Font Size: a A A

Research On Active Distribution Network Reconfiguration From The Perspective Of Vulnerability Assessment

Posted on:2022-08-14Degree:MasterType:Thesis
Country:ChinaCandidate:W X KongFull Text:PDF
GTID:2492306323455264Subject:Electrical engineering
Abstract/Summary:PDF Full Text Request
In the context of the transition and development of low-carbon energy,a large number of distributed generation(DG)has been merged into the traditional distribution network.The access of DG not only makes the active distribution network more flexible,but also helps to reduce the active power loss in the network,improve the energy efficiency of energy operation,and also improve the power quality of the power grid.In order to optimize the operation of the distribution network in the case of DG access,the method of reconfiguration of the distribution network can be adopted.However,this measure will change the topological structure,and in severe cases will lead to weak links in the distribution network.Take it into consideration.Therefore,this paper presents a research method for the optimization of active distribution network reconfiguration considering system fragility.The main work contents are as follows:First,based on the characteristics of the distribution network,a scheme for improving the vulnerability of the distribution network is given;secondly,in order to obtain the DG gridconnected system,considering the active power loss and the system status vulnerability,a method is given to consider the vulnerability of the system.DG optimization configuration plan;then,use the jellyfish search algorithm to build and solve the distribution network model with the goal of minimizing the network loss to test its optimization performance;finally,in order to enhance the stability of the optimized system,consider the fragility of the system in the model.A reconstruction model with the goal of active power loss,voltage offset and system fragility is established,and a multi-objective jellyfish search algorithm based on Pareto optimization is used to solve the model.
Keywords/Search Tags:Vulnerability assessment, Optimal configuration, Multi-objective reconstruction, Node hierarchical-power flow calculation, Multi-objective Jellyfish Search Algorithm
PDF Full Text Request
Related items