CN104866921B - A kind of feeder reconfiguration methods in distribution system based on security domain - Google Patents

A kind of feeder reconfiguration methods in distribution system based on security domain Download PDF

Info

Publication number
CN104866921B
CN104866921B CN201510266477.9A CN201510266477A CN104866921B CN 104866921 B CN104866921 B CN 104866921B CN 201510266477 A CN201510266477 A CN 201510266477A CN 104866921 B CN104866921 B CN 104866921B
Authority
CN
China
Prior art keywords
network
distribution system
feeder line
reconfiguration
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510266477.9A
Other languages
Chinese (zh)
Other versions
CN104866921A (en
Inventor
肖峻
祖国强
刘佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin University
Original Assignee
Tianjin University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin University filed Critical Tianjin University
Priority to CN201510266477.9A priority Critical patent/CN104866921B/en
Publication of CN104866921A publication Critical patent/CN104866921A/en
Application granted granted Critical
Publication of CN104866921B publication Critical patent/CN104866921B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S10/00Systems supporting electrical power generation, transmission or distribution
    • Y04S10/50Systems or methods supporting the power network operation or management, involving a certain degree of interaction with the load-side end user applications

Landscapes

  • Supply And Distribution Of Alternating Current (AREA)

Abstract

The invention discloses a kind of feeder reconfiguration methods in distribution system based on security domain, the feeder reconfiguration methods in distribution system is the following steps are included: according to the safety indexes of distribution system security region, security boundary equation building distribution system security region;Network reconfiguration model is obtained according to the safety indexes of the distribution system security region, in conjunction with genetic algorithm, power distribution system network is reconstructed by the network reconfiguration model, obtains the final switch state of the whole network.This method solves network reconfiguration model using Revised genetic algorithum, can be to avoid individual " precocity ", and convergence effect is preferable, and algorithm is relatively stable.This method provides new approaches for the application of the safe domain theory of power distribution network, requires the optimization of stringent extensive interconnection urban power distribution network to run for N-1, especially has preferable directive function.

