Region based reconfiguration of distribution network: A post-contingency security solution

The N-1 security principle is a key principle for distribution operation. However, it is not taken into account in modern distribution network reconfiguration models, which cannot satisfy security demands. And in order to solve this fundamental problem, this paper proposes a new reconfiguration meth...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Jia Liu, Zao Tang, Peter Pingliang Zeng, Yalou Li, Qiuwei Wu
Formato: article
Lenguaje:EN
Publicado: Elsevier 2022
Materias:
Acceso en línea:https://doaj.org/article/3b07da171d1642bc9531236d28205ce5
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:3b07da171d1642bc9531236d28205ce5
record_format dspace
spelling oai:doaj.org-article:3b07da171d1642bc9531236d28205ce52021-12-04T04:34:52ZRegion based reconfiguration of distribution network: A post-contingency security solution2352-484710.1016/j.egyr.2021.11.049https://doaj.org/article/3b07da171d1642bc9531236d28205ce52022-04-01T00:00:00Zhttp://www.sciencedirect.com/science/article/pii/S235248472101194Xhttps://doaj.org/toc/2352-4847The N-1 security principle is a key principle for distribution operation. However, it is not taken into account in modern distribution network reconfiguration models, which cannot satisfy security demands. And in order to solve this fundamental problem, this paper proposes a new reconfiguration method for distribution network considering N-1 security constraints. Firstly, distribution system security region are introduced to analyze real-time security as well as sub-concepts of security boundary and security distance are analyzed. Secondly, distribution feeder reconfiguration model is introduced to minimize the net loss considering N-1 security operation constraints. Thirdly, the model is solved by the improved genetic algorithm. Finally, the model of this paper is compared to the existing model and the results show that the reconfiguration strategy can satisfy the N-1 security principle and is better than modern models considering security of power systems, which prove that the proposed model and solving method are correct and effective.Jia LiuZao TangPeter Pingliang ZengYalou LiQiuwei WuElsevierarticleDistribution network reconfigurationN-1 securitySecurity distanceImproved genetic algorithmElectrical engineering. Electronics. Nuclear engineeringTK1-9971ENEnergy Reports, Vol 8, Iss , Pp 422-428 (2022)
institution DOAJ
collection DOAJ
language EN
topic Distribution network reconfiguration
N-1 security
Security distance
Improved genetic algorithm
Electrical engineering. Electronics. Nuclear engineering
TK1-9971
spellingShingle Distribution network reconfiguration
N-1 security
Security distance
Improved genetic algorithm
Electrical engineering. Electronics. Nuclear engineering
TK1-9971
Jia Liu
Zao Tang
Peter Pingliang Zeng
Yalou Li
Qiuwei Wu
Region based reconfiguration of distribution network: A post-contingency security solution
description The N-1 security principle is a key principle for distribution operation. However, it is not taken into account in modern distribution network reconfiguration models, which cannot satisfy security demands. And in order to solve this fundamental problem, this paper proposes a new reconfiguration method for distribution network considering N-1 security constraints. Firstly, distribution system security region are introduced to analyze real-time security as well as sub-concepts of security boundary and security distance are analyzed. Secondly, distribution feeder reconfiguration model is introduced to minimize the net loss considering N-1 security operation constraints. Thirdly, the model is solved by the improved genetic algorithm. Finally, the model of this paper is compared to the existing model and the results show that the reconfiguration strategy can satisfy the N-1 security principle and is better than modern models considering security of power systems, which prove that the proposed model and solving method are correct and effective.
format article
author Jia Liu
Zao Tang
Peter Pingliang Zeng
Yalou Li
Qiuwei Wu
author_facet Jia Liu
Zao Tang
Peter Pingliang Zeng
Yalou Li
Qiuwei Wu
author_sort Jia Liu
title Region based reconfiguration of distribution network: A post-contingency security solution
title_short Region based reconfiguration of distribution network: A post-contingency security solution
title_full Region based reconfiguration of distribution network: A post-contingency security solution
title_fullStr Region based reconfiguration of distribution network: A post-contingency security solution
title_full_unstemmed Region based reconfiguration of distribution network: A post-contingency security solution
title_sort region based reconfiguration of distribution network: a post-contingency security solution
publisher Elsevier
publishDate 2022
url https://doaj.org/article/3b07da171d1642bc9531236d28205ce5
work_keys_str_mv AT jialiu regionbasedreconfigurationofdistributionnetworkapostcontingencysecuritysolution
AT zaotang regionbasedreconfigurationofdistributionnetworkapostcontingencysecuritysolution
AT peterpingliangzeng regionbasedreconfigurationofdistributionnetworkapostcontingencysecuritysolution
AT yalouli regionbasedreconfigurationofdistributionnetworkapostcontingencysecuritysolution
AT qiuweiwu regionbasedreconfigurationofdistributionnetworkapostcontingencysecuritysolution
_version_ 1718372962325757952