Application of conic programming for optimal distributed generation allocation in distribution network

Jinli Zhao, Yingying Yu, Peng Li, Chongbo Sun, Xuzhu Dong, Li Yu, Xiaoyun Huang, Hongyuan Huang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Citations (Scopus)

Abstract

The widely application of distributed generation (DG) technologies poses new challenges to the operation and planning of the distribution network. Firstly, based on the basic DG allocation problem, a conic transformation model is proposed through variable substitution to realize the required format conversion, and then the conic programming(CP) algorithm is employed to acquire the optimal solution accurately, which also realizes the solving of power flow simultaneously. Finally, the optimal DG capacity obtained under different penetration levels and power factors are analyzed on the IEEE 33-node test feeder. Meanwhile, the validity of conic model as well as the CP algorithm is also verified.

Original languageEnglish
Title of host publicationCICED 2014 - 2014 China International Conference on Electricity Distribution, Proceedings
PublisherIEEE Computer Society
Pages504-507
Number of pages4
ISBN (Electronic)9781479941261
DOIs
Publication statusPublished - 18 Dec 2014
Externally publishedYes
Event2014 6th China International Conference on Electricity Distribution, CICED 2014 - Shenzhen, China
Duration: 23 Sept 201426 Sept 2014

Publication series

NameChina International Conference on Electricity Distribution, CICED
Volume2014-December
ISSN (Print)2161-7481
ISSN (Electronic)2161-749X

Conference

Conference2014 6th China International Conference on Electricity Distribution, CICED 2014
Country/TerritoryChina
CityShenzhen
Period23/09/1426/09/14

Keywords

  • conic programming
  • distributed generation
  • loss
  • penetration
  • planning of distribution network

Fingerprint

Dive into the research topics of 'Application of conic programming for optimal distributed generation allocation in distribution network'. Together they form a unique fingerprint.

Cite this