Strict and Non-Strict Security Boundary of Distribution Network

被引:0
|
作者
Xiao, Jun [1 ]
Xiao, Jucheng [1 ]
Zhang, Liyuan [2 ]
Zu, Guoqiang [1 ]
Zhang, Baoqiang [1 ]
机构
[1] Key Laboratory of Smart Grid of Ministry of Education, Tianjin University, Tianjin,300072, China
[2] West Power Supply Branch of Tianjin Power Company of State Grid, Tianjin,300190, China
关键词
Boundary points - Independence boundary - Intersection types - Multiple hyperplanes - Non-strict boundary - Security boundary - Small scale - Strict boundary;
D O I
10.19595/j.cnki.1000-6753.tces.180247
中图分类号
学科分类号
摘要
This paper proposes the definition and calculation methods for strict and non-strict security boundary of distribution network. Firstly, according to the criticality degree of the security boundary point, the strict and non-strict boundary are defined respectively. Strict boundary has the property of strict criticality, while non-strict boundary has the property of non-strict criticality, which together constitute a complete security boundary. Secondly, by analyzing the causes of strict boundaries, this paper divided them into two types: intersection type and independence type. Generally, strict boundaries of most distribution networks are intersection boundaries that are formed by intersection of multiple hyperplanes. Only in some special cases with an extremely small scale, the independence strict boundary can be formed when all loads are limited by the same constraint after N-1. Thirdly, the boundary type judgment theorem and inferences based on the determination matrix are presented. Then, an algorithm is presented for solving the strict and non-strict boundaries. That is, all the intersection boundaries are judged by using the determination matrix firstly, and the complete strict boundary is obtained, and then the complement of the strict boundary is solved to obtain the complete non-strict boundary. Finally, case study verifies the proposed method. Moreover, strict and non-strict boundaries in the cases are shown by visualization. © 2019, Electrical Technology Press Co. Ltd. All right reserved.
引用
收藏
页码:2637 / 2648
相关论文
共 50 条
  • [1] Transformation of non-strict structure-data access into scheduled strict access in non-strict dataflow languages
    Inenaga, K
    Kusakabe, S
    Amamiya, M
    [J]. PARALLEL AND DISTRIBUTED COMPUTING FOR SYMBOLIC AND IRREGULAR APPLICATIONS, 2000, : 288 - 310
  • [2] The Non-Strict Projection Lemma
    Meijer, Tomas J.
    Holicki, Tobias
    van den Eijnden, Sebastiaan
    Scherer, Carsten W.
    Heemels, W. P. M. H. Maurice
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2024, 69 (08) : 5584 - 5590
  • [3] Non-strict heterogeneous stacking
    Rooney, Niall
    Patterson, David
    Nugent, Chris
    [J]. PATTERN RECOGNITION LETTERS, 2007, 28 (09) : 1050 - 1061
  • [4] Non-strict Temporal Exploration
    Erlebach, Thomas
    Spooner, Jakob T.
    [J]. STRUCTURAL INFORMATION AND COMMUNICATION COMPLEXITY, SIROCCO 2020, 2020, 12156 : 129 - 145
  • [5] Uniform approximation of associative copulas by strict and non-strict copulas
    Klement, EP
    Mesiar, R
    Pap, E
    [J]. ILLINOIS JOURNAL OF MATHEMATICS, 2001, 45 (04) : 1393 - 1400
  • [6] Strictly Capturing Non-strict Closures
    Sullivan, Zachary J.
    Downen, Paul
    Ariola, Zena M.
    [J]. PEPM '21: PROCEEDINGS OF THE 2021 ACM SIGPLAN WORKSHOP ON PARTIAL EVALUATION AND PROGRAM MANIPULATION, 2021, : 74 - 89
  • [7] NON-STRICT LANGUAGES - PROGRAMMING AND IMPLEMENTATION
    WRAY, SC
    FAIRBAIRN, J
    [J]. COMPUTER JOURNAL, 1989, 32 (02): : 142 - 151
  • [8] Exception analysis for non-strict languages
    Glynn, K
    Stuckey, PJ
    Sulzmann, M
    Sondergaard, H
    [J]. ACM SIGPLAN NOTICES, 2002, 37 (09) : 98 - 109
  • [9] Checking equivalence in a non-strict language
    Kolesar, John C.
    Piskac, Ruzica
    Hallahan, William T.
    [J]. Proceedings of the ACM on Programming Languages, 2022, 6 (OOPSLA2):
  • [10] On the availability of non-strict quorum systems
    Aiyer, A
    Alvizi, L
    Bazzi, RA
    [J]. DISTRIBUTED COMPUTING, PROCEEDINGS, 2005, 3724 : 48 - 62