SlideShare a Scribd company logo
1 of 55
Towards Self-Healing In
Distribution Networks
Operation:
Bipartite Graph
Modelling For
Automated Switching
Introduction
- Prisha
Concept of Self Healing
The capability to:
■ Identify
■ Diagnose
■ Recover
from system disruptions with the objective of maximizing:
■ System availability
■ Survivability
■ Maintainability
■ Reliability
Self Healing with respect to
Power Distribution Networks
Automatic fault
detection
Isolating faults
Restoring
power both
upstream &
downstream
the faults
Scope
■ Describes model properties and capabilities
■ Illustrated for a small real world medium voltage
distribution network.
■ Solutions for recovery of the system
■ By analyzing and automatically undertaking switching
operations to maximize restored load
■ With minimal human intervention
Focus
Approaches
Solutions may be based on:
1. Network optimization algorithms
Lacks speed of response due to inadequately
designed data structures and algorithms to handle
fault recovery
2. Data storage of pre-defined switching schemes
Lacks flexibility of response due to dynamic network
topology
Proposed Solution
■ New network data structures for which effective
reconfiguration algorithms can be designed.
■ Resolves problem of speed while maintaining flexibility
■ Based on Bipartite Graph Theory.
■ Represent the switching possibilities abstractly rather
than the physical network itself.
Terminologies
- Umang
Graph terminology
■ In this paper vertices and edges
are referred to as nodes and arcs.
■ Vertices – represent Load,
Sub Stations and connection
points.
■ Edges – represent cables, lines,
busbars and switch devices in the
context of power system.
■ Graph - represents the Power
Distribution Network.
■ Bipartite Graph
■ Tree - graph that contains no
cycles, bipartite by its nature.
■ Co-tree edges - represent
the edges of G that can be
closed to create a
mesh(cycle), so a co-tree
edge is not an edge of the
spanning tree T.
■ Fundamental cycle Y of G -
set of edges defined by a
tree edge e and the path in T
between the two end nodes
of e. In the distribution
context, the fundamental
cycle induced by a switching
ON operation represents the
corresponding mesh.
Matching Terminologies
■ Matching of G - set of edges
M if no two of its edges have
a common endpoint(vertex).
So the no. of vertices in M are
twice the no. of edges in M.
■ M-alternating - a path P is so
if it's edges are alternately in
M and E(G)/M (Edge set of
which contains edges of G
which are not in M).
■ M-Augmenting - an M
alternating path is so if it's
end vertices are not end
vertices of any of the edges in
Network Model
- Goransh, Tarun & Udhav
 The model is based on the idea of reconfiguring radial
networks by undertaking Switching Steps.
 Pairs of switching operations consist of closing one
(arbitrary) branch of the network and opening another so
that the resulting configuration is also radial.
Definition Of Switching Steps:
Let G= (N, A) be a graph representing the distribution network.
Its operating configuration is a spanning tree, say T = (N, AT
𝐵
),
where AT
𝐵
∈ A.
Let YT
𝐵
be a fundamental cycle with respect to T, defined by a co-
tree arc element B.
A switching step {B, c} is then defined as an exchange of an arc
element c, that lies on the fundamental cycle YT
𝐵
, for a co-tree
arc element B, i.e.,
{B, c}| c ∈ YT
𝐵
∩ AT
𝐵
, B ∈ YT
𝐵
∩ (A  AT
𝐵
).
Result 1: By proceeding in switching
steps, the network is guaranteed to be
topologically feasible, i.e., radial and
connected.
For instance see Fig. 1, where the
lower left square is a fundamental
cycle of G with respect to T defined by
the branch B. Switching OFF
operations that can be found on this
cycle are a, c and d.
Reconfiguration Dynamics
Network reconfiguration is a dynamic process.
Generally, switching steps are dependent, i.e. a switching step is
only valid with respect to the current network configuration.
After a switching step, the network configuration changes and
usually some of the operation pairs that were switching steps
before are disabled, while others become possible.
This requires a new search for feasible switching steps.
Example:
Feasibility of a sequence needs to be checked step by step,
which may be time-consuming as it employs fundamental cycle
search in the spanning tree.
This data model avoids the burden of repetitive checking
topology admissibility after every step. It captures all the
topological dynamics of the network in one simple Bipartite
graph. Searching this graph is efficient in several aspects:
 Relevant information
 Lossless compression
 Topology feasibility
 Algorithm design
Graph Initialisation
 The set of switching steps that are feasible in T may be
represented by a bipartite graph B = (VAo,VAT, E).
 VAo- denote the switches that are currently opened and
available to be closed.
 VAT - the switches that are currently used and can be opened.
 We refer to nodes of the bipartite graph as vertices and to its
arcs as edges.
Possible switching ON operations : VAo ⇔ A  AT
Possible switching OFF operations: VAT ⇔ AT
E = {{vAo, vAT }|vAo ∈ VAo , vAT ∈ VAT }
Example:
VAo = {A, D}
VAT = {b, c, e, f, g}
Edges are formed where
pairs constitute valid
switching steps,
i.e. only pairs {D, c} and
{D, f} are excluded.
The resulting bipartite graph
is depicted here.
Graph Reconfiguration
 Let B1 = (V1o , V1T , E1 ) be a bipartite graph representing the
current network configuration T.
 Then doing a switching step {A, g} where A is a co-tree branch
of the current configuration T and g ∈ T sets up a new bipartite
graph B2 = (V2o , V2T , E2 ) such that:
V2o = {A, D}{A} + {G} = {G, D}
V2T = {b, c, e, f, g}+{a}  {g} = {b, c, d, f, a}
The new edge set E2 is then obtained in two steps. First, all
edges that were in E1 incident to A will be in E2 incident to G
and all edges previously incident to g will be in E2 incident to a.
Then, consider a matching M = {A, g} in B1 . For every M-
augmenting path in B1 , negate the existence of an edge
between its end vertices in E2 .
Thus, the changes to edge set E are: first exchanging the end
nodes A for G and g for a; and then deletion of edge D–b, edge
D–e and insertion of edge D–c and edge D–f.
Self-healing
Algorithms
- Vatsal & Prashant
Two Proposed Algorithms
Fault
restoration
•Here, the algorithm finds the best
to reconfigure the faulty circuit while keeping
in mind the topological feasibility.
