A security analysis method for active distribution network based on safety distance
A technology of safety distance and safety analysis, applied in the direction of electrical components, circuit devices, AC network circuits, etc., can solve the problem of not distinguishing between the safety boundary and the state space boundary, unable to intersect with the boundary, and the change of the state quantity of the working point is not completely reflected, etc. question
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0060] A security analysis method for active distribution network based on safety distance, see figure 1 , the method includes the following steps:
[0061] 101: Construct the full-quadrant security domain of the active distribution network, and the security boundary of the active distribution network composed of N-0 and N-1 security constraints when taking the equal sign;
[0062] 102: Obtain the spatial geometric distance of the working point moving from one position a to another position b, and the change amount of the system state;
[0063] 103: Define the shortest / longest safety distance, the shortest / longest safety distance in the safety zone, the vertical safety distance, and the axial safety distance;
[0064] 104: Calculate the shortest geometric safety distance, the longest geometric safety distance, the shortest and longest state safety distance, the shortest and longest safety distance in the safety domain, the vertical safety distance, the axial safety distance, ...
Embodiment 2
[0083] Combined with the specific calculation formula, figure 2 , image 3 1. Examples further introduce the scheme in Example 1, see the following description for details:
[0084] 201: Active distribution network security boundary;
[0085] The calculation of the safety distance needs to be based on the full quadrant safety region (TQSR) model of the active distribution network [10] , the model is as follows:
[0086] Ω TQSR ={W=[P L1 ,...,P Lm ,P DG1 ,...,P DGn ]∈Θ
[0087] State Space Range Constraints:
[0088]
[0089] Normal operation constraints:
[0090]
[0091] N-1 security constraints:
[0092]
[0093] In formula (1), W represents the working point, Θ represents the state space; P Li is the load L i Power; P DGi Distributed power supply DG i output; for L i , the value range of i is 1~m, for DG i , the value range of i is 1~n; P Li,max and P DGi,max means L i Power and DG i Output upper limit; P Bi means line B i power, Ω(B i ) ...
Embodiment 3
[0199] The following combined with specific examples, Figure 4 , Figure 5 The scheme in embodiment 1 and 2 is carried out feasibility verification, see the following description for details:
[0200] 1. Basic situation of the example
[0201] exist Figure 4In the example of active distribution network, the line capacity is set to 1MVA, and the load power range is [0,1.5]MVA. In order to study access to a high proportion of DG, expand the range of DG output to [-1,0]MVA.
[0202] Two, the implementation steps of the present invention
[0203] (1) Safety boundary calculation results
[0204] Security Boundary:
[0205] N-0: boundary B1+ is P L2 = 1
[0206]
[0207] Security boundary B is composed of N-0 and N-1 security boundaries.
[0208] Among them, B1+, B2+, B3+ are positive power flow boundaries, B4- is reverse power flow boundaries; B1+, B2+ are also straight line boundaries, and B3+, B4- are also oblique line boundaries. It should be noted that each bound...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


