JAM Journal of Applied Mathematics 1687-0042 1110-757X Hindawi Publishing Corporation 10.1155/2014/327078 327078 Research Article Model and Topological Characteristics of Power Distribution System Security Region Xiao Jun Zu Guo-qiang Gong Xiao-xu Wang Cheng-shan Chiang H. D. Key Laboratory of Smart Grid of Ministry of Education Tianjin University Nankai District Tianjin 300072 China tju.edu.cn 2014 2372014 2014 16 01 2014 28 06 2014 24 7 2014 2014 Copyright © 2014 Jun Xiao et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

As an important tool of transmission system dispatching, the region-based method has just been introduced into distribution area with the ongoing smart distribution grid initiatives. First, a more accurate distribution system security region (DSSR) model is proposed. The proposed model is based on detailed feeder-interconnected topology, and both substation transformer and feeder N-1 contingencies are considered. Second, generic characteristics of DSSR are discussed and mathematically proved. That is, DSSR is a dense set of which boundary has no suspension and can be expressed by several union subsurfaces. Finally, the results from both a test case and a practical case demonstrate the effectiveness of the proposed modeling approach; the shape of DSSR is also illustrated by means of 2- and 3-dimensional visualization. Moreover, the DSSR-based assessment and control are preliminary illustrated to show the application of DSSR. The researches in this paper are fundamental work to develop new security region theory for future distribution systems.

1. Introduction

This paper presents a model of power distribution system security region (DSSR) which takes both substation transformer and feeder N-1 contingencies into account. Meanwhile, main topological characteristics of DSSR are also discussed and mathematically proved.

DSSR is a newly proposed concept originated from N-1 security guideline [1, 2]. DSSR is defined as the set of all operating points that make the distribution system N-1 secure, taking into account the capacities of substation transformers, network topology, network capacity, and operational constraints. Traditional method of security assessment and control focused on service restoration in which load transfer scheme is made on case by case N-1 test [3, 4]. However, the “point-wise” simulation method only provides the binary information of security and insecurity, which causes global information and description of the security boundary to fail to be obtained . Moreover, with the number of interconnected feeders growing in distribution systems, especially in urban areas, the simulation time of “point-wise” method that has to be calculated online is highly prohibitive. In contrast, the “region” method has advantages in dealing with the problems above.

In transmission system, the research on security region has made substantial achievements. Author of  described the topological characteristics for security region and defined the practical model for engineering application. However, the “region” method has scarcely been applied in distribution area. Because early systems were little more than an extension of SCADA beyond the substation fence, most operations of 10 or 20 kV feeders required a high degree of human intervention . Plus, without high speed peer-to-peer communication system, a wealth of key operation information cannot be timely received by dispatchers, which limited the actual contribution of “region” method. Distribution automation (DA) is an important concept included in smart distribution grid and will upgrade the distribution systems to fully information-based systems [10, 11]. That is a motivation for researchers to perform the research on “region” method aiming at distribution system.

References [12, 13] proposed the concept of loadability. It is defined as the maximum loading level that can be supplied. Loadability is similar to the proposed “region” concept. However, because of not considering N-1 cases, the concept is not suitable for urban system where N-1 security is a high concern.

Total supply capability (TSC) is a newly proposed concept which is defined as the capability that a system can supply the load when the N-1 security for distribution systems is considered [14, 15]. At the TSC point, the facilities in the system are usually fully utilized. Although some TSC results can be used as the points of DSSR boundary , TSC fails to describe the integrated boundary. Moreover, TSC cannot obtain the relative location of an operating point in security region, which is very useful for dispatchers to make decisions. In a word, TSC is more suitable to be applied in planning than operating process.

Author of  made attempt to present a simplified model and approach of security assessment with the concept of DSSR. But the papers exposed 2 main defects: ( 1 ) only the load of substation transformers and their rated capacities are formulated, which provide relatively limited information on the system status; ( 2 ) feeder contingency and maintenance are ignored although feeder contingency occurs much more frequently than transformer contingency.

The DSSR theory has potential applications. However, some wrong conclusions will be reached if the topological characteristics of DSSR are not studied. Paper  designed an N-1 approximating approach to study the characteristics of DSSR. But those characteristics have not been proved by rigorous mathematical method and some of them are inaccurately described.

This paper proposes a more accurate DSSR model. The mathematical proof for the characteristics of DSSR is also performed. Finally, a test case and a practical case are both selected to testify the proposed model.

2. Basic Concept and Method 2.1. N-1 Security for Distribution System

The DSSR concept is based on contingency scenarios. Feeder contingency and substation transformer contingency are two main scenarios considered in security analysis. Here, if a distribution system is feeder N-1 secure, it means that when a fault occurs at outlet of any main feeder, the corresponding load can be transferred to other feeders with a series of tie-switch operations. Meanwhile, all components in the system operate normally without overload or overvoltage. Similarly, if a distribution is substation transformer N-1 secure, it means that when a fault occurs at any substation transformer, the corresponding load can be transferred to other transformers with all the components satisfying the operation constraints. The load of a transformer can be transferred in two ways: one way is to be transferred to the adjacent transformers in the same substation with bus-tie switches; the other way is to be transferred to other substations by tie-switch operations among feeders.