Overload
mitigation
•Here, the algorithm tries to alleviate
overload by reconfiguring the network while
taking into account of topological feasibility.
Step-1
A fault occurred
and detected
Step-2
Bipartite graph is
inspected for
reconfiguration
Step-3
Decision making
is applied to
choose feasible
candidate
Step-4
Resolving
overloading
through
overload
mitigation
Fault Restoration
Flow Diagram
Fault Restoration – Example
Circuit with a spanning tree : {b, e, g,
f, c}
Co-tree arc : {A, D}
Assumption : Fault occurs in load g
 Fault occurs and gets detected at load
g
 Load g gets disconnected
 Creates an island at the respective
position
Step - 1
Perform switching operation to
reconfigure it into topologically
feasible circuit
Step - 2
Implement bipartite graph of initial
circuit
(Rather than checking for fundamental
cycles repeatedly)
Inspect it for reconfiguration
Step -
4
Switching steps might cause
overloading
Overcome by using overload
mitigation
Step - 3
Reconfigure and make it radial and
connected
Step 1 : Occurrence And Detection Of The
Overload
The squares represent loads
present in the different branches.
The first figure shows the circuit
before application of the fault
restoration algorithm and the
second figure shows the circuit
afterwards.
We can see that load has
increased in the overall circuit
Overload Reconfiguration
STEP 2: Choose The Most Severe Overload
Since here we have the choice
between branch a and branch
b, both are overloaded, we pick
branch a which is more severe.
STEP 3: Inspect The Bipartite Graph To Choose Vertices
To Reconfigure The Graph And Decrease Load
Here we can replace branch a
by either branch G or by
branch D.
STEP 4: A Decision Making Process Is Applied To Choose The
Reconfiguration Operation That Solves The Overload Or Results
In The
Smallest Remaining Overload.
Here since we can not replace a by G
since it’s faulty,
We switch a by D in order to reduce
load.
Here is the final reconfigured topologically
feasible circuit after applying self-healing data
structure.
STEP 5:
If there are any overloads left, go to Step 2, otherwise stop
In case, that the overload can be solved right away, the
decision making process chooses the less loaded path.
In the other case, the solution that leaves the smallest
remaining overload is chosen.
Since here we have maximum overload in branch d now,
we can replace it by branch A or G.
But replacing it by branch A would result in more load and
would make the previous change redundant and branch G
is faulty, so we stop.
Application
- Rituj
As we saw earlier that we apply 2 algorithms under
gradual steps in accordance with the requirement for
removal of the fault load and to reduce the overload
caused by reconfiguration of switches.
Visiting a Real Distribution Network
Let us Consider 10 kV distribution network where dashed
lines represent branches with open switch devices; triangles
represent loads; squares represent sectionalizing
substations; and the circle represents a 60/10 kV substation.
Z is a
sectionalizin
g substation
The network consists of three feeders. Let us consider
having named the branches so that Feeder 1 consists of
branches 1–3; Feeder 2 consists of branches 4–10 and
Feeder 3 consists of the remaining branches, 11–16. In
order to read easily, the open branches are denoted by
capital letters A, B, C, D, E, F and Z.
Working of Algorithm
Let us consider a fault in each switch at once and find the
best candidate from the open switches.
This means that when a fault occurred in any load there was
no other switch at fault and hence we obtain the best
alternative for each faulted switch. The obtained vector is
s0 = [𝑍𝑍𝐸𝐵𝐵𝐵𝐵𝐸𝐸𝐹𝑍𝐶𝐷𝐹𝑍𝐴]
Working of Algorithm
This vector is read as s0 = [𝑍𝑍𝐸𝐵𝐵𝐵𝐵𝐸𝐸𝐹𝑍𝐶𝐷𝐹𝑍𝐴]
■ Switch Z is best to be closed in case to restore fault in
branch 1,2, 11,15
■ Switch E is best to be closed in case to restore faults in
3,8,9 and so on.
■ A reconfiguration under such case would be a normal
reconfiguration.
Working of Algorithm
s0 = [𝑍𝑍𝐸𝐵𝐵𝐵𝐵𝐸𝐸𝐹𝑍𝐶𝐷𝐹𝑍𝐴]
Once we apply the switching it is possible especially in peak
load condition that some may yield an overload condition
to resolve which we apply the second algorithm which
provides best alternative switching to reduce the load and
attain reconfiguration.
Working of Algorithm
Let us take into consideration another situation where we
already have a faulty branch and we are taking best switch
to get another configuration and another branch which has
the same switch as its best alternative becomes faulty.
Working of Algorithm
■ For Example the Best alternative for branch 1 and 2 is
switch Z.
s0 = [𝑍𝑍𝐸𝐵𝐵𝐵𝐵𝐸𝐸𝐹𝑍𝐶𝐷𝐹𝑍𝐴]
■ Suppose that branch 1 has failed and was restored,
according to s0, by Z. Suppose that branch 2 fails before
the fault in 1 is cleared.
Working of Algorithm
■ Now, 1 is unavailable and Z (that corresponds to a predefined
post-fault switch for 2 – see the second entry in s0) is already in
use. We apply A1 again to find out that E has to be operated in
order to restore a failure in 2 after 1 has failed and was restored
by Z.
■ Taking it given that branch 1 is already at fault the vector of
best alternatives is given by
S1 = [EEBBBBEEFBCDFBA]
■ Considering Similar way we can define S2, S3, etc. where Si,
stands for ith branch being already at fault.
Table of all Vectors
Here ith represents every Si i.e. every vector which represents
the list of best alternatives when the ith branch is already at
fault.
The Bipartite Graph
The table was obtained by
repeatedly applying the
above mentioned
algorithms after modeling
the network by a bipartite
graph as shown
The Part II
Looking for the overloads after restoring the two faults in
peak load conditions. Depending on the table of Vectors
we can find the branches which have an extra overload
over them we can use the Algorithm A2 to find the
switching steps that alleviate the overload by
reconfiguring the network.
Part II
■ Based on the Table of Vectors
Mentioned above the following
figure shows the load after
reconfiguration to resolve the
fault.
■ The grey colour intensity
depends on the load severity
after optimization. For ex. see
row 5 column 9, where both the
faults occur in Feeder2.
■ Three reconfiguration steps are
needed to alleviate the overload
Table of all Vectors
Exclamation mark in the Table of vectors represents that the
Faults could no more be restored.
Conclusion
The End
-
G10