Description

A kind of feeder reconfiguration methods in distribution system based on security domain
Technical field
The present invention relates to distribution system optimization operation field more particularly to a kind of power distribution system network weights based on security domain Structure method.
Background technique
Power distribution network network reconfiguration (Distribution Network Reconfiguration, DNR) refers to be grasped by switch Make to be the important means for improving distribution system safety in operation and economy to adjust network structure.
DNR mathematics is substantially the combinatorial optimization problem of a multiple constraint.In terms of the optimization aim of model and constraint, pass The target of system DNR, which specifically includes that, to be reduced network loss, balanced load, improves quality of voltage, and is constrained then as normal condition operation constraint And the irradiation structure constraint of network.In terms of algorithm, since the combinatorial optimization problem of multiple constraint solves difficult, numerous studies cause Power is in the speed and precision that improve derivation algorithm, to meet the practical application request of network reconfiguration;Especially it is with genetic algorithm The intelligent algorithm of representative achieves good effect.
With the continuous improvement that user requires power supply reliability, the safe and reliable target or constraint for being increasingly becoming DNR. The essence of reliability is the integral of the safety of discontinuity surface when system is each, and index is more and system is mature, is conveniently used for network The objective function of reconstruct, such as: system is averaged frequency of power cut (SAIFI) etc..Calculating speed is required not based on the DNR of reliability Height is more suitable and applies in Electric Power Network Planning field;And safety be more concerned about system some when discontinuity surface operating status, be based on The system-oriented realtime scheduling and monitoring of the DNR of safety, it is more demanding to calculating speed.
For a long time, based on safety DNR research it is less, mainly due to: 1) classical secrecy analysis using N-1 by Point simulation method, when power distribution network is larger, point by point method calculating speed is slower, if DNR mould directly is added in N-1 analytic process Type can then further increase the difficulty of network reconfiguration calculating;2) existing safety indexes are mostly that the system after N-1 failure occurs is lost Load, and the target of DNR is that prevention or optimal control are carried out to power grid when operating normally, it is desirable to be able to reflect that current electric grid is pacified The index of full information.
Summary of the invention
The present invention provides a kind of feeder reconfiguration methods in distribution system based on security domain, the present invention answers safe domain theory For for power distribution network Real-Time Scheduling and optimal control providing method towards safety, being detailed in down in power distribution system network reconstruct Text description:
A kind of feeder reconfiguration methods in distribution system based on security domain, the feeder reconfiguration methods in distribution system include following Step:
According to the safety indexes of distribution system security region, security boundary equation building distribution system security region;
Network reconfiguration model is obtained according to the safety indexes of the distribution system security region, passes through the network reconfiguration mould Power distribution system network is reconstructed in type, obtains the final switch state of the whole network.
The step of the safety indexes according to distribution system security region, security boundary equation building distribution system security region Suddenly specifically:
Obtain single feeder line safe distance;
Obtained respectively by the single feeder line safe distance average feeder line safe distance and minimum feeder line safety away from From.
It is described to obtain network reconfiguration model according to the safety indexes of the distribution system security region, in conjunction with genetic algorithm Step specifically:
Using all switch sets on ring connection as a gene block, the gene block of each ring connection forms dyeing Body;
Using the network loss percentage of power distribution network as fitness function, pass through the effect of constraint value of the single feeder line safe distance The value of fitness function, screens chromosome;
Intersected by limitation and mutation operation generates new individual, while the topological structure of electric after network reconfiguration is protected Hold radiation operation characteristic;
Convergence speed of the algorithm is improved by optimal individual conserving method.
The beneficial effect of the technical scheme provided by the present invention is that: DSSR theory is applied to distribution system net for the first time by this method Network reconstruct, establishes the network reconfiguration model of meter and DSSR safety indexes, is head of the safe domain theory in network reconfiguration field Secondary trial.
Firstly, DSSR theory can preferentially provide the N-1 safe edge that operating point can be run before power grid actual motion Boundary's equation is simultaneously stored in the computer of control centre, in case called directly when observation, thus be omitted the N-1 of complicated and time consumption by Point calculating process.Therefore, this method can fundamentally improve the calculating speed of network reconfiguration, so that it is met power distribution network and supervise in real time The demand of control and operation.
Secondly, model, using system losses as objective function, safe distance SD etc. is constraint condition.Wherein utilize vector SDmin The safety margin constraint of each feeder line of setting can be distinguished, this is conducive to the different reconstruction strategy of flexible setting, to meet difference Economy and safety demand.Compared to the reconstructing method of traditional simple consideration economy, this method can be for weight It wants feeder line to carry out security constraint, maximumlly improves the safety margin of important feeder line, while preferable reduction the whole network network loss.
