Judgment theorem of security boundary for distribution systems

Security boundary characterizes the operations range of a distribution system satisfying N-1 security, and this paper proposes three judgment theorems for it. Firstly, the relevant concepts of the security boundary are introduced. The security boundary represents the set of all the critical secure o...

Full description

Saved in:
Bibliographic Details
Main Authors: Jun Xiao, Heng Jiao, Chenhui Song, Guoqiang Zu, Chengjin Li, Zhongwei Cai, Buxin She
Format: Article
Language:English
Published: Elsevier 2024-02-01
Series:International Journal of Electrical Power & Energy Systems
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S0142061523008062
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1846157835780489216
author Jun Xiao
Heng Jiao
Chenhui Song
Guoqiang Zu
Chengjin Li
Zhongwei Cai
Buxin She
author_facet Jun Xiao
Heng Jiao
Chenhui Song
Guoqiang Zu
Chengjin Li
Zhongwei Cai
Buxin She
author_sort Jun Xiao
collection DOAJ
description Security boundary characterizes the operations range of a distribution system satisfying N-1 security, and this paper proposes three judgment theorems for it. Firstly, the relevant concepts of the security boundary are introduced. The security boundary represents the set of all the critical secure operating points in the state space of a distribution system. Based on the degree of criticality, it can be classified into two types, i.e., strict and non-strict boundaries. Secondly, the load relationships between interconnected feeders are defined, and based on this, three judgment theorems are proposed. Thirdly, the proposed theorems are rigorously proven. Finally, an IEEE RBTS test system is used to verify the proposed theorems and demonstrate their applications. The proposed theorems enable convenient judgment of whether an operating point is a security boundary point and its type. This work reveals the load distribution characteristics of security boundary points, providing fundamental contributions to security boundary theory.
format Article
id doaj-art-b30be6fe3ef34942a62b97e17a285da7
institution Kabale University
issn 0142-0615
language English
publishDate 2024-02-01
publisher Elsevier
record_format Article
series International Journal of Electrical Power & Energy Systems
spelling doaj-art-b30be6fe3ef34942a62b97e17a285da72024-11-25T04:40:42ZengElsevierInternational Journal of Electrical Power & Energy Systems0142-06152024-02-01156109749Judgment theorem of security boundary for distribution systemsJun Xiao0Heng Jiao1Chenhui Song2Guoqiang Zu3Chengjin Li4Zhongwei Cai5Buxin She6Key Lab of Smart Grid of Education Ministry, Tianjin University, Tianjin 300072, ChinaKey Lab of Smart Grid of Education Ministry, Tianjin University, Tianjin 300072, China; Corresponding author.School of Electrical and Information Engineering, Changsha University of Science and Technology, Changsha 410114, ChinaKey Lab of Smart Grid of Education Ministry, Tianjin University, Tianjin 300072, China; State Grid Tianjin Electric Power Research Institute, Tianjin 300384, ChinaKey Lab of Smart Grid of Education Ministry, Tianjin University, Tianjin 300072, ChinaNorth Sub-center of State Grid Customer Service Center, Tianjin 300309, ChinaDepartment of Electronic Engineering and Computer Science, The University of Tennessee, Knoxville, TN 37996, USASecurity boundary characterizes the operations range of a distribution system satisfying N-1 security, and this paper proposes three judgment theorems for it. Firstly, the relevant concepts of the security boundary are introduced. The security boundary represents the set of all the critical secure operating points in the state space of a distribution system. Based on the degree of criticality, it can be classified into two types, i.e., strict and non-strict boundaries. Secondly, the load relationships between interconnected feeders are defined, and based on this, three judgment theorems are proposed. Thirdly, the proposed theorems are rigorously proven. Finally, an IEEE RBTS test system is used to verify the proposed theorems and demonstrate their applications. The proposed theorems enable convenient judgment of whether an operating point is a security boundary point and its type. This work reveals the load distribution characteristics of security boundary points, providing fundamental contributions to security boundary theory.http://www.sciencedirect.com/science/article/pii/S0142061523008062Distribution systemJudgment theoremN-1Security boundary
spellingShingle Jun Xiao
Heng Jiao
Chenhui Song
Guoqiang Zu
Chengjin Li
Zhongwei Cai
Buxin She
Judgment theorem of security boundary for distribution systems
International Journal of Electrical Power & Energy Systems
Distribution system
Judgment theorem
N-1
Security boundary
title Judgment theorem of security boundary for distribution systems
title_full Judgment theorem of security boundary for distribution systems
title_fullStr Judgment theorem of security boundary for distribution systems
title_full_unstemmed Judgment theorem of security boundary for distribution systems
title_short Judgment theorem of security boundary for distribution systems
title_sort judgment theorem of security boundary for distribution systems
topic Distribution system
Judgment theorem
N-1
Security boundary
url http://www.sciencedirect.com/science/article/pii/S0142061523008062
work_keys_str_mv AT junxiao judgmenttheoremofsecurityboundaryfordistributionsystems
AT hengjiao judgmenttheoremofsecurityboundaryfordistributionsystems
AT chenhuisong judgmenttheoremofsecurityboundaryfordistributionsystems
AT guoqiangzu judgmenttheoremofsecurityboundaryfordistributionsystems
AT chengjinli judgmenttheoremofsecurityboundaryfordistributionsystems
AT zhongweicai judgmenttheoremofsecurityboundaryfordistributionsystems
AT buxinshe judgmenttheoremofsecurityboundaryfordistributionsystems