More Related Content

What's hot

Load Flow Analysis of Jamshoro Thermal Power Station (JTPS) Pakistan Using MA...
Load Flow Analysis of Jamshoro Thermal Power Station (JTPS) Pakistan Using MA...Load Flow Analysis of Jamshoro Thermal Power Station (JTPS) Pakistan Using MA...
Load Flow Analysis of Jamshoro Thermal Power Station (JTPS) Pakistan Using MA...
sunny katyara
 
Implementation of Space Vector Modulator for Cascaded H-Bridge Multilevel Inv...
Implementation of Space Vector Modulator for Cascaded H-Bridge Multilevel Inv...Implementation of Space Vector Modulator for Cascaded H-Bridge Multilevel Inv...
Implementation of Space Vector Modulator for Cascaded H-Bridge Multilevel Inv...
IJPEDS-IAES
 

What's hot (20)

A Novel Distribution System Power Flow Algorithm using Forward Backward Matri...
A Novel Distribution System Power Flow Algorithm using Forward Backward Matri...A Novel Distribution System Power Flow Algorithm using Forward Backward Matri...
A Novel Distribution System Power Flow Algorithm using Forward Backward Matri...
 
Computer Application in Power system: Chapter two - load flow analysis
Computer Application in Power system: Chapter two - load flow analysisComputer Application in Power system: Chapter two - load flow analysis
Computer Application in Power system: Chapter two - load flow analysis
 
Algorithm for Fault Location and Classification on Parallel Transmission Line...
Algorithm for Fault Location and Classification on Parallel Transmission Line...Algorithm for Fault Location and Classification on Parallel Transmission Line...
Algorithm for Fault Location and Classification on Parallel Transmission Line...
 