Finally, this method solves network reconfiguration model using Revised genetic algorithum, it can be to avoid individual " precocity ", convergence Effect is preferable, and algorithm is relatively stable.This method provides new approaches for the application of the safe domain theory of power distribution network, N-1 is required tight The optimization of the extensive interconnection urban power distribution network of lattice runs (network reconfiguration), especially has preferable directive function.
Detailed description of the invention
Fig. 1 is Revised genetic algorithum network reconfiguration flow chart;
Fig. 2 is that 11 nodes interconnect power distribution network figure;
Fig. 3 is example configuration of power network;
Fig. 4 is the safe distance and network loss contrast schematic diagram of different constraints policies;
Fig. 5 is the Swarm Evolution situation under security constraint strategy 1;
Fig. 6 is a kind of flow chart of feeder reconfiguration methods in distribution system based on security domain.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, embodiment of the present invention is made below further Ground detailed description.
Distribution system security region (Distribution System Security Region, DSSR) based on N-1 criterion It is the new tool for analyzing security of distribution network, can effectively solves the above problems[1].Firstly, DSSR can be in power grid actual motion Before, the N-1 security boundary equation of system is directly given according to electric network composition and configuration, and is had previously been stored in control centre Computer in, can be called directly when needing to observe, the N-1 calculating process of complicated and time consumption is omitted.Secondly, according to operating point To the relative position of security boundary, new safety indexes can be provided --- safe distance (Security Distance, SD), which can provide the foundation of prevention and optimal control with the security information of quantificational description system present operating point.
Embodiment 1
A kind of feeder reconfiguration methods in distribution system based on security domain, the feeder reconfiguration methods in distribution system include following step It is rapid:
101: according to the safety indexes of distribution system security region, security boundary equation building distribution system security region;
102: obtaining network reconfiguration model according to the safety indexes of distribution system security region, pass through network reconfiguration model pair Power distribution system network is reconstructed, and obtains the final switch state of the whole network.
Wherein, according to the safety indexes of distribution system security region, security boundary equation building distribution system security region Step specifically:
Obtain single feeder line safe distance;
Obtained respectively by the single feeder line safe distance average feeder line safe distance and minimum feeder line safety away from From.
Wherein, the step of network reconfiguration model is obtained according to the safety indexes of distribution system security region, in conjunction with genetic algorithm Suddenly specifically:
Using all switch sets on ring connection as a gene block, the gene block of each ring connection forms dyeing Body;
Using the network loss percentage of power distribution network as fitness function, adapted to by the effect of constraint value of single feeder line safe distance The value for spending function, screens chromosome;
Intersected by limitation and mutation operation generates new individual, while the topological structure of electric after network reconfiguration is protected Hold radiation operation characteristic;
Convergence speed of the algorithm is improved by optimal individual conserving method.
The calculating speed that network reconfiguration is fundamentally improved by above-mentioned operating procedure makes it meet power distribution network and supervises in real time The demand of control and operation.
Embodiment 2
Below with reference to specific test data, calculation formula is detailed to describe a kind of power distribution system network based on security domain The operating process of reconstructing method, described below:
201: building distribution system security region and its security boundary equation;
Distribution system security region DSSR is defined as meeting N-1 safe operation criterion and other various operations constrain (such as: base The constraint of your hoff's law, power flow equation constraint, node voltage amplitude constraint or irradiation structure operation constraint, when specific implementation, this Inventive embodiments are without limitation) all working point W set.Wherein, operating point W is all load bus of distribution system The n-dimensional vector of composition, i.e. distribution system security region are as follows:
In formula (1), ΩDSSRFor the mathematic sign of DSSR;V, θ are the amplitude and phase angle of node voltage.F (V, θ)=W is tide Mobile equilibrium constraint;G (W) < 0 is safe operation constraint, branch current constraint, main transformer capacity constraint after specifically including that N-1 failure It is constrained with node voltage.FiIndicate node load;T indicates transposition.For common monocycle web frame distribution network, W can simplify To be indicated with feeder line outlet power.
Existing research shows strictly to count and the boundary DSSR of voltage network loss also has the feature of approximately linear, when result essence When spending of less demanding, the security boundary for simplifying network loss and voltage constraint DSSR can directly be parsed according only to failure reconfiguration path Out, the corresponding security boundary equation of i-th feeder line is denoted as B (i) at this time:
Bi is F in formula (2)iBackup power source (feeder line) number, RFbiFor the feeder line maximum capacity;FbiFor the normal shape of feeder line bi Total load under state;RbiFor FiThe main transformer capacity of backup power source upstream;Φ(bi)Represent the feeder line set from main transformer bi;Θ(i) Indicate the set of one group of feeder line, these feeder lines and FiCome from same main transformer, and after N-1 failure, load and FiIt is transferred to same master Become.