2.2. Load Transfer and Concept of DSSR

Feeders in traditional medium-voltage network are not completely automated. When a fault occurs at a substation transformer, load will be only transferred to adjacent transformers in the same substation, even though feeders form connection between substations. Manual performing for complex circuit-restoration switching takes time and is not performed in practical operation. Thus, it causes a lower load ratio of substation transformers, which also means a conservative utilization of assets.

However, development of smart distribution grid has greatly promoted the level of feeder automation, especially in some core urban area. Distributed intelligence and automated switching accomplish the task, that is, to transfer load among different substations quickly, accurately, and flexibly. In other words, switches that the planner formerly could not tie can now be tied, resulting in higher load ratio within security constraints. This draws the attention to a more accurate calculation of security boundary. Figure 1 shows the load transfer mode after feeder automation (FA).

As is shown in Figure 1, when a fault occurs at T1, in traditional way, all of the load of T1 will be only transferred to T2, because the time of load transfer through feeders is too long. In contrast, with feeder automation, the load of T2 can be transferred not only to T1, but also to T3 in another substation.

The DSSR model in this paper takes both substation transformer N-1 and feeder N-1 contingency into account. The DSSR is defined as the set of operating points which assure the N-1 security of distribution system. An operating point in transmission system is the current power injections of nodes, while, in distribution system, it represents a set of transfer unit load. Consider (1) W = ( S f 1 , S f 2 , , S f n ) T , where W    is the operating point, which is an n-dimension vector; S f i is transfer unit load. “Transfer unit” is defined as the set of feeder sections of which load has the same back-feed (transfer) path. If two feeders form single loop network, transfer unit load is equivalent to feeder load. If a feeder is connected to two other feeders, which is called two-tie connection, the feeder load can be divided into two parts of load, each of which is a transfer unit load. In this paper, feeder load i is denoted by S F i and transfer unitload i is denoted by S f i . Take the brief case in Figure 2 as an example.

In Figure 2, feeder 1 forms two-tie connection and feeder 2 and feeder 3 form single loop network, respectively, with feeder 1. In normal state, S f 1 and S f 2 are both supplied by feeder 1; that is, S F 1 = S f 1 + S f 2 . When a fault occurs at outlet of feeder 1, S1 and S2 disconnect and S4 closes, and then S f 1 changes to be supplied by feeder 3, while S f 2 is supplied by feeder 2 via closing S3. Transfer scheme is usually not unique. Another scheme is that transferring both S f 1 and S f 2 to feeder 2 by disconnecting S1 and closing S3. However, multischeme makes the DSSR model overcomplicated. Thus, scheme is fixed in this paper, which stipulates that each of the backup feeders restores only one section of the whole faulted feeder, as the first scheme above. More important, this fixed scheme can usually balance the branch load in the postfault network, which is an important index concerned by dispatchers.

The DSSR model in this paper is accurate to the safety monitoring of transfer unit load. We can certainly get feeder load by summing up the transfer unit load and further get transformer load by summing up the feeder load. This is a basis for DSSR model considering both transformer N-1 and feeder N-1 security.

3. Mathematical Model for DSSR

After the load transfer incurred by tie switches against N-1 contingency, all the transformers and feeders cannot be overloading. Since the tie-line is designed after the radial network planning, the capacity is considered as enough to transfer load. Therefore, the transformer load and feeder load should be under a series of constraints. The DSSR model can be mathematically formulated as (2) Ω DSSR = { W h ( x ) 0       g ( x ) = 0 } , where W = ( S f 1 , S f 2 , , S f n ) T is the operating point corresponding to S f 1 , S f 2 , , S f n . The inequality and equality constraints are such that (3) S F m = n = 1 S f , t r m , n , (4) S f , t r m , n + S F n S F , max n ( m , n ) , (5) S T , t r i , j = m Φ ( i ) , n Φ ( j ) S f , t r m , n , (6) S T i = m Φ ( i ) S F m ( i ) , (7) S T , t r i , j + S T j S T , max j , where S F m = all the load supplied by feeder m; S f , t r m , n = the load transferred from feeder m to feeder n when an N-1 fault occurs at outlet of feeder m; S F , max n = maximal thermal capacity of feeder n ; S T , t r i , j = the load transferred from transformer i to transformer j when an N-1 fault occurs at transformer i ; Φ ( i ) = the set of feeders that derive from transformer i ; S T j = all of the load supplied by transformer i ; m Φ ( i ) means that feeder m derives from the corresponding bus of transformer i ; S T , max i = the rated capacity of transformer i .

