2022
DOI: 10.1016/j.ijepes.2021.107793
|View full text |Cite
|
Sign up to set email alerts
|

Coordinated operation strategy of distribution network with the multi-station integrated system considering the risk of controllable resources

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 30 publications
0
2
0
Order By: Relevance
“…Assuming that I describes the total current on the low-voltage side of the transformer in the new distribution station area, and the current set of three-phase users is described by a I , b I and c I respectively [5][6], then:…”
Section: Analysis Of Load Security Region In Realizing New Distributi...mentioning
confidence: 99%
“…Assuming that I describes the total current on the low-voltage side of the transformer in the new distribution station area, and the current set of three-phase users is described by a I , b I and c I respectively [5][6], then:…”
Section: Analysis Of Load Security Region In Realizing New Distributi...mentioning
confidence: 99%
“…On the downlink side, EPON is a way to broadcast messages to individual ONUs in an OLT. In the uplink direction, EPON is a multipoint-to-multipoint network that utilizes time multiplexing (TDM) technology to divide the entire effective uplink channel bandwidth into transmission units that can be assigned to activate ONUs [21]. In this distribution network access system, the protection method of the distribution network can be realized in case of fiber interruption or OLT failure, but the choice of OLT is mainly ONU.…”
Section: Distribution Network Communication System Using Epon Technologymentioning
confidence: 99%
“…In recent years, the reliability of the power supply has become an indispensable requirement for the development of DN (Cheng et al, 2021). However, DNs are vulnerable to attacks since most of them are directly exposed in the field and rely on widely configured communication devices for information interaction (Zhang et al, 2020).…”
Section: Introductionmentioning
confidence: 99%