202: constructing the safety indexes of distribution system security region;
1) single feeder line safe distance SD (Security Distance) is obtained:
When other feed connection node load powers of distribution system remain unchanged, peak load wave that i-th feeder line can bear Momentum SDi, formula (2) is done into equivalence transformation and is obtained:
After network switching state determines, SDiAlso it uniquely determines.Due to each feeder line SDiCalculating it is independent of one another, therefore Utilize SDiIn the algorithm different feeder lines can be arranged with different degrees of security constraint.Safety needed for feeder line where important load Nargin is denoted as SD_IF commonly greater than other feeder lines, the safety margin of these important feeder lines.Common important load includes that level-one is used Family load, essential industry load, hospital, bank server etc., when specific implementation, the embodiment of the present invention is without limitation.
2) it obtains average feeder line safe distance ASD (Average Security Distance), for showing that the whole network is comprehensive Safety margin horizontal safety situation, if power grid feeder line sum is n: in full simply connected network power grid, feeder line sum is equal to outlet load Sum is also equal to the dimension of operating point W.
3) minimum feeder line safe distance (Minimum Security Distance, MSD) is obtained.
As MSD > 0, indicate that all feeder lines of power grid, main transformer are all satisfied N-1 safety;As MSD < 0, absolute value representation After any main transformer or feeder line break down, peak load that power grid may be lost.
MSD=min { SD1,SD2,...SDn} (5)
203: the network reconfiguration model of safety indexes of the building based on distribution system security region;
Take the ratio of the total burden with power of distribution system network loss Zhan as objective function:
Wherein, m is power distribution network circuitry number;rjFor j-th strip branch impedance;IjFor the load current for flowing through j-th strip branch;kj For switch state, 0 is disconnects, and 1 is closure.For node i load active power.System losses F is obtained by Load flow calculation, due to Distribution line resistance and the ratio R of reactance/X value are larger, and algorithm quicksort possibly can not restrain, and the embodiment of the present invention, which is taken, to be pushed forward Back substitution method.
Formula (6) need to meet single feeder line safe distance SD constraint.Since SD is derived from the index of DSSR, the boundary meter of DSSR Calculation process has covered the branch current constraint and main transformer capacity constraint after N-1 failure, therefore all constraint can letter for formula (6) It turns to:
Wherein, Vi,minWith VI, maxRespectively indicate the bound of node i voltage;G needs to keep power distribution network after indicating network reconfiguration Radiation operation;SDi,minThe safe distance lower limit that need to meet for feeder line i.For convenient for mark, it is subsequent with vector SD=[SD1, SD2,...,SDn] indicate each feeder line safe distance, SDmin=[SD1,min,SD2,min,...,SDn,min] indicate under safe distance Limit.To SDminIn element take different numerical value can be realized different feeder lines to be arranged different security constraints.
Network reconfiguration model, the improved adaptive GA-IAGA process that the embodiment of the present invention is taken are solved using Revised genetic algorithum As shown in Fig. 1, the committed step in algorithm is described below.
1) individual UVR exposure;
The switch state on chromosome is encoded using binary coding strategy, 0 indicates to open, and 1 indicates closure.For Guarantee radial operation, the switch that only one is opened on every ring connection.The embodiment of the present invention is by a ring connection On all switch sets as a gene block, the gene block of each ring connection forms chromosome.As shown in Fig. 2.
Power distribution network is simply interconnected shown in Fig. 2, shares 6 feeder line F1…F6, total number of switches 8, therefore chromosome length is 8; 6 feeder lines form three simply connected networks (Single-ring network) altogether, therefore gene block has 3.
If disconnecting switch is 2,4,7, then current individual are as follows:
2) fitness function;
The network loss percentage (ratio of network loss and total burden with power) of general power distribution network is reciprocal between 0.01~0.08 Between 10~100, it is proper to do fitness function:
F is the target function value of formula (6), is obtained by Load flow calculation.(it need to meet single feedback to constraint condition is unsatisfactory for Line safe distance SD) individual, its fitness is reduced to 0 so that the individual can never be genetic in the next generation:
F'=f (meets constraint), and f'=0 (is unsatisfactory for constraining) (9)
Wherein, f is former fitness, and f' is the new fitness for considering constraint.Constraint herein is formula (7).
3) genetic manipulation;
Selection operation is the basic step of all genetic algorithms, and between algorithms of different and indifference, the purpose is to provide to hand over All objects of fork operation or mutation operation.Regulation crossover operation only occurs between the gene block of same position, not to it The gene block of its position has an impact, so as to avoid a large amount of infeasible solutions.
Mutation operation is still to occur in gene block.For the individual of operation to be morphed, randomly selects and morph Gene block, find genic value be 0 gene position, which is become 1, by its latter position gene (in same gene block) by 1 becomes 0.
Limitation intersects in this way and the purpose of mutation operation rule is: so that the topological structure of electric after network reconfiguration is still protected Radiation operation characteristic is held, a large amount of infeasible solution otherwise will be had in newborn individual.