It is notable that the correspondence relation of “ S f , t r ” and “ S f ” depends on the load transfer scheme. For example, in Figure 2, in the former scheme, S f , t r 1,2 = S f 2 ; in the latter scheme, S f , t r 1,2 = S f 1 + S f 2 .

Equation (3) shows that the sum of each load to be transferred away from feeder m should be equal to the total load supplied by feeder m in normal state; inequality constraint (4) means that feeders cannot be overloading in the postfault network; (5) shows that path of load transferred from transformer i to j is the tie-lines between transformers i and j . Equation (6) means that load of transformer is equal to the sum of corresponding feeder loads; inequality constraint (7) describes that the load of transformer j cannot exceed its rated capacity after a substation transformer N-1 contingency.

It should be pointed out that power flow and voltage drop are not taken into consideration in this DSSR model, which determines that the DSSR model is completely linear. Since overloading under contingencies is the most critical problem in urban power, the simple linear model is acceptable from the standpoint of security-based operation . More importantly, research of  has demonstrated that the DSSR model is approximately linear even when considering factors of power flow and voltage drop, which further proves that the linear model is highly approximate to the real DSSR model.

4. Formulation for DSSR Boundary

Research on the boundary of security region has vital significance, because the characteristics determine the application way of DSSR theory . The proposed DSSR model, which is formulated as (2)–(7), cannot distinctly express the DSSR boundary. Therefore, derivation should be performed to transform the original model to a new expression form. Select S f , t r u , v as research object, u Φ ( i ) and v Φ ( j ) . First, formula (4) can be transformed to (8) S f , t r u , v S F , max v - S F v . Second, substitute formulas (5) and (6) into (7), and then perform identical deformation. We obtain (9) 0 S T , max j - t Φ ( j ) S F t - m Φ ( i ) , n Φ ( j ) S f , t r m , n . Third, add S f , t r u , v on both sides of formula (9), and then (10) S f , t r u , v S T , max j - t Φ ( j ) S F t - m Φ ( i ) , n Φ ( j ) , m u , n v S f , t r m , n . Finally, according to (8) and (10), the expression of DSSR boundary in direction of S f , t r u , v can be neatly formulated as (11) S f , t r u , v min { S F , max v - S F v , S T , max j - t Φ ( j ) S F t - m Φ ( i ) , n Φ ( j ) m u , n v S f , t r m , n } .

There are n boundaries if the system consists of n load transfer units. To express the dimension of boundary clearly, we denote all “ S f , t r u , v ” by S f , t r 1 , S f , t r 2 , , S f , t r n . Because the transfer scheme in this paper is fixed, as is illustrated in Section 2.2, an important equivalence holds as follows: (12) S f , t r i = S f i ( i = 1,2 , , n ) .

Through (12), S f , t r and S f have one-to-one corresponding relation. Above all, the complete and succinct boundary formulation for DSSR is expressed as (13) Ω DSSR = { B 1 B 2 B i B n = { S f 1 min { S F , max b 1 - S F b 1 , S T , max b 1 - j Φ ( b 1 ) S F j - k 1 , k Θ ( 1 ) S f k } S f 2 min { S F , max b 2 - S F b 2 , S T , max b 2 - j Φ ( b 2 ) S F j - k 2 , k Θ ( 2 ) S f k } S f i min { S F , max b i - S F b i , S T , max b i - j Φ ( b i ) S F j - k i , k Θ ( i ) S f k } S f n min { S F , max b n - S F b n , S T , max b n - j Φ ( b n ) S F j - k n , k Θ ( n ) S f k } . With the form transformation of DSSR model, corresponding symbols and their meaning should be adjusted too. Thus, b i and Θ ( i ) are used for new expression. b i = the number of back-feed feeders of S f i ; S F b i = all of the load supplied by the back-feed feeder b i ; Θ ( i ) = the set of transfer unit loads, of which both normal-feed and back-feed transformer are the same as those of S f i . It should be pointed out that feeder b 1 feeder b n are not n different actual feeders. Take the case in Figure 2 as an example again; when fault occurs, the back-feed feeders of S f 3 and S f 4 are both feeder 1, which means feeder b3 = feeder b4 = feeder 1. When any equality in (13) holds, the operating point is just upon the DSSR boundary. We denote the n boundaries by B 1 , , B n .

The DSSR boundary formulation can also reflect both substation transformer and feeder N-1 secure constraints. Take i subformula of (13) to concretely explain; S f i S F , max b i - S F b i shows that transfer of S f i cannot cause the feeder overloading, which ensures that the feeder N-1 is secure; S f i S T , max b i - j Φ ( b i ) S F j - k 1 , k Θ ( i ) S f k shows that transfer of S f i cannot lead to the substation transformer overloading, which ensures that the transformer N-1 is secure.

5. Topological Characteristics of DSSR and Mathematical Proof

The research on differential topological characteristics of the DSSR focuses on several aspects as follows.

Are there any holes inside the DSSR, that is, the denseness in terms of the topology?

