Académique Documents
Professionnel Documents
Culture Documents
I.
JNTRODUCTI0N
II. JVlETHODOLOGY
Consider the simple distribution network of Figure 1 which
consists of three radial feeders connected to a substation
transformer and a group of switches in their initial, open or
closed, positions. Although the methodology is illustrated for
this simple network where feeders are connected to the same
transformer (source), the approach is general and applicable to
cases where feeders are supplied from different substation
transformers (different sources). The example presented later in
the paper indicates the application of the method when three
separate sources are involved. Network loads, assumed
constant, are represented by voltage dependent current
injections at the network nodes.
0885-8977~11/$3
.WO1992 IEEE
953
12
."
A
-xFigure 1.
I'"
Closedswitch
I
Openswitch
Example distribution
configuration)
network (initial
\ 12
I
I
I
954
Now, assume that the closed switches are fully adjustable ideal
current sources that can be used to modify flows in network
branches. In the network, a flow pattern that would minimize
overall system current overloads, "Secure Flow Pattern", can be
reached by adjusting these fictitious current sources. An
efficient algorithm for determining the secure flow pattern is
described in Appendix A. Note that currents in the radial
sections of the feeder can not be altered and only the loop
currents can be modified for this purpose.
Once the secure flow pattern is known the magnitude of the
fictitious current sources (representing network switches) can be
determined. Using this information, the switch carrying the
least current under the secure flow pattern is opened, eliminating
one of the network loops. The switch to be opened is selected in
this fashion in order to incur a minimum disturbance in the
secure flow pattern of the network.
16
17
955
~~~~
In. RESULTS
Figure 6.
ouerations)
Initial load:
Feeder 4
InitiaI load:
6786 lcW
(W)
Figure 7.
Initial load:
956
In case 1, only one of the adjacent feeders (feeder 2) is
considered for picking up the isolated loads -- feeders 3 and 4 are
not included in the study. In this case, feeder 2 is unable to pick
up all the isolated load without violating its ampacity limits.
Table 1 shows the results of this case study. Note that in this
example only two of the three switches between feeders 1 and 2
are useful in transferring load between the two feeders.
IV. CONCLUSIONS
This paper describes a heuristic technique for the reconfiguration
of distribution networks to restore service to isolated portions
of a distribution feeder and its successful implementation in a
computer model. Test results indicate that the proposed
technique is computationally robust and efficient; hence,
suitable for both planning and operations studies. Also, in
conjunction with fast computers, data acquisition facilities and
remotely controlled switches the model may be used for on-line
applications in distribution automation.
ACKNOWLEDGEMENTS
Author withes to thank Wayne Hong and Ben Mesa for their
useful and valuable suggestions and comments in the
development and implementation of the proposed methodology.
REFERENCES
[ l ] US. Department of Energy Report: "Development of
Advanced Methods for Planning Electric Energy
Distribution Systems," Contract ET-78-C-03-1845,
Prepared by Systems Control, Inc., February 1980.
[2] T. Taylor, D. Lubkeman, "Implementation of Heuristic
Search Strategies for Distribution Feeder Reconfiguration,"
IEEE Transactions on Power Delivery, January 1990, pp.
239-246.
[3] A.L. Morelato, A. Monticelli, "Heuristic Search Approach
to Distribution System Restoration," IEEE Transactions on
Power Delivery, bctober 1989, pp. 2235-2241.
[4] M.E. Baran, F.F. Wu, "Network Reconfiguration in
Distribution Systems for Loss Reduction and Load
Balancing," IEEE Transactions on Power Delivery, April
1989, pp. 1401-1407.
=1
=-I
=O
957
if the branch b starts from the node p
if the branch b ends at the node p
if the branch b is not connected to node p
: Number of branches in E
end of branches in E )
and superscripts r and i denote the real and imaginary
components, respectively.
The nodal currents injections are accurately calculated from the
nodal power injections using the AC power flow technique
described in [9].
Equation (1) can be decoupled into real and imaginary
components and rewritten as:
bE B
subject to [A]
f=f
and;
subject to [A]
f=f
where,
(3-4
subject to [A] 1 = I
b e B
and:
where,
Lb
: Length of branch b
Jb=
fb+ jfb
R
Jb
1 = f+j
bE B
r
i
where hand Lare the row vectors of Langrangian multipliers
1= f+jf
[AI
me:
958
purely resistive network, whose branch resistances are equal to
k4 = 0
for all b E E
where p and q denote the two nodes of the branch b. Summing
equation (5) over all the network loops yields:
bE B
and
b e B
Multiplying (6-b) by the operator j and adding it to equation
(6-a) yields:
bE B
or,
b e B
Equation (7) is the Kirchhoff Voltage Law (KVL) for the network
loops with the branch impedances replaced by resistances whose
values are w b as defined in equation (2-c). Hence, the secure flow
pattern can be determined by solving the KCL and the KVL of a
b.
The solution procedure for determining the secure flow pattern of
the meshed network can be summarized as follows: