Region based reconfiguration of distribution network: A post-contingency security solution
The N-1 security principle is a key principle for distribution operation. However, it is not taken into account in modern distribution network reconfiguration models, which cannot satisfy security demands. And in order to solve this fundamental problem, this paper proposes a new reconfiguration meth...
Guardado en:
Autores principales: | , , , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
Elsevier
2022
|
Materias: | |
Acceso en línea: | https://doaj.org/article/3b07da171d1642bc9531236d28205ce5 |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:3b07da171d1642bc9531236d28205ce5 |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:3b07da171d1642bc9531236d28205ce52021-12-04T04:34:52ZRegion based reconfiguration of distribution network: A post-contingency security solution2352-484710.1016/j.egyr.2021.11.049https://doaj.org/article/3b07da171d1642bc9531236d28205ce52022-04-01T00:00:00Zhttp://www.sciencedirect.com/science/article/pii/S235248472101194Xhttps://doaj.org/toc/2352-4847The N-1 security principle is a key principle for distribution operation. However, it is not taken into account in modern distribution network reconfiguration models, which cannot satisfy security demands. And in order to solve this fundamental problem, this paper proposes a new reconfiguration method for distribution network considering N-1 security constraints. Firstly, distribution system security region are introduced to analyze real-time security as well as sub-concepts of security boundary and security distance are analyzed. Secondly, distribution feeder reconfiguration model is introduced to minimize the net loss considering N-1 security operation constraints. Thirdly, the model is solved by the improved genetic algorithm. Finally, the model of this paper is compared to the existing model and the results show that the reconfiguration strategy can satisfy the N-1 security principle and is better than modern models considering security of power systems, which prove that the proposed model and solving method are correct and effective.Jia LiuZao TangPeter Pingliang ZengYalou LiQiuwei WuElsevierarticleDistribution network reconfigurationN-1 securitySecurity distanceImproved genetic algorithmElectrical engineering. Electronics. Nuclear engineeringTK1-9971ENEnergy Reports, Vol 8, Iss , Pp 422-428 (2022) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
Distribution network reconfiguration N-1 security Security distance Improved genetic algorithm Electrical engineering. Electronics. Nuclear engineering TK1-9971 |
spellingShingle |
Distribution network reconfiguration N-1 security Security distance Improved genetic algorithm Electrical engineering. Electronics. Nuclear engineering TK1-9971 Jia Liu Zao Tang Peter Pingliang Zeng Yalou Li Qiuwei Wu Region based reconfiguration of distribution network: A post-contingency security solution |
description |
The N-1 security principle is a key principle for distribution operation. However, it is not taken into account in modern distribution network reconfiguration models, which cannot satisfy security demands. And in order to solve this fundamental problem, this paper proposes a new reconfiguration method for distribution network considering N-1 security constraints. Firstly, distribution system security region are introduced to analyze real-time security as well as sub-concepts of security boundary and security distance are analyzed. Secondly, distribution feeder reconfiguration model is introduced to minimize the net loss considering N-1 security operation constraints. Thirdly, the model is solved by the improved genetic algorithm. Finally, the model of this paper is compared to the existing model and the results show that the reconfiguration strategy can satisfy the N-1 security principle and is better than modern models considering security of power systems, which prove that the proposed model and solving method are correct and effective. |
format |
article |
author |
Jia Liu Zao Tang Peter Pingliang Zeng Yalou Li Qiuwei Wu |
author_facet |
Jia Liu Zao Tang Peter Pingliang Zeng Yalou Li Qiuwei Wu |
author_sort |
Jia Liu |
title |
Region based reconfiguration of distribution network: A post-contingency security solution |
title_short |
Region based reconfiguration of distribution network: A post-contingency security solution |
title_full |
Region based reconfiguration of distribution network: A post-contingency security solution |
title_fullStr |
Region based reconfiguration of distribution network: A post-contingency security solution |
title_full_unstemmed |
Region based reconfiguration of distribution network: A post-contingency security solution |
title_sort |
region based reconfiguration of distribution network: a post-contingency security solution |
publisher |
Elsevier |
publishDate |
2022 |
url |
https://doaj.org/article/3b07da171d1642bc9531236d28205ce5 |
work_keys_str_mv |
AT jialiu regionbasedreconfigurationofdistributionnetworkapostcontingencysecuritysolution AT zaotang regionbasedreconfigurationofdistributionnetworkapostcontingencysecuritysolution AT peterpingliangzeng regionbasedreconfigurationofdistributionnetworkapostcontingencysecuritysolution AT yalouli regionbasedreconfigurationofdistributionnetworkapostcontingencysecuritysolution AT qiuweiwu regionbasedreconfigurationofdistributionnetworkapostcontingencysecuritysolution |
_version_ |
1718372962325757952 |