skip to main content
10.1145/3558819.3565465acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccsieConference Proceedingsconference-collections
research-article

Research on Self-healing Control Function of Smart Distribution Network based on Security Domain

Authors Info & Claims
Published:26 October 2022Publication History

ABSTRACT

Distribution network is an urban infrastructure, which is of great significance to the safety of urban power supply. Self-healing control is an effective means to solve the safe operation of distribution network and has become a hot research topic in the field of distribution. Combining DSSR and TSC theory with self-healing control system, this paper proposes a safe and efficient operation mode of distribution network based on security domain. The self-healing control system based on security domain is presented, the preventive control, predictive control and optimization control based on DSSR and TSC are proposed, and these functions are demonstrated by an example of a real distribution network. Self-healing control emphasizes initiative, and the safety domain theory gives the direction and measurement of load control. Preventive control or predictive control is adopted to ensure the operation of the power grid in the safety domain, so as to ensure the safety and reliability of power supply can be improved greatly.

References

  1. AMIN M. Toward self-healing energy in frastructure systems [J]. IEEE Computer Applications in Power, 2021, 14(1) :20-28.Google ScholarGoogle ScholarCross RefCross Ref
  2. A. Elmitwally, M. Elsaid, M. Elgamal, and Z. Chen, ‘‘A fuzzy-multiagent self-healing scheme for a distribution system with distributed generations, ’’IEEE Trans. Power Syst., vol.30, no.5, pp. 2612–2622,Sep.2015.Google ScholarGoogle ScholarCross RefCross Ref
  3. LIU Changliang, CAO Wei, WANG Ziqi. Short-term interval prediction of wind power based on fuzzy C-means soft clustering condition identification[J]. Journal of North China Electric Power University, 2019, 46(5): 83-91.Google ScholarGoogle Scholar
  4. BITARAF H, RAHMAN S. Reducing curtailed wind energy through energy storage and demand response[J]. IEEE Transactions on Sustainable Energy, 2018, 9(1): 228-236.Google ScholarGoogle ScholarCross RefCross Ref
  5. W. Li, Y. Li, M. Zhang, Y. Deng, J. Li, Q. Zhu, L. Zhang, and S. Zhang, ‘‘A fully decentralized multi-agent fault location and isolation for distribution networks with DGs, ’’ IEEE Access, vol. 9, pp. 27748–27757, 2021.Google ScholarGoogle ScholarCross RefCross Ref
  6. LIU Xiaocong, WANG Beibei, LI Yang, Stochastic unit commitment model for high wind power integration considering demand side resources[J]. Proceedings of the CSEE, 2015, 35(14): 3714-3723.Google ScholarGoogle Scholar
  7. KONG Qiang, FU Qiang, LIN Tingjun, Optimal peak-valley time-of-use power price model based on cost-benefit analysis[J]. Power System Protection and Control, 2018, 46(15): 60-67.Google ScholarGoogle Scholar
  8. ZENG Zhenda, WU Jiekang, TAO Feida, Fuzzy C-means clustering method for evaluating aging characteristics of transformer oil[J]. Guangdong Electric Power, 2018, 31(10): 73-81.Google ScholarGoogle Scholar
  9. W. Li, Y. Tan, Y. Li, Y. Cao, C. Chen, and M. Zhang, ‘‘A new differential backup protection strategy for smart distribution networks: A fast and reliable approach, ’’ IEEE Access, vol. 7, pp. 38135–38145,2019.Google ScholarGoogle ScholarCross RefCross Ref
  10. J. Kennedy, P. Ciufo, and A. A galgaonkar, ‘‘A review of protection systems for distribution networks embedded with renewable generation, ’’Renew. Sustain. Energy Rev., vol. 58, pp. 1308–1317, May 2016.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Research on Self-healing Control Function of Smart Distribution Network based on Security Domain

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICCSIE '22: Proceedings of the 7th International Conference on Cyber Security and Information Engineering
      September 2022
      1094 pages
      ISBN:9781450397414
      DOI:10.1145/3558819

      Copyright © 2022 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 26 October 2022

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)13
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format