Judgment theorem of security boundary for distribution systems
Security boundary characterizes the operations range of a distribution system satisfying N-1 security, and this paper proposes three judgment theorems for it. Firstly, the relevant concepts of the security boundary are introduced. The security boundary represents the set of all the critical secure o...
        Saved in:
      
    
          | Main Authors: | , , , , , , | 
|---|---|
| Format: | Article | 
| Language: | English | 
| Published: | Elsevier
    
        2024-02-01 | 
| Series: | International Journal of Electrical Power & Energy Systems | 
| Subjects: | |
| Online Access: | http://www.sciencedirect.com/science/article/pii/S0142061523008062 | 
| Tags: | Add Tag 
      No Tags, Be the first to tag this record!
   | 
| _version_ | 1846157835780489216 | 
|---|---|
| author | Jun Xiao Heng Jiao Chenhui Song Guoqiang Zu Chengjin Li Zhongwei Cai Buxin She | 
| author_facet | Jun Xiao Heng Jiao Chenhui Song Guoqiang Zu Chengjin Li Zhongwei Cai Buxin She | 
| author_sort | Jun Xiao | 
| collection | DOAJ | 
| description | Security boundary characterizes the operations range of a distribution system satisfying N-1 security, and this paper proposes three judgment theorems for it. Firstly, the relevant concepts of the security boundary are introduced. The security boundary represents the set of all the critical secure operating points in the state space of a distribution system. Based on the degree of criticality, it can be classified into two types, i.e., strict and non-strict boundaries. Secondly, the load relationships between interconnected feeders are defined, and based on this, three judgment theorems are proposed. Thirdly, the proposed theorems are rigorously proven. Finally, an IEEE RBTS test system is used to verify the proposed theorems and demonstrate their applications. The proposed theorems enable convenient judgment of whether an operating point is a security boundary point and its type. This work reveals the load distribution characteristics of security boundary points, providing fundamental contributions to security boundary theory. | 
| format | Article | 
| id | doaj-art-b30be6fe3ef34942a62b97e17a285da7 | 
| institution | Kabale University | 
| issn | 0142-0615 | 
| language | English | 
| publishDate | 2024-02-01 | 
| publisher | Elsevier | 
| record_format | Article | 
| series | International Journal of Electrical Power & Energy Systems | 
| spelling | doaj-art-b30be6fe3ef34942a62b97e17a285da72024-11-25T04:40:42ZengElsevierInternational Journal of Electrical Power & Energy Systems0142-06152024-02-01156109749Judgment theorem of security boundary for distribution systemsJun Xiao0Heng Jiao1Chenhui Song2Guoqiang Zu3Chengjin Li4Zhongwei Cai5Buxin She6Key Lab of Smart Grid of Education Ministry, Tianjin University, Tianjin 300072, ChinaKey Lab of Smart Grid of Education Ministry, Tianjin University, Tianjin 300072, China; Corresponding author.School of Electrical and Information Engineering, Changsha University of Science and Technology, Changsha 410114, ChinaKey Lab of Smart Grid of Education Ministry, Tianjin University, Tianjin 300072, China; State Grid Tianjin Electric Power Research Institute, Tianjin 300384, ChinaKey Lab of Smart Grid of Education Ministry, Tianjin University, Tianjin 300072, ChinaNorth Sub-center of State Grid Customer Service Center, Tianjin 300309, ChinaDepartment of Electronic Engineering and Computer Science, The University of Tennessee, Knoxville, TN 37996, USASecurity boundary characterizes the operations range of a distribution system satisfying N-1 security, and this paper proposes three judgment theorems for it. Firstly, the relevant concepts of the security boundary are introduced. The security boundary represents the set of all the critical secure operating points in the state space of a distribution system. Based on the degree of criticality, it can be classified into two types, i.e., strict and non-strict boundaries. Secondly, the load relationships between interconnected feeders are defined, and based on this, three judgment theorems are proposed. Thirdly, the proposed theorems are rigorously proven. Finally, an IEEE RBTS test system is used to verify the proposed theorems and demonstrate their applications. The proposed theorems enable convenient judgment of whether an operating point is a security boundary point and its type. This work reveals the load distribution characteristics of security boundary points, providing fundamental contributions to security boundary theory.http://www.sciencedirect.com/science/article/pii/S0142061523008062Distribution systemJudgment theoremN-1Security boundary | 
| spellingShingle | Jun Xiao Heng Jiao Chenhui Song Guoqiang Zu Chengjin Li Zhongwei Cai Buxin She Judgment theorem of security boundary for distribution systems International Journal of Electrical Power & Energy Systems Distribution system Judgment theorem N-1 Security boundary | 
| title | Judgment theorem of security boundary for distribution systems | 
| title_full | Judgment theorem of security boundary for distribution systems | 
| title_fullStr | Judgment theorem of security boundary for distribution systems | 
| title_full_unstemmed | Judgment theorem of security boundary for distribution systems | 
| title_short | Judgment theorem of security boundary for distribution systems | 
| title_sort | judgment theorem of security boundary for distribution systems | 
| topic | Distribution system Judgment theorem N-1 Security boundary | 
| url | http://www.sciencedirect.com/science/article/pii/S0142061523008062 | 
| work_keys_str_mv | AT junxiao judgmenttheoremofsecurityboundaryfordistributionsystems AT hengjiao judgmenttheoremofsecurityboundaryfordistributionsystems AT chenhuisong judgmenttheoremofsecurityboundaryfordistributionsystems AT guoqiangzu judgmenttheoremofsecurityboundaryfordistributionsystems AT chengjinli judgmenttheoremofsecurityboundaryfordistributionsystems AT zhongweicai judgmenttheoremofsecurityboundaryfordistributionsystems AT buxinshe judgmenttheoremofsecurityboundaryfordistributionsystems | 
 
       