Crossover probability PmWith variation PcThe value of probability significantly affects algorithmic statement.In order to avoid occurring evolving The case where early convergence is " precocity ", when group is when convergent tendency occurs in earlier stage, (cross and variation is grasped after selection operation Before work) improve Pc, reduce PmTo increase new individual.Initial pc、PmValue are as follows:
Pm=0.95, Pc=0.05 (10)
If when the number of iterations t < 40 and the maximum value of fitness f (x) continuous 5 generation remains unchanged, new P is selectedc', Pm':
Pm'=0.80, Pc'=0.15 (11)
4) optimal individual conserving method
After all individuals procreation of certain generation, need to carry out optimal individual conserving method.T for when, a*(t) For optimized individual in group, t+1 for when use a*(t) individual that fitness is minimum in A (t+1) group is replaced.Per generation group is all Above-mentioned optimal save strategy operation is carried out, ensure that the best individual of fitness is not destroyed, it can a degree of raising solution speed Degree.Distribution feeder number of switches is huge, and practical application is very high to the solving speed requirement of network reconfiguration, it is therefore necessary to draw Entering suitable most has individual conversation strategy.
If there is the individual that multiple fitness are minimum, replacing whole may destroy the gene diversity of population, cause to calculate Method Premature Convergence.The embodiment of the present invention sets 20% of individual amount no more than population at individual sum for participating in conversation strategy.
When group property meets the condition of convergence after several generations evolve, evolution terminates, and exports optimum individual, corresponding network The final scheme of reconstruct.
The calculating speed that network reconfiguration is fundamentally improved by above-mentioned operating procedure makes it meet power distribution network and supervises in real time The demand of control and operation.
Embodiment 3
Illustrate embodiments of the present invention with a power distribution network example below.Example takes the IEEE RBTS of transformation BUS4:1 feeder line quantity and feeder line contact scale) are increased;2) load is increased slightly, and is embodied high load and is run lower power grid approach The scene of N-1 security boundary;3) feeder line and main transformer capacity are adjusted, so that N-1 safety is feeder line, main transformer constrains jointly;4) it presents Line F7 and F16 contain important load, need bigger safety margin.Each section of line length is 0.5km.
1 main transformer data of table
2 feeder line data of table
1) security boundary calculates;
Example security boundary equation calculation is as follows.
2) safe distance vector SDminSetting
Due to SDminIt is the quantizating index for describing security constraint, the reconstruct side according to index size, in the embodiment of the present invention Method can be there are many security constraint strategy.The overall safety constraint strength of tactful 1-4 is continuously increased: strategy 1,3 is only for important Feeder line reinforces security constraint, and strategy 2,4 is the security constraint of unified each feeder line of the whole network, see Table 3 for details 1-3 row.
3 security constraint strategy 1-4 of table description and reconstruct front and back Comparative result (underscore italic is best, and italic is worst)
3) operational development genetic algorithm program solves
According to process shown in attached drawing 1, program is write based on MATLAB and is realized.
4) example reconstruction result is analyzed
The 4-8 row of table 1 illustrates reconstruct front and back safe distance and network loss situation, wherein SD_IF (important feeder line safety away from From) it is SD7And SD16Average value.In table 3 each index intuitive variation tendency as shown in figure 4, reconstruct after each feeder line safety away from From as shown in Figure 4.
From table 3 and Fig. 4:
1) safety of power grid is preferable before reconstructing, and important feeder line F7, F16 can be respectively subjected to the load of 0.5 and 1.3MVA Increment, but network loss is larger.The reconstruct of the different constraints policies of 4 kinds of the embodiment of the present invention can reduce network loss, and system is totally pacified Full property (ASD) does not reduce.
2) variation tendency and SD of MSDminUnanimously, this shows by adjusting SD the maximum value (the 3rd row of table 1) of elementmin's Value can improve the safety of system bottleneck element.
3) strategy 1 ensure that the safety margin (SD_IF) of important feeder line in the case where obtaining minimum network loss.Due to weight It wants the breakdown loss of feeder line bigger, improves economy so being also equivalent to the raising of SD_IF, therefore strategy 1 is well suited for being used for To the higher scene of cost-effectiveness requirement;Although tactful 4 network loss are larger, its every safety index is best, suitable safety The more demanding scene of property.
Fig. 5 gives the situation of change of this method average fitness and optimal fitness function value during evolution.
Since the algorithm flow of Different Strategies is identical, herein the case where exhibition strategy 1.Continuous operation optimizes program 20 Secondary, wherein obtaining optimal result (network loss 1.299%) for 11 times, arithmetic result is more stable.Group forms stable at 40 generation Optimum individual, 50 instead of evolve afterwards gradually restrains.Convergence rate is very fast, single calculation average time-consuming when Population is 100 355s (CPU2.66GHz, RAM 2GB), not precocious situation.
Bibliography
[1] Xiao, J., Gu, W., Wang, C., Li, F..Distribution system security region: Definition, model and security assessment [J] .IET Generation, Transmission& Distribution, 2012,6 (10): 1029-1035.
It will be appreciated by those skilled in the art that attached drawing is the schematic diagram of a preferred embodiment, the embodiments of the present invention Serial number is for illustration only, does not represent the advantages or disadvantages of the embodiments.
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all in spirit of the invention and Within principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.