LOAD FLOW ANALYSIS FOR A 220KV LINE – CASE STUDY
LOAD FLOW ANALYSIS FOR A 220KV LINE – CASE STUDYLOAD FLOW ANALYSIS FOR A 220KV LINE – CASE STUDY
LOAD FLOW ANALYSIS FOR A 220KV LINE – CASE STUDY
 
Loadflowsynopsis
LoadflowsynopsisLoadflowsynopsis
Loadflowsynopsis
 
Small Signal Modelling of a Buck Converter using State Space Averaging for Ma...
Small Signal Modelling of a Buck Converter using State Space Averaging for Ma...Small Signal Modelling of a Buck Converter using State Space Averaging for Ma...
Small Signal Modelling of a Buck Converter using State Space Averaging for Ma...
 
Design Of Area Delay Efficient Fixed-Point Lms Adaptive Filter For EEG Applic...
Design Of Area Delay Efficient Fixed-Point Lms Adaptive Filter For EEG Applic...Design Of Area Delay Efficient Fixed-Point Lms Adaptive Filter For EEG Applic...
Design Of Area Delay Efficient Fixed-Point Lms Adaptive Filter For EEG Applic...
 
Lid driven cavity flow simulation using CFD & MATLAB
Lid driven cavity flow simulation using CFD & MATLABLid driven cavity flow simulation using CFD & MATLAB
Lid driven cavity flow simulation using CFD & MATLAB
 
Load Flow Analysis of Jamshoro Thermal Power Station (JTPS) Pakistan Using MA...
Load Flow Analysis of Jamshoro Thermal Power Station (JTPS) Pakistan Using MA...Load Flow Analysis of Jamshoro Thermal Power Station (JTPS) Pakistan Using MA...
Load Flow Analysis of Jamshoro Thermal Power Station (JTPS) Pakistan Using MA...
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Design of Compensator for Roll Control of Towing Air-Crafts
Design of Compensator for Roll Control of Towing Air-CraftsDesign of Compensator for Roll Control of Towing Air-Crafts
Design of Compensator for Roll Control of Towing Air-Crafts
 
Exp 6 . Load sharing between two interconnected power systems
Exp 6 .	Load sharing between two interconnected power systemsExp 6 .	Load sharing between two interconnected power systems
Exp 6 . Load sharing between two interconnected power systems
 
F0443847
F0443847F0443847
F0443847
 
Load flow study
Load flow studyLoad flow study
Load flow study
 
Implementation of Space Vector Modulator for Cascaded H-Bridge Multilevel Inv...
Implementation of Space Vector Modulator for Cascaded H-Bridge Multilevel Inv...Implementation of Space Vector Modulator for Cascaded H-Bridge Multilevel Inv...
Implementation of Space Vector Modulator for Cascaded H-Bridge Multilevel Inv...
 
UDSLF
UDSLFUDSLF
UDSLF
 
Exp 4 (1)4. Gauss Siedal Load flow analysis using Matlab Software.
Exp 4 (1)4.	Gauss Siedal Load flow analysis using Matlab Software.Exp 4 (1)4.	Gauss Siedal Load flow analysis using Matlab Software.
Exp 4 (1)4. Gauss Siedal Load flow analysis using Matlab Software.
 
Simplified Space Vector Pulse Width Modulation Based on Switching Schemes wit...
Simplified Space Vector Pulse Width Modulation Based on Switching Schemes wit...Simplified Space Vector Pulse Width Modulation Based on Switching Schemes wit...
Simplified Space Vector Pulse Width Modulation Based on Switching Schemes wit...
 
Optimization MVSIS vs AIG Rewriting (ABC)
Optimization MVSIS vs AIG Rewriting (ABC)Optimization MVSIS vs AIG Rewriting (ABC)
Optimization MVSIS vs AIG Rewriting (ABC)
 
Gauss Siedel method of Load Flow
Gauss Siedel method of Load FlowGauss Siedel method of Load Flow
Gauss Siedel method of Load Flow
 

Similar to Towards Self healing networks in distribution networks operation

Active network management for electrical distribution systems: problem formul...
Active network management for electrical distribution systems: problem formul...Active network management for electrical distribution systems: problem formul...
Active network management for electrical distribution systems: problem formul...
Quentin Gemine
 

Similar to Towards Self healing networks in distribution networks operation (20)

Particle Swarm Optimization based Network Reconfiguration in Distribution Sys...
Particle Swarm Optimization based Network Reconfiguration in Distribution Sys...Particle Swarm Optimization based Network Reconfiguration in Distribution Sys...
Particle Swarm Optimization based Network Reconfiguration in Distribution Sys...
 