Does the boundary of the DSSR have suspension?

Could the boundary of the DSSR be expressed with the union of several subsurfaces?

The identical deformation from formulas (2)–(7) to (13) is a breakthrough for the research on topological characteristics of the DSSR. However, to research on these characteristics, formula (13) should be further simplified to obtain the mathematical essence. Take i subformula of (13) as research object; the equivalent form is (14) S f i + S F b i S F , max b i , S f i + j Φ ( b i ) S F j + k 1 , k Θ ( i ) S f k S T , max b i . According to formulas (3) and (12), S F b i and S F j can be expressed as linear combination of a series of different element “ S f .” Then, formula (14) will be simplified as (15) m = 1 n α m S f m S F , max b i , m = 1 n β m S f m S T , max b i , where S F , max b i and S T , max b i are positive constants. Through formula (14), coefficients α and β have the following features: (16) α m = 1 , β m = 1 ( m = i ) , α m = 0 or 1 , β m = 0 or 1 ( m i ) . Let Ω DSSR be a set which consists of operating point W . DSSR boundary formulation can be abstracted as (17) A W C , where W is a vector defined as formula (1). Through formulas (15)-(16), matrices A and C should satisfy (18) A = [ a i j ] 2 n × n , i 1 , j 1 , a i j = 1 ( i = 2 j - 1    or    i = 2 j ) , a i j = 0 or 1 , ( i 2 j - 1 , i 2 j ) , C = [ c 1 , c 2 , c 2 n ] T , C R + . Because one integrated subformula is divided into equivalent two parts, as is shown in formula (15), the dimension of A is 2 n × n instead of n × n . Here, Ω DSSR is both linear space and Euclidean space, which has been proved in . Besides this important premise, we should review some preparation definitions and theorems about topology and Euclidean space, including cluster point, closure, dense set, and hyperplane.

Definition 1 (cluster point).

Let x be a point in Euclidean space, F R . If there is a point sequence in set F converging to x , then x is the cluster point of set F .

Definition 2 (closure).

A is a subset of topological space; A ¯ represents all the points inside A and cluster points of A , and then A ¯ is called closure of A .

Theorem 3.

If the B is a subset of A , B ¯ = A , then B is dense in A .

Theorem 4.

Let L be a subspace of linear space R ; x 0 is a fixed vector which does not belong to L generally. Considering set H which consists of the vector x , x is obtained by (19) x = x 0 + y , where vector y varies in the whole subspace L . Thus, H is called hyperplane. The dimension of H equals that of subspace L .

The topological characteristics of DSSR are mathematically proved in the following section.

Characteristic 1. The Ω DSSR is dense inside.

Proof.

First, a new set Ω DSSR is defined as the set of all points of Ω DSSR except those on boundaries. Ω DSSR meets (20) A W < C . Select randomly a vector W = ( S f 1 , S f 2 , , S f n ) T from Ω DSSR , and then construct a sequence Y = { Y 1 , Y 2 , , Y m , } as the following formula: (21) Y = { Y 1 = ( S f 1 - S f 1 1 , S f 2 - S f 2 1 , , S f n - S f n 1 ) T i i i i = ( 0,0 , , 0 ) T Y 2 = ( S f 1 - S f 1 2 , S f 2 - S f 2 2 , , S f n - S f n 2 ) T Y m = ( S f 1 - S f 1 m , S f 2 - S f 2 m , , S f n - S f n m ) T i = ( 1 - 1 m ) W . According to (20)-(21), we obtain (22) A Y m = A ( 1 - 1 m ) W < A W < C . Therefore, sequence Y = { Y 1 , Y 2 , , Y m , } is inside Ω DSSR . Let ρ ( W , Y m ) be the distance between W and Y m in Euclidean space, and then (23) lim m ρ ( W , Y m ) = lim m i = 1 n [ S f i - ( S f i - S f i m ) ] 2 = 0 . This means that, for any vector W in Ω DSSR , sequence Y exists and converges to W , and Y is also inside Ω DSSR . Therefore, any point inside Ω DSSR is cluster point of Ω DSSR .

Similarly, select vector Z = ( S f 1 , S f 2 , , S f n ) T    which is just upon boundary of ΩDSSR: (24) A Z = C . Construct a sequence U = { U 1 , U 2 , , U m , } : (25) U m = ( 1 - 1 m ) Z . Then we obtain (26) A U m = A ( 1 - 1 m ) Z < A Z = C . According to formula (26), sequence U is also inside Ω DSSR . Through the following (27) lim m ρ ( Z , Y m ) = lim m i = 1 n [ S f i - ( S f i - S f i m ) ] 2 = 0 . We obtain that any point just upon the Ω DSSR boundary is also cluster point of Ω DSSR . Above all, cluster points of Ω DSSR include not only all the points inside Ω DSSR but also all the points just upon the boundaries of Ω DSSR . Thus, the following formula holds: (28) Ω DSSR ¯ = Ω DSSR . Through Theorem 3, Ω DSSR is dense in Ω DSSR . This proof is completed.