Claims (3)

1. a kind of feeder reconfiguration methods in distribution system based on security domain, which is characterized in that the power distribution system network reconstruct side Method the following steps are included:
According to the safety indexes of distribution system security region, security boundary equation building distribution system security region;
Network reconfiguration model is obtained according to the safety indexes of the distribution system security region, in conjunction with genetic algorithm, by described Power distribution system network is reconstructed in network reconfiguration model, obtains the final switch state of the whole network;
Wherein, the network reconfiguration model specifically:
Wherein, m is power distribution network circuitry number;rjFor j-th strip branch impedance;IjFor the load current for flowing through j-th strip branch;kjTo open Off status, 0 is disconnects, and 1 is closure;For node i load active power;
Above formula meets the constraint of single feeder line safe distance, and the feature modeling process of distribution system security region has covered N-1 event Branch current constraint and main transformer capacity constraint after barrier, therefore all constraint can simplify above formula are as follows:
Wherein, Vi,minWith VI, maxRespectively indicate the bound of node i voltage;G needs to keep power distribution network radiation after indicating network reconfiguration Operation;SDiThe peak load undulate quantity that can bear for i-th feeder line;SDi,minThe safe distance lower limit that need to meet for feeder line i.
2. a kind of feeder reconfiguration methods in distribution system based on security domain according to claim 1, which is characterized in that described The step of constructing the safety indexes of distribution system security region according to distribution system security region, security boundary equation specifically:
Obtain single feeder line safe distance;
Obtain average feeder line safe distance and minimum feeder line safe distance respectively by the single feeder line safe distance.
3. a kind of feeder reconfiguration methods in distribution system based on security domain according to claim 2, which is characterized in that described According to the safety indexes of the distribution system security region, in conjunction with the step of genetic algorithm acquisition network reconfiguration model specifically:
Using all switch sets on ring connection as a gene block, the gene block of each ring connection forms chromosome;
Using the network loss percentage of power distribution network as fitness function, adapted to by the effect of constraint value of the single feeder line safe distance The value for spending function, screens chromosome;
Intersected by limitation and mutation operation generates new individual, while the topological structure of electric after network reconfiguration being made to keep spoke Penetrate operation characteristic;
Convergence speed of the algorithm is improved by optimal individual conserving method.
CN201510266477.9A 2015-05-22 2015-05-22 A kind of feeder reconfiguration methods in distribution system based on security domain Expired - Fee Related CN104866921B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510266477.9A CN104866921B (en) 2015-05-22 2015-05-22 A kind of feeder reconfiguration methods in distribution system based on security domain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510266477.9A CN104866921B (en) 2015-05-22 2015-05-22 A kind of feeder reconfiguration methods in distribution system based on security domain