Modeling and simulation of three phases cascaded H-bridge grid-tied PV inverter
Modeling and simulation of three phases cascaded H-bridge grid-tied PV inverterModeling and simulation of three phases cascaded H-bridge grid-tied PV inverter
Modeling and simulation of three phases cascaded H-bridge grid-tied PV inverter
 
Volt/Var Optimization by Smart Inverters and Capacitor Banks
Volt/Var Optimization by Smart Inverters and Capacitor BanksVolt/Var Optimization by Smart Inverters and Capacitor Banks
Volt/Var Optimization by Smart Inverters and Capacitor Banks
 
Volt/Var Optimization by Smart Inverters and Capacitor Banks
Volt/Var Optimization by Smart Inverters and Capacitor BanksVolt/Var Optimization by Smart Inverters and Capacitor Banks
Volt/Var Optimization by Smart Inverters and Capacitor Banks
 
Modeling and simulation of three phases cascaded H-bridge grid-tied PV inverter
Modeling and simulation of three phases cascaded H-bridge grid-tied PV inverterModeling and simulation of three phases cascaded H-bridge grid-tied PV inverter
Modeling and simulation of three phases cascaded H-bridge grid-tied PV inverter
 
A Novel Approach for Allocation of Optimal Capacitor and Distributed Generati...
A Novel Approach for Allocation of Optimal Capacitor and Distributed Generati...A Novel Approach for Allocation of Optimal Capacitor and Distributed Generati...
A Novel Approach for Allocation of Optimal Capacitor and Distributed Generati...
 
FAULT DETECTION AND CLASSIFICATION ON SINGLE CIRCUIT TRANSMISSION LINE USING ...
FAULT DETECTION AND CLASSIFICATION ON SINGLE CIRCUIT TRANSMISSION LINE USING ...FAULT DETECTION AND CLASSIFICATION ON SINGLE CIRCUIT TRANSMISSION LINE USING ...
FAULT DETECTION AND CLASSIFICATION ON SINGLE CIRCUIT TRANSMISSION LINE USING ...
 
Design and Simulation of a Three Phase Power Converter Connected To a Distrib...
Design and Simulation of a Three Phase Power Converter Connected To a Distrib...Design and Simulation of a Three Phase Power Converter Connected To a Distrib...
Design and Simulation of a Three Phase Power Converter Connected To a Distrib...
 
Power flow solution
Power flow solutionPower flow solution
Power flow solution
 
Optimum Network Reconfiguration using Grey Wolf Optimizer
Optimum Network Reconfiguration using Grey Wolf OptimizerOptimum Network Reconfiguration using Grey Wolf Optimizer
Optimum Network Reconfiguration using Grey Wolf Optimizer
 
Active network management for electrical distribution systems: problem formul...
Active network management for electrical distribution systems: problem formul...Active network management for electrical distribution systems: problem formul...
Active network management for electrical distribution systems: problem formul...
 
Signal-Energy Based Fault Classification of Unbalanced Network using S-Transf...
Signal-Energy Based Fault Classification of Unbalanced Network using S-Transf...Signal-Energy Based Fault Classification of Unbalanced Network using S-Transf...
Signal-Energy Based Fault Classification of Unbalanced Network using S-Transf...
 
Design of Resonators for Coupled Magnetic Resonance-based Wireless Power Tran...
Design of Resonators for Coupled Magnetic Resonance-based Wireless Power Tran...Design of Resonators for Coupled Magnetic Resonance-based Wireless Power Tran...
Design of Resonators for Coupled Magnetic Resonance-based Wireless Power Tran...
 
Multilayer & Back propagation algorithm
Multilayer & Back propagation algorithmMultilayer & Back propagation algorithm
Multilayer & Back propagation algorithm
 
Modelling design and control of an electromechanical mass lifting system usin...
Modelling design and control of an electromechanical mass lifting system usin...Modelling design and control of an electromechanical mass lifting system usin...
Modelling design and control of an electromechanical mass lifting system usin...
 
Kd3418211827
Kd3418211827Kd3418211827
Kd3418211827
 
Indirect 3D-Space Vector Modulation for a Matrix Converter
Indirect 3D-Space Vector Modulation for a Matrix ConverterIndirect 3D-Space Vector Modulation for a Matrix Converter
Indirect 3D-Space Vector Modulation for a Matrix Converter
 
Dcgris3
Dcgris3Dcgris3
Dcgris3
 
A New Voltage Balancing Converter for Neutral Point Clamped Multilevel Invert...
A New Voltage Balancing Converter for Neutral Point Clamped Multilevel Invert...A New Voltage Balancing Converter for Neutral Point Clamped Multilevel Invert...
A New Voltage Balancing Converter for Neutral Point Clamped Multilevel Invert...
 