Characteristic 2. The boundary of Ω DSSR has no suspension.

Proof.

This characteristic can be approximately simplified to prove that any 2-dimension cross-section of Ω DSSR is convex polygon. For W = ( S f 1 , S f 2 , , S f n ) T , select a 2-dimension cross-section by taking S f m and S f n as variables and S f in another dimension as constants. According to formula (16), the coefficient of S f (including variable S f and constant ones) can be only 1 or 0; thus, in process of dimension reduction, S f m and S f n are simply constrained by (29) S f m + S f n c 1 , 0 S f m c 2 , 0 S f n c 3 , c 1 , c 2 , c 3 R + . The shape of 2-dimension cross-section varies with the values of c 1 , c 2 , and c 3 , as is shown in Figure 3. The dashed oblique line represents S f m + S f n c 1 .

As is shown in Figure 3, the shapes of 2-dimension section are confined to rectangle, triangle, ladder, and convex pentagon. This means that any 2-dimension section of DSSR is convex polygon, which proves that the boundary of Ω DSSR has no suspension in an indirect way. The proof is completed.

Shapes of 2-dimension cross-section of DSSR.

Characteristic 3. The Ω DSSR boundary can be expressed with several subsurfaces.

Proof.

H is a set of vector W = ( S f 1 , S f 2 , , S f n ) T , each of which satisfies nonhomogeneous linear equation set (30) A W = C , where matrices A and C meet formula (18) and W is the operating point just upon the boundary of Ω DSSR . Let W 0 = ( θ 1 ( 0 ) , θ 2 ( 0 ) , , θ n ( 0 ) ) T be a fixed solution of equation set (31). Meanwhile, L is a subspace of R , which consists of y = ( λ 1 , λ 2 , , λ n ) T ; that is, y varies in the whole subspace L . The coordinates of y meet the following homogeneous linear equation set: (31) A y = 0 .

If y = ( λ 1 , λ 2 , , λ n ) T is a solution of (31), W = W 0 + y = ( θ 1 ( 0 ) + λ 1 , θ 2 ( 0 ) + λ 2 , , θ n ( 0 ) + λ n ) T is obviously a solution of equation set (30); that is, W is included in set H . Meanwhile, x 0 is not in L . Through Theorem 3, H is hyperplane. The boundary of Ω DSSR can be expressed with hyperplane, that is, several subsurfaces. Because the dimension of L is n , the dimension of hyperplane is also n . This proof is completed.

In transmission area, topological characteristics of security region (SR) have been deeply studied . It has shown that the boundary of SR has no suspension and is compact and approximately linear; there is no hole inside the SR. The proof above demonstrates that characteristics of DSSR are similar but it has its own features.

DSSR is a convex set of denseness in terms of the topology. This means that DSSR has no holes inside and its boundary has no suspension. Based on this feature, dispatchers can analyze the security of operating point by judging whether the point is inside the DSSR boundary, without being afraid of any insecure point inside or losing security points.

DSSR boundary can be described by hyperplane (several Euclidean subsurfaces); meanwhile, the boundary is more linear than that of SR. In practical application, calculation of high dimensional security region will incur great computation burdens and consume large amount of time. Therefore, this characteristic will improve the computational efficiency.

6. Case Study

In order to verify the effectiveness of the proposed model, two cases are illustrated in this section. The first one is a test case, and the second is a practical case.

6.1. Test Case 6.1.1. Overview of Test Case

As is shown in Figure 4, the grid is comprised of 4 substations, 8 substation transformers, and 75 feeders. 68 feeders form 34 single loop networks, and 7 form two-tie connections, resulting in 82 load transfer units. The total capacity of substations is 412 MVA. To illustrate the modeling process clearly, each load transfer unit is numbered. Case profile is shown in Table 1.

Profile of test case.

Substation Transformer Voltages (kV/kV) Transformer capacity (MVA) Number of feeders Total feeder capacity (MVA)
S1 T1 35/10 40.0 9 80.28
T2 35/10 40.0 9 80.28

S2 T3 35/10 40.0 9 80.28
T4 35/10 40.0 8 71.36

S3 T5 110/10 63.0 10 89.2
T6 110/10 63.0 10 89.2

S4 T7 110/10 63.0 10 89.2
T8 110/10 63.0 10 89.2

Test case with eight substation transformers.

The conductor type of all feeders is LGJ-185 (8.92 MVA). This type is selected based on the national electrical code in China.

