Skip to main navigation Skip to search Skip to main content

Region based reconfiguration of distribution network: A post-contingency security solution

  • Jia Liu
  • , Zao Tang
  • , Peter Pingliang Zeng*
  • , Yalou Li
  • , Qiuwei Wu
  • *Corresponding author for this work
    • Hangzhou Dianzi University
    • China Electric Power Research Institute

    Research output: Contribution to journalJournal articleResearchpeer-review

    111 Downloads (Orbit)

    Abstract

    The N-1 security principle is a key principle for distribution operation. However, it is not taken into account in modern distribution network reconfiguration models, which cannot satisfy security demands. And in order to solve this fundamental problem, this paper proposes a new reconfiguration method for distribution network considering N-1 security constraints. Firstly, distribution system security region are introduced to analyze real-time security as well as sub-concepts of security boundary and security distance are analyzed. Secondly, distribution feeder reconfiguration model is introduced to minimize the net loss considering N-1 security operation constraints. Thirdly, the model is solved by the improved genetic algorithm. Finally, the model of this paper is compared to the existing model and the results show that the reconfiguration strategy can satisfy the N-1 security principle and is better than modern models considering security of power systems, which prove that the proposed model and solving method are correct and effective.
    Original languageEnglish
    JournalEnergy Reports
    Volume8
    Pages (from-to)422-428
    DOIs
    Publication statusPublished - 2022
    Event8th International Conference on Power and Energy Systems Engineering - Fukuoka, Japan
    Duration: 10 Sept 202112 Sept 2021

    Conference

    Conference8th International Conference on Power and Energy Systems Engineering
    Country/TerritoryJapan
    CityFukuoka
    Period10/09/202112/09/2021

    Keywords

    • Distribution network reconfiguration
    • Improved genetic algorithm
    • N-1 security
    • Security distance

    Fingerprint

    Dive into the research topics of 'Region based reconfiguration of distribution network: A post-contingency security solution'. Together they form a unique fingerprint.

    Cite this