Multi-Objective Aspects of Distribution Network Volt-VAr Optimization
Multi-Objective Aspects of Distribution Network Volt-VAr OptimizationMulti-Objective Aspects of Distribution Network Volt-VAr Optimization
Multi-Objective Aspects of Distribution Network Volt-VAr Optimization
 

Recently uploaded

21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
rahulmanepalli02
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
IJECEIAES
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manual
BalamuruganV28
 

Recently uploaded (20)

Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...
 
Circuit Breakers for Engineering Students
Circuit Breakers for Engineering StudentsCircuit Breakers for Engineering Students
Circuit Breakers for Engineering Students
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
 
Intro to Design (for Engineers) at Sydney Uni
Intro to Design (for Engineers) at Sydney UniIntro to Design (for Engineers) at Sydney Uni
Intro to Design (for Engineers) at Sydney Uni
 
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
 
Artificial Intelligence in due diligence
Artificial Intelligence in due diligenceArtificial Intelligence in due diligence
Artificial Intelligence in due diligence
 
Passive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptPassive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.ppt
 
Final DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manualFinal DBMS Manual (2).pdf final lab manual
Final DBMS Manual (2).pdf final lab manual
 
engineering chemistry power point presentation
engineering chemistry  power point presentationengineering chemistry  power point presentation
engineering chemistry power point presentation
 
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdfInvolute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
Involute of a circle,Square, pentagon,HexagonInvolute_Engineering Drawing.pdf
 
What is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, FunctionsWhat is Coordinate Measuring Machine? CMM Types, Features, Functions
What is Coordinate Measuring Machine? CMM Types, Features, Functions
 
handbook on reinforce concrete and detailing
handbook on reinforce concrete and detailinghandbook on reinforce concrete and detailing
handbook on reinforce concrete and detailing
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
Independent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging StationIndependent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging Station
 
Software Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdfSoftware Engineering Practical File Front Pages.pdf
Software Engineering Practical File Front Pages.pdf
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1
 
Diploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfDiploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdf
 

