Two-dimensional Map for Distribution Network Security Region

被引:0
|
作者
Xiao J. [1 ]
Zhou H. [1 ]
Zu G. [2 ]
机构
[1] Key Laboratory of the Ministry of Education on Smart Power Grids, Tianjin University, Tianjin
[2] Electric Power Research Institute of State Grid Tianjin Electric Power Company, Tianjin
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Active distribution network; Distribution system security region (DSSR); Penetration; Two-dimensional map;
D O I
10.7500/AEPS20181024008
中图分类号
学科分类号
摘要
The concept of distribution system security region (DSSR) map is proposed, and the two-dimensional DSSR map is drawn for the traditional distribution network and two typical types of active distribution network. Firstly, the definition and drawing method of DSSR map are presented. The DSSR map is a set of all possible two-dimensional DSSR images for a certain type of distribution network, including image features of the security region such as quadrants and shapes. Then, DSSR maps for the traditional distribution network, the supply network with high penetration (capacity penetration is about 40%) and the balance network with very high penetration (capacity penetration is about 100%) are drawn respectively. Each map contains two sets: one is the N-0 (normal operation state) map and the other is the N-1 map. Finally, the DSSR maps at different penetration levels are compared and some rules are obtained. The DSSR map organizes two-dimensional DSSR images systematically, which helps people to intuitively understand the security region characteristics of different types of distribution network. © 2019 Automation of Electric Power Systems Press.
引用
收藏
页码:96 / 103
页数:7
相关论文
共 27 条
  • [1] Xiao J., Zu G., Bai G., Et al., Mathematical definition and existence proof of distribution system security region, Proceedings of the CSEE, 36, 18, pp. 4828-4836, (2016)
  • [2] Xiao J., Gu W., Wang C., A security region model for smart distribution system, Automation of Electric Power Systems, 37, 8, pp. 14-19, (2013)
  • [3] Chen S.J., Chen Q.X., Xia Q., Et al., Steady-state security assessment method based on distance to security region boundaries, IET Generation, Transmission & Distribution, 7, 3, pp. 288-297, (2013)
  • [4] Chen K., Wu W., Guo K., Et al., Security evaluation under N-1 for distribution network based on load restoration strategies, Power System Technology, 37, 11, pp. 3241-3246, (2013)
  • [5] Xiao J., Zhen G., Wang B., Et al., Security distance of distribution network: definition and method, Proceedings of the CSEE, 37, 10, pp. 2840-2851, (2017)
  • [6] Zu G., Xiao J., Zuo L., Et al., A reconfiguration model for distribution network based on security region, Proceedings of the CSEE, 37, 5, pp. 1401-1409, (2017)
  • [7] Liu J., Cheng H., Tian Y., Et al., Stochastic multi-objective distribution feeder reconfiguration based on point estimation considering N-1 security and net loss, IEEE Power and Energy Society General Meeting (PESGM), pp. 1-5, (2016)
  • [8] Xiao H., Ye Z., Ma F., Et al., Calculation and analysis of the safe operation boundary of shipboard DC zonal electric distribution system, Transactions of China Electrotechnical Society, 31, 20, pp. 202-208, (2016)
  • [9] Yang L., Li Y., Li Z., Et al., Energy rebalance control and safe operation region analysis of MMC with sub-module fault, Electric Power Automation Equipment, 38, 4, pp. 52-59, (2018)
  • [10] Clegg S., Mancarella P., Integrated modeling and assessment of the operational impact of power-to-gas (P2G) on electrical and gas transmission networks, IEEE Transactions on Sustainable Energy, 6, 4, pp. 1234-1244, (2015)