Research Article  Open Access
Jun Xiao, Guoqiang Zu, Xiaoxu Gong, Chengshan Wang, "Model and Topological Characteristics of Power Distribution System Security Region", Journal of Applied Mathematics, vol. 2014, Article ID 327078, 13 pages, 2014. https://doi.org/10.1155/2014/327078
Model and Topological Characteristics of Power Distribution System Security Region
Abstract
As an important tool of transmission system dispatching, the regionbased method has just been introduced into distribution area with the ongoing smart distribution grid initiatives. First, a more accurate distribution system security region (DSSR) model is proposed. The proposed model is based on detailed feederinterconnected topology, and both substation transformer and feeder N1 contingencies are considered. Second, generic characteristics of DSSR are discussed and mathematically proved. That is, DSSR is a dense set of which boundary has no suspension and can be expressed by several union subsurfaces. Finally, the results from both a test case and a practical case demonstrate the effectiveness of the proposed modeling approach; the shape of DSSR is also illustrated by means of 2 and 3dimensional visualization. Moreover, the DSSRbased assessment and control are preliminary illustrated to show the application of DSSR. The researches in this paper are fundamental work to develop new security region theory for future distribution systems.
1. Introduction
This paper presents a model of power distribution system security region (DSSR) which takes both substation transformer and feeder N1 contingencies into account. Meanwhile, main topological characteristics of DSSR are also discussed and mathematically proved.
DSSR is a newly proposed concept originated from N1 security guideline [1, 2]. DSSR is defined as the set of all operating points that make the distribution system N1 secure, taking into account the capacities of substation transformers, network topology, network capacity, and operational constraints. Traditional method of security assessment and control focused on service restoration in which load transfer scheme is made on case by case N1 test [3, 4]. However, the “pointwise” simulation method only provides the binary information of security and insecurity, which causes global information and description of the security boundary to fail to be obtained [5]. Moreover, with the number of interconnected feeders growing in distribution systems, especially in urban areas, the simulation time of “pointwise” method that has to be calculated online is highly prohibitive. In contrast, the “region” method has advantages in dealing with the problems above.
In transmission system, the research on security region has made substantial achievements. Author of [6–8] described the topological characteristics for security region and defined the practical model for engineering application. However, the “region” method has scarcely been applied in distribution area. Because early systems were little more than an extension of SCADA beyond the substation fence, most operations of 10 or 20 kV feeders required a high degree of human intervention [9]. Plus, without high speed peertopeer communication system, a wealth of key operation information cannot be timely received by dispatchers, which limited the actual contribution of “region” method. Distribution automation (DA) is an important concept included in smart distribution grid and will upgrade the distribution systems to fully informationbased systems [10, 11]. That is a motivation for researchers to perform the research on “region” method aiming at distribution system.
References [12, 13] proposed the concept of loadability. It is defined as the maximum loading level that can be supplied. Loadability is similar to the proposed “region” concept. However, because of not considering N1 cases, the concept is not suitable for urban system where N1 security is a high concern.
Total supply capability (TSC) is a newly proposed concept which is defined as the capability that a system can supply the load when the N1 security for distribution systems is considered [14, 15]. At the TSC point, the facilities in the system are usually fully utilized. Although some TSC results can be used as the points of DSSR boundary [15], TSC fails to describe the integrated boundary. Moreover, TSC cannot obtain the relative location of an operating point in security region, which is very useful for dispatchers to make decisions. In a word, TSC is more suitable to be applied in planning than operating process.
Author of [1] made attempt to present a simplified model and approach of security assessment with the concept of DSSR. But the papers exposed 2 main defects: only the load of substation transformers and their rated capacities are formulated, which provide relatively limited information on the system status; feeder contingency and maintenance are ignored although feeder contingency occurs much more frequently than transformer contingency.
The DSSR theory has potential applications. However, some wrong conclusions will be reached if the topological characteristics of DSSR are not studied. Paper [16] designed an N1 approximating approach to study the characteristics of DSSR. But those characteristics have not been proved by rigorous mathematical method and some of them are inaccurately described.
This paper proposes a more accurate DSSR model. The mathematical proof for the characteristics of DSSR is also performed. Finally, a test case and a practical case are both selected to testify the proposed model.
2. Basic Concept and Method
2.1. N1 Security for Distribution System
The DSSR concept is based on contingency scenarios. Feeder contingency and substation transformer contingency are two main scenarios considered in security analysis. Here, if a distribution system is feeder N1 secure, it means that when a fault occurs at outlet of any main feeder, the corresponding load can be transferred to other feeders with a series of tieswitch operations. Meanwhile, all components in the system operate normally without overload or overvoltage. Similarly, if a distribution is substation transformer N1 secure, it means that when a fault occurs at any substation transformer, the corresponding load can be transferred to other transformers with all the components satisfying the operation constraints. The load of a transformer can be transferred in two ways: one way is to be transferred to the adjacent transformers in the same substation with bustie switches; the other way is to be transferred to other substations by tieswitch operations among feeders.