Towards Self healing networks in distribution networks operation

  • 1. Towards Self-Healing In Distribution Networks Operation: Bipartite Graph Modelling For Automated Switching
  • 3. Concept of Self Healing The capability to: ■ Identify ■ Diagnose ■ Recover from system disruptions with the objective of maximizing: ■ System availability ■ Survivability ■ Maintainability ■ Reliability
  • 4. Self Healing with respect to Power Distribution Networks Automatic fault detection Isolating faults Restoring power both upstream & downstream the faults
  • 5. Scope ■ Describes model properties and capabilities ■ Illustrated for a small real world medium voltage distribution network. ■ Solutions for recovery of the system ■ By analyzing and automatically undertaking switching operations to maximize restored load ■ With minimal human intervention Focus
  • 6. Approaches Solutions may be based on: 1. Network optimization algorithms Lacks speed of response due to inadequately designed data structures and algorithms to handle fault recovery 2. Data storage of pre-defined switching schemes Lacks flexibility of response due to dynamic network topology
  • 7. Proposed Solution ■ New network data structures for which effective reconfiguration algorithms can be designed. ■ Resolves problem of speed while maintaining flexibility ■ Based on Bipartite Graph Theory. ■ Represent the switching possibilities abstractly rather than the physical network itself.
  • 9. Graph terminology ■ In this paper vertices and edges are referred to as nodes and arcs. ■ Vertices – represent Load, Sub Stations and connection points. ■ Edges – represent cables, lines, busbars and switch devices in the context of power system. ■ Graph - represents the Power Distribution Network. ■ Bipartite Graph ■ Tree - graph that contains no cycles, bipartite by its nature.
  • 10. ■ Co-tree edges - represent the edges of G that can be closed to create a mesh(cycle), so a co-tree edge is not an edge of the spanning tree T. ■ Fundamental cycle Y of G - set of edges defined by a tree edge e and the path in T between the two end nodes of e. In the distribution context, the fundamental cycle induced by a switching ON operation represents the corresponding mesh.
  • 11. Matching Terminologies ■ Matching of G - set of edges M if no two of its edges have a common endpoint(vertex). So the no. of vertices in M are twice the no. of edges in M. ■ M-alternating - a path P is so if it's edges are alternately in M and E(G)/M (Edge set of which contains edges of G which are not in M). ■ M-Augmenting - an M alternating path is so if it's end vertices are not end vertices of any of the edges in
  • 12. Network Model - Goransh, Tarun & Udhav
  • 13.  The model is based on the idea of reconfiguring radial networks by undertaking Switching Steps.  Pairs of switching operations consist of closing one (arbitrary) branch of the network and opening another so that the resulting configuration is also radial.
  • 14. Definition Of Switching Steps: Let G= (N, A) be a graph representing the distribution network. Its operating configuration is a spanning tree, say T = (N, AT 𝐵 ), where AT 𝐵 ∈ A. Let YT 𝐵 be a fundamental cycle with respect to T, defined by a co- tree arc element B. A switching step {B, c} is then defined as an exchange of an arc element c, that lies on the fundamental cycle YT 𝐵 , for a co-tree arc element B, i.e., {B, c}| c ∈ YT 𝐵 ∩ AT 𝐵 , B ∈ YT 𝐵 ∩ (A AT 𝐵 ).
  • 15. Result 1: By proceeding in switching steps, the network is guaranteed to be topologically feasible, i.e., radial and connected. For instance see Fig. 1, where the lower left square is a fundamental cycle of G with respect to T defined by the branch B. Switching OFF operations that can be found on this cycle are a, c and d.
  • 16. Reconfiguration Dynamics Network reconfiguration is a dynamic process. Generally, switching steps are dependent, i.e. a switching step is only valid with respect to the current network configuration. After a switching step, the network configuration changes and usually some of the operation pairs that were switching steps before are disabled, while others become possible. This requires a new search for feasible switching steps.
  • 18. Feasibility of a sequence needs to be checked step by step, which may be time-consuming as it employs fundamental cycle search in the spanning tree. This data model avoids the burden of repetitive checking topology admissibility after every step. It captures all the topological dynamics of the network in one simple Bipartite graph. Searching this graph is efficient in several aspects:  Relevant information  Lossless compression  Topology feasibility  Algorithm design
  • 19. Graph Initialisation  The set of switching steps that are feasible in T may be represented by a bipartite graph B = (VAo,VAT, E).  VAo- denote the switches that are currently opened and available to be closed.  VAT - the switches that are currently used and can be opened.  We refer to nodes of the bipartite graph as vertices and to its arcs as edges.
  • 20. Possible switching ON operations : VAo ⇔ A AT Possible switching OFF operations: VAT ⇔ AT E = {{vAo, vAT }|vAo ∈ VAo , vAT ∈ VAT }
  • 21. Example: VAo = {A, D} VAT = {b, c, e, f, g} Edges are formed where pairs constitute valid switching steps, i.e. only pairs {D, c} and {D, f} are excluded.
  • 22. The resulting bipartite graph is depicted here.
  • 23. Graph Reconfiguration  Let B1 = (V1o , V1T , E1 ) be a bipartite graph representing the current network configuration T.  Then doing a switching step {A, g} where A is a co-tree branch of the current configuration T and g ∈ T sets up a new bipartite graph B2 = (V2o , V2T , E2 ) such that: V2o = {A, D}{A} + {G} = {G, D} V2T = {b, c, e, f, g}+{a} {g} = {b, c, d, f, a}
  • 24.
  • 25. The new edge set E2 is then obtained in two steps. First, all edges that were in E1 incident to A will be in E2 incident to G and all edges previously incident to g will be in E2 incident to a. Then, consider a matching M = {A, g} in B1 . For every M- augmenting path in B1 , negate the existence of an edge between its end vertices in E2 . Thus, the changes to edge set E are: first exchanging the end nodes A for G and g for a; and then deletion of edge D–b, edge D–e and insertion of edge D–c and edge D–f.
  • 27. Two Proposed Algorithms Fault restoration •Here, the algorithm finds the best to reconfigure the faulty circuit while keeping in mind the topological feasibility. Overload mitigation •Here, the algorithm tries to alleviate overload by reconfiguring the network while taking into account of topological feasibility.