6.1.2. Boundary Formulation

The test case grid has 75 feeders; 14 feeders form 7 two-tie connections. Each load of these 7 feeders can be divided into 2 parts to transfer in different back-feed path. So the number of load transfer units is 82, which means that the dimension of operation point W is 82 and the number of subformulas of DSSR boundary is 82. Based on the topology of the test case, we substitute the rated capacity of substation transformers and feeders into S F , max 1 , , S F , max n and S T , max 1 , , S T , max n of formula (13). Then, the boundary formulation for DSSR of test case can be expressed as (32) Ω DSSR = { S f 1 min { 8.92 - ( S f 76 + S f 36 ) , 63 - ( S f 36 + S f 37 + S f 38 + S f 39 + S f 40 + S f 41 + S f 42 + S f 43 + S f 44 + S f 45 + S f 76 + S f 77 + S f 78 ) - ( S f 2 + S f 3 + S f 4 + S f 5 ) } S f 2 min { 8.92 - ( S f 37 + S f 77 ) , 63 - ( S f 36 + S f 37 + S f 38 + S f 39 + S f 40 + S f 41 + S f 42 + S f 43 + S f 44 + S f 45 + S f 76 + S f 77 + S f 78 ) - ( S f 1 + S f 3 + S f 4 + S f 5 ) } S f 3 min { 8.92 - ( S f 38 + S f 78 ) , 63 - ( S f 36 + S f 37 + S f 38 + S f 39 + S f 40 + S f 41 + S f 42 + S f 43 + S f 44 + S f 45 + S f 76 + S f 77 + S f 78 ) - ( S f 1 + S f 2 + S f 4 + S f 5 ) } S f 4 min { 8.92 - S f 39 , 63 - ( S f 36 + S f 37 + S f 38 + S f 39 + S f 40 + S f 41 + S f 42 + S f 43 + S f 44 + S f 45 + S f 76 + S f 77 + S f 78 ) - ( S f 1 + S f 2 + S f 3 + S f 5 ) } S f 5 min { 8.92 - S f 40 , 63 - ( S f 36 + S f 37 + S f 38 + S f 39 + S f 40 + S f 41 + S f 42 + S f 43 + S f 44 + S f 45 + S f 76 + S f 77 + S f 78 ) - ( S f 1 + S f 2 + S f 3 + S f 4 ) } S f 82 min { 8.92 - S f 51 , 63 - ( S f 46 + S f 47 + S f 48 + S f 49 + S f 50 + S f 51 + S f 52 + S f 53 + S f 54 + S f 55 ) - S f 81 } .

Considering the similarity of calculation approach of each boundary and thesis length, we present 5 subformulas of S f 1 , , S f 5 here. Complete formulation is given in the appendix (in the Supplementary Material available online at http://dx.doi.org/10.1155/2014/327078). Take the first subformula in (32) as an example to explain the modeling process. Figure 5 shows the local topology related with S f 1 , including all relative transfer units in the first subformula.

Local topology related with f 1.

First, analyze the topology and determine the parameters of formula (13). We know that back-feed feeder of S f 1 is feeder 36 and the back-feed substation transformer of S f 1 is T5. In normal state, S f 36 , , S f 45 and S f 76 , , S f 78 are all load of T5, which means j Φ ( b 1 ) S F j = j = 36 45 S f j + j = 76 78 S f j ; S f 36 and S f 76 are load of feeder 36, which means S F b 1 = S f 36 + S f 76 . S f 2 , , S f 5 are the load transferred from T1 to T5 when fault occurs at T1, which means k 1 , k Θ ( 1 ) S f k = k = 2 5 S f k . Therefore, the formula of B 1 is preliminary expressed as (33) S f 1 min { S F , max 36 - ( S f 76 + S f 36 ) , h h h h h h h h h S T , max 5 - ( S f 36 + S f 37 + S f 38 + S f 39 + S f 40 + S f 41 S f 42 h h h h h h h h h h h h h h h h + S f 43 + S f 44 + S f 45 + S f 76 + S f 77 + S f 78 ) h h h h h h h h h - ( S f 2 + S f 3 + S f 4 + S f 5 ) } . Second, according to case profile, substitute S F , max 36 = 8.92 MVA and S T , max 5 = 63 MVA, into formula (33), and then we obtain (34) S f 1 min { 8.92 - ( S f 76 + S f 36 ) , h h h h h h h h h 63 - ( S f 36 + S f 37 + S f 38 + S f 39 + S f 40 + S f 41 S f 42 h h h h h h h h h h h h h h + S f 43 + S f 44 + S f 45 + S f 76 + S f 77 + S f 78 ) h h h h h h h h h - ( S f 2 + S f 3 + S f 4 + S f 5 ) } .

6.1.3. Visualization and Topological Characteristics

To visualize the shape of DSSR, the dimension is reduced to 2 and 3, which means that the coordinates of W should be constants other than those to be visualized. Thus, an operating point has to be predetermined to provide the constants. TSC is a special operating point just upon the security boundary , on which the facilities are usually fully utilized. The operation of distribution system is closing to the boundaries and load level is reaching TSC. Thus, in this test case, we select the TSC point as the predetermined operating point W T S C , which is shown in Table 2. The calculation approach for TSC has been presented in .