Publications (2)

Publication Number Publication Date
CN104866921A CN104866921A (en) 2015-08-26
CN104866921B true CN104866921B (en) 2019-03-22

Family

ID=53912741

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510266477.9A Expired - Fee Related CN104866921B (en) 2015-05-22 2015-05-22 A kind of feeder reconfiguration methods in distribution system based on security domain

Country Status (1)

Country Link
CN (1) CN104866921B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105406472B (en) * 2015-12-22 2017-10-27 江苏省电力公司电力经济技术研究院 Based on the methods of calibration of intermediate distribution system main transformer N 1 that trouble free service is interval
CN107808256B (en) * 2017-11-20 2021-03-23 四川大学 Regional high-voltage distribution network supply transfer method based on opportunity constraint planning
CN109117651B (en) * 2018-07-27 2022-01-25 国网重庆市电力公司电力科学研究院 Metering data safety protection method
CN110417000B (en) * 2019-07-08 2023-03-31 国网天津市电力公司电力科学研究院 Power distribution security domain model construction method considering distributed power supply and demand response
CN112994010B (en) * 2021-01-27 2022-02-22 河海大学 AC/DC hybrid power distribution network security domain calculation method considering photovoltaic output fluctuation
CN113011710B (en) * 2021-02-22 2023-11-03 重庆大学 Extreme weather distribution network pre-scheduling method based on line fault result analysis
CN116307650B (en) * 2023-05-24 2023-07-25 东南大学溧阳研究院 Novel power distribution network source network load coordination random optimization operation method oriented to flexibility

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103400202A (en) * 2013-07-17 2013-11-20 天津大学 Distribution system security region boundary calculation method based on feeder interconnection relationship
CN103440521A (en) * 2013-08-21 2013-12-11 南昌大学 Coding and genetic algorithm suitable for power distribution network and application in distribution network reconfiguration
CN104362623A (en) * 2014-11-10 2015-02-18 国家电网公司 Multi-target network reestablishing method for active power distribution network

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102983573B (en) * 2012-11-09 2014-10-15 天津大学 Security constraint economic dispatch method based on security domains

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103400202A (en) * 2013-07-17 2013-11-20 天津大学 Distribution system security region boundary calculation method based on feeder interconnection relationship
CN103440521A (en) * 2013-08-21 2013-12-11 南昌大学 Coding and genetic algorithm suitable for power distribution network and application in distribution network reconfiguration
CN104362623A (en) * 2014-11-10 2015-02-18 国家电网公司 Multi-target network reestablishing method for active power distribution network

Also Published As

Publication number Publication date
CN104866921A (en) 2015-08-26

Similar Documents

Publication Publication Date Title
CN104866921B (en) A kind of feeder reconfiguration methods in distribution system based on security domain
Nguyen et al. Multi-objective electric distribution network reconfiguration solution using runner-root algorithm
CN106487005B (en) A kind of Electric power network planning method considering T-D tariff
Ganguly et al. A novel multi-objective PSO for electrical distribution system planning incorporating distributed generation
Hemmatpour et al. Optimum islanded microgrid reconfiguration based on maximization of system loadability and minimization of power losses
Queiroz et al. Adaptive hybrid genetic algorithm for technical loss reduction in distribution networks under variable demands
CN104037765B (en) The method of active power distribution network service restoration scheme is chosen based on improved adaptive GA-IAGA
Sanches et al. Multi-objective evolutionary algorithm for single and multiple fault service restoration in large-scale distribution systems
CN103136585B (en) Weighting Voronoi diagram substation planning method based on chaotic and genetic strategy
CN103036234B (en) Power distribution network anti-error optimization method
CN105069704B (en) A kind of quick traversal reconstruction method of power distribution network improving distributed generation resource permeability
Ashari et al. Power loss reduction strategy of distribution network with distributed generator integration
CN104820865B (en) Intelligent distribution network fault recovery intelligent optimization method based on graph theory
CN103457263B (en) Intelligent active power distribution network reestablishing method based on largest power supply capacity
CN105098762A (en) Island dividing method for power distribution network having distributed power sources
CN102801790A (en) Microgrid energy management system based on IEC (International Electrotechnical Commission) 61850 and multi-agent method
CN107800140A (en) A kind of large user for considering load characteristic, which powers, accesses decision-making technique
CN105305442B (en) Multiobjective Intelligent power distribution network self-healing recovery method based on quantum genetic algorithm
Karimianfard et al. An initial-point strategy for optimizing distribution system reconfiguration
CN108832615A (en) A kind of reconstruction method of power distribution network and system based on improvement binary particle swarm algorithm
CN104867062A (en) Low-loss power distribution network optimization and reconfiguration method based on genetic algorithm
CN107994582A (en) Reconstruction method of power distribution network and system containing distributed generation resource
CN108155649A (en) A kind of consideration probabilistic distribution network structure Fuzzy Programmings of DG
CN108649569A (en) Power distribution network based on the optimization of multi-joint network feeder switch can open capacity calculation methods
CN108270216A (en) A kind of Complicated Distribution Network fault recovery system and method for considering multiple target

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190322

Termination date: 20210522

CF01 Termination of patent right due to non-payment of annual fee