  • 28. Step-1 A fault occurred and detected Step-2 Bipartite graph is inspected for reconfiguration Step-3 Decision making is applied to choose feasible candidate Step-4 Resolving overloading through overload mitigation Fault Restoration Flow Diagram
  • 29. Fault Restoration – Example Circuit with a spanning tree : {b, e, g, f, c} Co-tree arc : {A, D} Assumption : Fault occurs in load g  Fault occurs and gets detected at load g  Load g gets disconnected  Creates an island at the respective position Step - 1
  • 30. Perform switching operation to reconfigure it into topologically feasible circuit Step - 2 Implement bipartite graph of initial circuit (Rather than checking for fundamental cycles repeatedly) Inspect it for reconfiguration
  • 31. Step - 4 Switching steps might cause overloading Overcome by using overload mitigation Step - 3 Reconfigure and make it radial and connected
  • 32. Step 1 : Occurrence And Detection Of The Overload The squares represent loads present in the different branches. The first figure shows the circuit before application of the fault restoration algorithm and the second figure shows the circuit afterwards. We can see that load has increased in the overall circuit Overload Reconfiguration
  • 33. STEP 2: Choose The Most Severe Overload Since here we have the choice between branch a and branch b, both are overloaded, we pick branch a which is more severe.
  • 34. STEP 3: Inspect The Bipartite Graph To Choose Vertices To Reconfigure The Graph And Decrease Load Here we can replace branch a by either branch G or by branch D.
  • 35. STEP 4: A Decision Making Process Is Applied To Choose The Reconfiguration Operation That Solves The Overload Or Results In The Smallest Remaining Overload. Here since we can not replace a by G since it’s faulty, We switch a by D in order to reduce load.
  • 36. Here is the final reconfigured topologically feasible circuit after applying self-healing data structure.
  • 37. STEP 5: If there are any overloads left, go to Step 2, otherwise stop In case, that the overload can be solved right away, the decision making process chooses the less loaded path. In the other case, the solution that leaves the smallest remaining overload is chosen. Since here we have maximum overload in branch d now, we can replace it by branch A or G. But replacing it by branch A would result in more load and would make the previous change redundant and branch G is faulty, so we stop.
  • 39. As we saw earlier that we apply 2 algorithms under gradual steps in accordance with the requirement for removal of the fault load and to reduce the overload caused by reconfiguration of switches.
  • 40. Visiting a Real Distribution Network Let us Consider 10 kV distribution network where dashed lines represent branches with open switch devices; triangles represent loads; squares represent sectionalizing substations; and the circle represents a 60/10 kV substation.
  • 42. The network consists of three feeders. Let us consider having named the branches so that Feeder 1 consists of branches 1–3; Feeder 2 consists of branches 4–10 and Feeder 3 consists of the remaining branches, 11–16. In order to read easily, the open branches are denoted by capital letters A, B, C, D, E, F and Z.
  • 43. Working of Algorithm Let us consider a fault in each switch at once and find the best candidate from the open switches. This means that when a fault occurred in any load there was no other switch at fault and hence we obtain the best alternative for each faulted switch. The obtained vector is s0 = [𝑍𝑍𝐸𝐵𝐵𝐵𝐵𝐸𝐸𝐹𝑍𝐶𝐷𝐹𝑍𝐴]
  • 44. Working of Algorithm This vector is read as s0 = [𝑍𝑍𝐸𝐵𝐵𝐵𝐵𝐸𝐸𝐹𝑍𝐶𝐷𝐹𝑍𝐴] ■ Switch Z is best to be closed in case to restore fault in branch 1,2, 11,15 ■ Switch E is best to be closed in case to restore faults in 3,8,9 and so on. ■ A reconfiguration under such case would be a normal reconfiguration.
  • 45. Working of Algorithm s0 = [𝑍𝑍𝐸𝐵𝐵𝐵𝐵𝐸𝐸𝐹𝑍𝐶𝐷𝐹𝑍𝐴] Once we apply the switching it is possible especially in peak load condition that some may yield an overload condition to resolve which we apply the second algorithm which provides best alternative switching to reduce the load and attain reconfiguration.
  • 46. Working of Algorithm Let us take into consideration another situation where we already have a faulty branch and we are taking best switch to get another configuration and another branch which has the same switch as its best alternative becomes faulty.
  • 47. Working of Algorithm ■ For Example the Best alternative for branch 1 and 2 is switch Z. s0 = [𝑍𝑍𝐸𝐵𝐵𝐵𝐵𝐸𝐸𝐹𝑍𝐶𝐷𝐹𝑍𝐴] ■ Suppose that branch 1 has failed and was restored, according to s0, by Z. Suppose that branch 2 fails before the fault in 1 is cleared.
  • 48. Working of Algorithm ■ Now, 1 is unavailable and Z (that corresponds to a predefined post-fault switch for 2 – see the second entry in s0) is already in use. We apply A1 again to find out that E has to be operated in order to restore a failure in 2 after 1 has failed and was restored by Z. ■ Taking it given that branch 1 is already at fault the vector of best alternatives is given by S1 = [EEBBBBEEFBCDFBA] ■ Considering Similar way we can define S2, S3, etc. where Si, stands for ith branch being already at fault.
  • 49. Table of all Vectors Here ith represents every Si i.e. every vector which represents the list of best alternatives when the ith branch is already at fault.
  • 50. The Bipartite Graph The table was obtained by repeatedly applying the above mentioned algorithms after modeling the network by a bipartite graph as shown
  • 51. The Part II Looking for the overloads after restoring the two faults in peak load conditions. Depending on the table of Vectors we can find the branches which have an extra overload over them we can use the Algorithm A2 to find the switching steps that alleviate the overload by reconfiguring the network.
  • 52. Part II ■ Based on the Table of Vectors Mentioned above the following figure shows the load after reconfiguration to resolve the fault. ■ The grey colour intensity depends on the load severity after optimization. For ex. see row 5 column 9, where both the faults occur in Feeder2. ■ Three reconfiguration steps are needed to alleviate the overload
  • 53. Table of all Vectors Exclamation mark in the Table of vectors represents that the Faults could no more be restored.