Region based reconfiguration of distribution network: A post-contingency security solution
The N-1 security principle is a key principle for distribution operation. However, it is not taken into account in modern distribution network reconfiguration models, which cannot satisfy security demands. And in order to solve this fundamental problem, this paper proposes a new reconfiguration meth...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Elsevier
2022-04-01
|
Series: | Energy Reports |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S235248472101194X |
_version_ | 1811332068319166464 |
---|---|
author | Jia Liu Zao Tang Peter Pingliang Zeng Yalou Li Qiuwei Wu |
author_facet | Jia Liu Zao Tang Peter Pingliang Zeng Yalou Li Qiuwei Wu |
author_sort | Jia Liu |
collection | DOAJ |
description | The N-1 security principle is a key principle for distribution operation. However, it is not taken into account in modern distribution network reconfiguration models, which cannot satisfy security demands. And in order to solve this fundamental problem, this paper proposes a new reconfiguration method for distribution network considering N-1 security constraints. Firstly, distribution system security region are introduced to analyze real-time security as well as sub-concepts of security boundary and security distance are analyzed. Secondly, distribution feeder reconfiguration model is introduced to minimize the net loss considering N-1 security operation constraints. Thirdly, the model is solved by the improved genetic algorithm. Finally, the model of this paper is compared to the existing model and the results show that the reconfiguration strategy can satisfy the N-1 security principle and is better than modern models considering security of power systems, which prove that the proposed model and solving method are correct and effective. |
first_indexed | 2024-04-13T16:30:19Z |
format | Article |
id | doaj.art-3b07da171d1642bc9531236d28205ce5 |
institution | Directory Open Access Journal |
issn | 2352-4847 |
language | English |
last_indexed | 2024-04-13T16:30:19Z |
publishDate | 2022-04-01 |
publisher | Elsevier |
record_format | Article |
series | Energy Reports |
spelling | doaj.art-3b07da171d1642bc9531236d28205ce52022-12-22T02:39:35ZengElsevierEnergy Reports2352-48472022-04-018422428Region based reconfiguration of distribution network: A post-contingency security solutionJia Liu0Zao Tang1Peter Pingliang Zeng2Yalou Li3Qiuwei Wu4Department of Automation, Hangzhou Dianzi University, Hangzhou 310018, China; Department of Electrical Engineering, Zhejiang University, Hangzhou 310027, ChinaDepartment of Automation, Hangzhou Dianzi University, Hangzhou 310018, ChinaDepartment of Automation, Hangzhou Dianzi University, Hangzhou 310018, China; Corresponding author.China Electric Power Research Institute, Beijing 100192, ChinaDepartment of Electrical Engineering, Technical University of Denmark, Kongens Lyngby 2800, DenmarkThe N-1 security principle is a key principle for distribution operation. However, it is not taken into account in modern distribution network reconfiguration models, which cannot satisfy security demands. And in order to solve this fundamental problem, this paper proposes a new reconfiguration method for distribution network considering N-1 security constraints. Firstly, distribution system security region are introduced to analyze real-time security as well as sub-concepts of security boundary and security distance are analyzed. Secondly, distribution feeder reconfiguration model is introduced to minimize the net loss considering N-1 security operation constraints. Thirdly, the model is solved by the improved genetic algorithm. Finally, the model of this paper is compared to the existing model and the results show that the reconfiguration strategy can satisfy the N-1 security principle and is better than modern models considering security of power systems, which prove that the proposed model and solving method are correct and effective.http://www.sciencedirect.com/science/article/pii/S235248472101194XDistribution network reconfigurationN-1 securitySecurity distanceImproved genetic algorithm |
spellingShingle | Jia Liu Zao Tang Peter Pingliang Zeng Yalou Li Qiuwei Wu Region based reconfiguration of distribution network: A post-contingency security solution Energy Reports Distribution network reconfiguration N-1 security Security distance Improved genetic algorithm |
title | Region based reconfiguration of distribution network: A post-contingency security solution |
title_full | Region based reconfiguration of distribution network: A post-contingency security solution |
title_fullStr | Region based reconfiguration of distribution network: A post-contingency security solution |
title_full_unstemmed | Region based reconfiguration of distribution network: A post-contingency security solution |
title_short | Region based reconfiguration of distribution network: A post-contingency security solution |
title_sort | region based reconfiguration of distribution network a post contingency security solution |
topic | Distribution network reconfiguration N-1 security Security distance Improved genetic algorithm |
url | http://www.sciencedirect.com/science/article/pii/S235248472101194X |
work_keys_str_mv | AT jialiu regionbasedreconfigurationofdistributionnetworkapostcontingencysecuritysolution AT zaotang regionbasedreconfigurationofdistributionnetworkapostcontingencysecuritysolution AT peterpingliangzeng regionbasedreconfigurationofdistributionnetworkapostcontingencysecuritysolution AT yalouli regionbasedreconfigurationofdistributionnetworkapostcontingencysecuritysolution AT qiuweiwu regionbasedreconfigurationofdistributionnetworkapostcontingencysecuritysolution |