Skip to main content
Log in

Methods to Search for Configurations of Distribution Networks

  • ROBUST, ADAPTIVE AND NETWORK CONTROL
  • Published:
Automation and Remote Control Aims and scope Submit manuscript

Abstract

The problem of finding the complete set of admissible configurations of a distribution network is considered. When solving this problem, the tools of graph theory are used to find the limit graphs. A new method for finding the complete set of limit graphs is proposed, and a number of properties of this method and its soundness are proved. The efficiencies of various methods are compared on a qualitative level, and it is shown that our method is distinguished by a considerably higher computational speed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.
Fig. 2.
Fig. 3.

Similar content being viewed by others

REFERENCES

  1. Phyu, E.E., Lin, K.M., and Moe, T.T., Loss reduction and reliability improvement of industrial distribution system through network reconfiguration, Int. J. Energy Power Eng., 2018, vol. 12, no. 11, pp. 822–828.

    Google Scholar 

  2. Sudhakara Reddy, A.V. and Satish Kumar Reddy, M., Network reconfiguration of distribution system for loss reduction using GWO algorithm, Int. J. Electr. Comput. Eng., 2017, vol. 7, no. 6, pp. 3226–3234.

    Google Scholar 

  3. Sedighizadeh, M., Esmaili, M., and Mahmoodi, M., Reconfiguration of distribution systems to improve reliability and reduce power losses using imperialist competitive algorithm, Iran. J. Electr. & Electron. Eng., 2017, vol. 13, no. 3, pp. 287–302.

    Google Scholar 

  4. Sambaiah, K.S., A review on optimal allocation and sizing techniques for DG in distribution systems, Int. J. Renewable Energy Res., 2018, vol. 8, no. 3, pp. 1236–1256.

    Google Scholar 

  5. Landeros, A. and Koziel, S., Distribution network reconfiguration using feasibility-preserving evolutionary optimization, J. Mod. Power Syst. Clean Energy, 2019, vol. 7, no. 3, pp. 589–598.

    Article  Google Scholar 

  6. Kayal, V. and Chanda, C.K., A simple and fast approach for allocation and size evaluation of distributed generation, Int. J. Energy Environ. Eng., 2013, vol. 4, no. 7, pp. 2–10.

    Google Scholar 

  7. Christine, E. and Doig, C., Analysis on voltage stability indices, Master Thesis, Aachen, Germany: RWTH Aachen Univ., 2012.

  8. Grebenyuk, G.G. and Krygin, A.A., Algorithms for optimization of the number of switchings in heat supply networks reconfiguration, Autom. Remote Control, 2007, vol. 68, no. 12, pp. 2187–2197.

    Article  MathSciNet  Google Scholar 

  9. Grebenyuk, G.G. and Krygin, A.A., Limit Graphs in Structural Optimization of Modes in Distribution Networks, Autom. Remote Control, 2015, vol. 76, no. 1, pp. 120–132.

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to G. G. Grebenyuk or A. A. Krygin.

Additional information

Translated by V. Potapchouck

APPENDIX

Proof of Assertion 1. Consider component \(I \) in the output array. It is a forest, because the connectedness of each tree is accounted for by construction, and the lack of cycles is guaranteed by the cloning procedure and the lack-of-cycles check (item 2.3.1). In accordance with prime initialization (Step 0), \(I\) contains all consumer vertices, and each tree in a component contains a source vertex, since it is only in this case that the component is placed in the output array. Consequently, the component \(I \) and the \(W \) subgraph constructed based on it are configuration graphs. It is obvious that for each limit graph one can explicitly indicate the sequence of selecting descendant vertices (item 2.2) which leads to the appearance of this graph in the output array. In accordance with the assertion proved in [8] and given above (Assertion 2), only the complete set of limit graphs will be left after the absorption check. The proof of Assertion 1 is complete. \(\quad \blacksquare \)

Proof of Assertion 2. Let us prove this assertion for the following case:

  1. Select one consumer vertex.

  2. We will construct components while ignoring the vertex selected; i.e., we will skip all actions in the method that are related to it.

  3. When no active vertices are left except for the one selected, we will continue constructing the components by considering the paths from the vertex selected.

Let us show that the output arrays in this case and in the component construction method coincide. Let \(M\) be the maximum length of the path to the source vertex among all consumer vertices except the one selected. Consider the graph \(\varGamma \) obtained from the initial graph \(H\) by the following principle: a “tail” of \(M\) ordinary vertices (not switching nodes) connected in series is added to the selected consumer vertex. The component construction method will give the same, up to the “tail,” results for \(\varGamma \) as for \(H \). On the other hand, the sequence of selecting consumer vertices in the component construction method for \(\varGamma \) will be the same as in the case described.

To generalize this reasoning, it is obvious that the output array will not change if such “tails” are added to several consumer vertices, while the length of the tails can be arbitrary. Thus, each consumer vertex can be “connected” at any step of the component method. In a similar way, it can be shown that the order in which the components are selected at Step 1 is not important. The proof of Assertion 2 is complete. \(\quad \blacksquare \)

Proof of Assertion 3. The component \(I \) of the output array is a limit graph, because it is a forest. Let us prove the assertion by showing that under the stated conditions on the branching vertices, the \(W \) subgraph constructed based on \(I \) will coincide with \(I \). Consider a tree \(T \) in \(I \) and any edge of the original graph for which one of the incident vertices belongs to \(T\) (we denote it by \(t \)) and the other does not (we denote it by \(q \)). Let us show that vertex \(q \) is a vertex of the set \(C \). If \(t\in U \), then its degree is strictly greater than two: at least two edges belong to the tree plus the edge in question; that is, \(t \) is a branching vertex, and it is surrounded by switching nodes. If \(t\in S\), then, by the properties of the graphs considered, \(q\in C\), and \(t \) cannot be a consumer vertex, because its only edge belongs to \(I \). By the construction of the \(W \) subgraph, these vertices of the set \(C \) are removed. It follows that the \(W \) subgraph constructed based on \(I \) coincides with \(I \). The proof of Assertion 3 is complete. \(\quad \blacksquare \)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Grebenyuk, G.G., Krygin, A.A. Methods to Search for Configurations of Distribution Networks. Autom Remote Control 82, 772–779 (2021). https://doi.org/10.1134/S0005117921050039

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1134/S0005117921050039

Keywords

Navigation