Transfer unit load of W T S C in test case.

1 2.88
2 2.88
3 2.88
4 2.88
5 2.88
6 1.64
7 1.64
8 1.64
9 1.64
10 2.88
11 2.88
12 3.17
13 3.17
14 3.17
15 3.17
16 3.17
17 3.00
18 3.00
19 3.17
20 3.17
21 3.47
22 3.47
23 3.11
24 3.11
25 3.11
26 3.47
27 3.47
28 3.47
29 3.47
30 2.80
31 2.80
32 1.61
33 1.61
34 1.61
35 1.61
36 2.80
37 2.80
38 2.80
39 2.80
40 2.52
41 3.29
42 2.52
43 3.29
44 2.52
45 3.29
46 2.88
47 2.88
48 3.95
49 3.95
50 3.95
51 4.46
52 4.46
53 4.46
54 4.46
55 5.64
56 5.64
57 5.69
58 5.69
59 5.92
60 5.92
61 5.33
62 5.33
63 3.59
64 3.59
65 5.13
66 5.13
67 4.94
68 4.94
69 4.46
70 4.46
71 4.46
72 4.46
73 4.46
74 4.46
75 4.46
76 4.46
77 2.80
78 2.80
79 2.80
80 2.80
81 2.80
82 2.80

Choose randomly transfer unit loads S f 15 and S f 52 to observe. Substitute the rated capacity of transformers T1~T6, capacity of all feeders, and all transfer unit loads other than S f 15 and S f 52 , into formula (32). Then the 2D DSSR shown in Figure 6 is obtained.

Shape of 2D DSSR.

Although the dimension is 2, the number of subformulas which constrain the figure shape is not just 2. In fact, each of the subformulas which contains S f 15 or S f 52 should be considered. But the subformulas with more severe constraints will cover the others and finally form the DSSR boundary. The final formulation of 2D figure is (35) 0 S f 15 5.2 , 0 S f 52 3 .

Similarly, we choose randomly transfer unit loads S f 19 , S f 24 , and S f 32 to observe, and then the 3D DSSR is obtained, as is shown in Figure 7.

Shape of 3D DSSR.

In Figure 6, it can be seen that the 2D DSSR is a dense rectangle, of which boundaries are linear without suspension. In Figure 7, the 3D DSSR is surrounded by several subplanes, forming a convex pentagon, that is, a special 3-dimension hyperplane.

6.2. Practical Case

In this section, the assessment and control method based on DSSR is demonstrated on a real medium-voltage distribution network of one city in southern China, which consists of 12 substations, 26 substation transformers, and 114 main feeders, as is shown in Figure 8. Total capacity of substation transformers is 1094.5 MVA. It is notable that each two of all main feeders form a single loop network in this case, which leads to the fact that the number of main feeders is equal to that of load transfer units.

The medium-voltage urban power grid of one city of southern China.

Paper  has presented concept and calculation method of relative location of operating point in DSSR based on substation transformer contingency. Similarly, in this paper, relative location L i describes the distance from the operating point W to the boundary B i ( i = 1,2 , , n ) : (36) L i = min { S F , max b i - S F b i , S T , max b i - j Φ ( b i ) S F j - k i , k Θ ( i ) S f k } - S f i .

L i is an index which is applied in security assessment. Here is an example. Let W 1 be an insecure operating point. Each transfer unit load of W 1 is 0.8 times of TSC load in the practical case, except S f 1 and S f 10 , while S f 1 = 8  MVA and S f 10 = 7  MVA. Total load of W 1 is 508.7 MVA, while TSC is 628.9 MVA. Average load rate is 0.46. That means that current operating point can be controlled back to security region. Through formula (36), the location of a given operating point in DSSR can be calculated. We present the B i of which L i are negative in Table 3.

Distance to boundaries of B 1 and B 10 at W 1 .

B i B 1 B 10
L i (MVA) 0.778 0.778

Table 3 shows that the system should lose 3.222 MVA if fault occurs at feeder 1 or feeder 10, so the system is locally overloading. The location of W 1 can be easily observed in Figure 9. To meet operational constraints under N-1 contingency, S f 1 and S f 10 should be adjusted. For example, W 1 is adjusted to W 1 ' through the dashed arrow shown in Figure 9. The location of W 1 ' is shown in Table 4.

Distance to boundaries of B 1 and B 10 at W 1 .

B i B 1 B 10
L i (MVA) 0.778 0.778

2D DSSR cross-section and preventive control.

7. Conclusion and Further Work

This paper proposes a mathematical model for distribution system security region (DSSR); generic topological characteristics of DSSR are discussed and proved.

First, the operating point for a distribution system is defined as the set of transfer unit loads, which is a vector in the Euclidean space. Then, the DSSR model for both substation transformer and feeder contingency is proposed, which is the set of all operating points; each ensures that the system N-1 is secure.

