Zeng, Yalou Li, Qiuwei Wu
Format: Article
Language:English
Published: Elsevier 2022-04-01
Series:Energy Reports
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S235248472101194X
_version_ 1811332068319166464
author Jia Liu
Zao Tang
Peter Pingliang Zeng
Yalou Li
Qiuwei Wu
author_facet Jia Liu
Zao Tang
Peter Pingliang Zeng
Yalou Li
Qiuwei Wu
author_sort Jia Liu
collection DOAJ
description The N-1 security principle is a key principle for distribution operation. However, it is not taken into account in modern distribution network reconfiguration models, which cannot satisfy security demands. And in order to solve this fundamental problem, this paper proposes a new reconfiguration method for distribution network considering N-1 security constraints. Firstly, distribution system security region are introduced to analyze real-time security as well as sub-concepts of security boundary and security distance are analyzed. Secondly, distribution feeder reconfiguration model is introduced to minimize the net loss considering N-1 security operation constraints. Thirdly, the model is solved by the improved genetic algorithm. Finally, the model of this paper is compared to the existing model and the results show that the reconfiguration strategy can satisfy the N-1 security principle and is better than modern models considering security of power systems, which prove that the proposed model and solving method are correct and effective.
first_indexed 2024-04-13T16:30:19Z
format Article
id doaj.art-3b07da171d1642bc9531236d28205ce5
institution Directory Open Access Journal
issn 2352-4847
language English
last_indexed 2024-04-13T16:30:19Z
publishDate 2022-04-01
publisher Elsevier
record_format Article
series Energy Reports
spelling doaj.art-3b07da171d1642bc9531236d28205ce52022-12-22T02:39:35ZengElsevierEnergy Reports2352-48472022-04-018422428Region based reconfiguration of distribution network: A post-contingency security solutionJia Liu0Zao Tang1Peter Pingliang Zeng2Yalou Li3Qiuwei Wu4Department of Automation, Hangzhou Dianzi University, Hangzhou 310018, China; Department of Electrical Engineering, Zhejiang University, Hangzhou 310027, ChinaDepartment of Automation, Hangzhou Dianzi University, Hangzhou 310018, ChinaDepartment of Automation, Hangzhou Dianzi University, Hangzhou 310018, China; Corresponding author.China Electric Power Research Institute, Beijing 100192, ChinaDepartment of Electrical Engineering, Technical University of Denmark, Kongens Lyngby 2800, DenmarkThe N-1 security principle is a key principle for distribution operation. However, it is not taken into account in modern distribution network reconfiguration models, which cannot satisfy security demands. And in order to solve this fundamental problem, this paper proposes a new reconfiguration method for distribution network considering N-1 security constraints. Firstly, distribution system security region are introduced to analyze real-time security as well as sub-concepts of security boundary and security distance are analyzed. Secondly, distribution feeder reconfiguration model is introduced to minimize the net loss considering N-1 security operation constraints. Thirdly, the model is solved by the improved genetic algorithm. Finally, the model of this paper is compared to the existing model and the results show that the reconfiguration strategy can satisfy the N-1 security principle and is better than modern models considering security of power systems, which prove that the proposed model and solving method are correct and effective.http://www.sciencedirect.com/science/article/pii/S235248472101194XDistribution network reconfigurationN-1 securitySecurity distanceImproved genetic algorithm
spellingShingle Jia Liu
Zao Tang
Peter Pingliang Zeng
Yalou Li
Qiuwei Wu
Region based reconfiguration of distribution network: A post-contingency security solution
Energy Reports
Distribution network reconfiguration
N-1 security
Security distance
Improved genetic algorithm
title Region based reconfiguration of distribution network: A post-contingency security solution
title_full Region based reconfiguration of distribution network: A post-contingency security solution
title_fullStr Region based reconfiguration of distribution network: A post-contingency security solution
title_full_unstemmed Region based reconfiguration of distribution network: A post-contingency security solution
title_short Region based reconfiguration of distribution network: A post-contingency security solution
title_sort region based reconfiguration of distribution network a post contingency security solution
topic Distribution network reconfiguration
N-1 security
Security distance
Improved genetic algorithm
url http://www.sciencedirect.com/science/article/pii/S235248472101194X
work_keys_str_mv AT jialiu regionbasedreconfigurationofdistributionnetworkapostcontingencysecuritysolution
AT zaotang regionbasedreconfigurationofdistributionnetworkapostcontingencysecuritysolution
AT peterpingliangzeng regionbasedreconfigurationofdistributionnetworkapostcontingencysecuritysolution
AT yalouli regionbasedreconfigurationofdistributionnetworkapostcontingencysecuritysolution
AT qiuweiwu regionbasedreconfigurationofdistributionnetworkapostcontingencysecuritysolution