2018
DOI: 10.1049/iet-gtd.2017.0820
|View full text |Cite
|
Sign up to set email alerts
|

Distribution network reconfiguration comprehensively considering N −1 security and network loss

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0
2

Year Published

2019
2019
2023
2023

Publication Types

Select...
9

Relationship

2
7

Authors

Journals

citations
Cited by 24 publications
(11 citation statements)
references
References 22 publications
0
9
0
2
Order By: Relevance
“…The concept of distribution system security region (DSSR) was first proposed in [16]. Afterwards, the model [17], algorithm [18], topological characteristics [19] and implementation [20]- [22] of DSSR were step-by-step studied for the traditional distribution networks without SOPs. Existing researches have shown that the region-based method is effective for the security operation of distribution network.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The concept of distribution system security region (DSSR) was first proposed in [16]. Afterwards, the model [17], algorithm [18], topological characteristics [19] and implementation [20]- [22] of DSSR were step-by-step studied for the traditional distribution networks without SOPs. Existing researches have shown that the region-based method is effective for the security operation of distribution network.…”
Section: Literature Reviewmentioning
confidence: 99%
“…where β k .is the boundary which an OP will cross over in the direction of feeder i; i is the set of β k . The absolute value of SD means the maximum increasable load or the minimum load shedding on feeder i, or on the feeders of which the ID appearing in the expression of the nearest boundary to the OP in the direction of feeder i (the closely related feeders of feeder i for short in the later section) [19]. According to the definition of SD, it is necessary to express each security boundary first.…”
Section: Distribution System Security Distancementioning
confidence: 99%
“…Several ways of implementing congestion management measures for a secure grid operation have been reported in literature such as switching actions and therefore changes in the grid topology [24], usage of power flow controlling devices [57] as well as using the flexibility of energy producers [8] or consumers [9], respectively.…”
Section: Introductionmentioning
confidence: 99%