Second, to perform research on the characteristic of DSSR, the boundary formulation for DSSR is derived from the DSSR model. Then, three generic characteristics are proposed and proved by rigor mathematical approach, which are as follows: ( 1 ) DSSR is dense inside; ( 2 ) DSSR boundary has no suspension; ( 3 ) DSSR boundary can be expressed with the union of several subsurfaces.

Finally, the results from a test case and a practical case demonstrate the effectiveness of the proposed model. The visualization for DSSR boundary is also discussed to verify the topological characteristics of DSSR. Security assessment method based on DSSR is preliminary exhibited to show the applicability of DSSR for future smart distribution system.

This paper improves the accuracy and understanding of DSSR, which is fundamental theoretic work for future smart distribution system. Further works to improve the accuracy of DSSR model include fully considering power flow, voltage constraints, and integration of DGs.

Conflict of Interests

The authors declare that there is no conflict of interests regarding the publication of this paper. None of the authors have a commercial interest, financial interest, and/or other relationship with manufacturers of pharmaceuticals,laboratory supplies, and/or medical devices or with commercialproviders of medically related services.

Acknowledgments

This work was supported by the National Natural Science Foundation of China (no. 51277129) and National High Technology Research and Development Program of China (863 Program) (no. 2011AA05A117).

Xiao J. Gu W. Wang C. Li F. Distribution system security region: definition, model and security assessment IET Generation, Transmission & Distribution 2012 6 10 1029 1035 10.1049/iet-gtd.2011.0767 2-s2.0-84867120255 State Grid Corporation of China Guidelines of Urban Power Network Planning Beijing, China State Grid Corporation of China 2006 (Chinese) Lakervi E. Holmes E. J. Electricity Distribution Network Design 1995 Peregrinus, UK IET Miu K. N. Chiang H. D. Service restoration for unbalanced radial distribution systems with varying loads: solution algorithm 1 Proceedings of the IEEE Power Engineering Society Summer Meeting 1999 254 258 Yu Y. X. Security region of bulk power system 1 Proceedings of the International Conference on Power System Technology (PowerCon '02) October 2002 Kunming, China 13 17 10.1109/ICPST.2002.1053495 Wu F. Kumagai S. Steady-state security regions of power systems IEEE Transactions on Circuits and Systems 1982 29 11 703 711 10.1109/TCS.1982.1085091 MR691228 2-s2.0-0020207779 Yu Y. Zeng Y. Feng F. Differential topological characteristics of the DSR on injection space of electrical power system Science in China E. Technological Sciences 2002 45 6 576 584 MR1962936 2-s2.0-0042306449 Chen S. J. Chen Q. X. Xia Q. Kang C. Q. Steady-state security assessment method based on distance to security region boundaries IET Generation, Transmission & Distribution 2013 7 3 288 297 10.1049/iet-gtd.2012.0288 2-s2.0-84880650830 Staszesky D. M. Craig D. Befus C. Advanced feeder automation is here IEEE Power and Energy Magazine 2005 3 5 56 63 10.1109/MPAE.2005.1507027 2-s2.0-27744486888 Smallwood C. L. Wennermark J. Benefits of distribution automation IEEE Industry Applications Magazine 2010 16 1 65 73 10.1109/MIAS.2009.934970 2-s2.0-74549130420 Mamo X. Mallet S. Coste T. Grenard S. Distribution automation: the cornerstone for smart grid development strategy Proceedings of the IEEE Power & Energy Society General Meeting (PES '09) July 2009 1 6 Sauer P. W. Lesieutre B. C. Pai M. A. Maximum loadability and voltage stability in power systems International Journal of Electrical Power & Energy Systems 1993 15 3 145 153 10.1016/0142-0615(93)90029-M 2-s2.0-0027615472 Miu K. N. Chiang H. Electric distribution system load capability: problem formulation, solution algorithm, and numerical results IEEE Transactions on Power Delivery 2000 15 1 436 442 10.1109/61.847286 2-s2.0-0033720152 Luo F. Z. Wang C. S. Xiao J. Ge S. Rapid evaluation method for power supply capability of urban distribution system based on N-1 contingency analysis of main-transformers International Journal of Electrical Power and Energy Systems 2010 32 10 1063 1068 10.1016/j.ijepes.2010.01.021 2-s2.0-77956344178 Xiao J. Li F. X. Gu W. Z. Wang C. S. Zhang P. Total supply capability and its extended indices for distribution systems: definition, model calculation and applications IET Generation, Transmission and Distribution 2011 5 8 869 876 10.1049/iet-gtd.2010.0769 2-s2.0-79960777313 Xiao J. Gong X. X. Wang C. S. Topology properties and algorithm of N-1 security boundary for smart grid Proceedings of the CSEE 2014 34 4 545 554 Shilov G. E. An Introduction to the Theory of Linear Spaces 1975 New York, NY. USA Dover MR0435096 Munkres J. R. Topology 2000 2 Upper Saddle River, NJ, USA Prentice Hall