2.2. Load Transfer and Concept of DSSR
Feeders in traditional mediumvoltage network are not completely automated. When a fault occurs at a substation transformer, load will be only transferred to adjacent transformers in the same substation, even though feeders form connection between substations. Manual performing for complex circuitrestoration switching takes time and is not performed in practical operation. Thus, it causes a lower load ratio of substation transformers, which also means a conservative utilization of assets.
However, development of smart distribution grid has greatly promoted the level of feeder automation, especially in some core urban area. Distributed intelligence and automated switching accomplish the task, that is, to transfer load among different substations quickly, accurately, and flexibly. In other words, switches that the planner formerly could not tie can now be tied, resulting in higher load ratio within security constraints. This draws the attention to a more accurate calculation of security boundary. Figure 1 shows the load transfer mode after feeder automation (FA).
As is shown in Figure 1, when a fault occurs at T1, in traditional way, all of the load of T1 will be only transferred to T2, because the time of load transfer through feeders is too long. In contrast, with feeder automation, the load of T2 can be transferred not only to T1, but also to T3 in another substation.
The DSSR model in this paper takes both substation transformer N1 and feeder N1 contingency into account. The DSSR is defined as the set of operating points which assure the N1 security of distribution system. An operating point in transmission system is the current power injections of nodes, while, in distribution system, it represents a set of transfer unit load. Consider whereis the operating point, which is an ndimension vector; is transfer unit load. “Transfer unit” is defined as the set of feeder sections of which load has the same backfeed (transfer) path. If two feeders form single loop network, transfer unit load is equivalent to feeder load. If a feeder is connected to two other feeders, which is called twotie connection, the feeder load can be divided into two parts of load, each of which is a transfer unit load. In this paper, feeder load i is denoted by and transfer unitload is denoted by . Take the brief case in Figure 2 as an example.
In Figure 2, feeder 1 forms twotie connection and feeder 2 and feeder 3 form single loop network, respectively, with feeder 1. In normal state, and are both supplied by feeder 1; that is, . When a fault occurs at outlet of feeder 1, S1 and S2 disconnect and S4 closes, and then changes to be supplied by feeder 3, while is supplied by feeder 2 via closing S3. Transfer scheme is usually not unique. Another scheme is that transferring both and to feeder 2 by disconnecting S1 and closing S3. However, multischeme makes the DSSR model overcomplicated. Thus, scheme is fixed in this paper, which stipulates that each of the backup feeders restores only one section of the whole faulted feeder, as the first scheme above. More important, this fixed scheme can usually balance the branch load in the postfault network, which is an important index concerned by dispatchers.
The DSSR model in this paper is accurate to the safety monitoring of transfer unit load. We can certainly get feeder load by summing up the transfer unit load and further get transformer load by summing up the feeder load. This is a basis for DSSR model considering both transformer N1 and feeder N1 security.
3. Mathematical Model for DSSR
After the load transfer incurred by tie switches against N1 contingency, all the transformers and feeders cannot be overloading. Since the tieline is designed after the radial network planning, the capacity is considered as enough to transfer load. Therefore, the transformer load and feeder load should be under a series of constraints. The DSSR model can be mathematically formulated as where is the operating point corresponding to . The inequality and equality constraints are such that where = all the load supplied by feeder m; = the load transferred from feeder m to feeder n when an N1 fault occurs at outlet of feeder m; = maximal thermal capacity of feeder ; = the load transferred from transformer to transformer when an N1 fault occurs at transformer ; = the set of feeders that derive from transformer ; = all of the load supplied by transformer ; means that feeder derives from the corresponding bus of transformer ; = the rated capacity of transformer .
It is notable that the correspondence relation of “” and “” depends on the load transfer scheme. For example, in Figure 2, in the former scheme, ; in the latter scheme, .
Equation (3) shows that the sum of each load to be transferred away from feeder m should be equal to the total load supplied by feeder m in normal state; inequality constraint (4) means that feeders cannot be overloading in the postfault network; (5) shows that path of load transferred from transformer to is the tielines between transformers and . Equation (6) means that load of transformer is equal to the sum of corresponding feeder loads; inequality constraint (7) describes that the load of transformer cannot exceed its rated capacity after a substation transformer N1 contingency.
It should be pointed out that power flow and voltage drop are not taken into consideration in this DSSR model, which determines that the DSSR model is completely linear. Since overloading under contingencies is the most critical problem in urban power, the simple linear model is acceptable from the standpoint of securitybased operation [1]. More importantly, research of [16] has demonstrated that the DSSR model is approximately linear even when considering factors of power flow and voltage drop, which further proves that the linear model is highly approximate to the real DSSR model.
4. Formulation for DSSR Boundary
Research on the boundary of security region has vital significance, because the characteristics determine the application way of DSSR theory [7]. The proposed DSSR model, which is formulated as (2)–(7), cannot distinctly express the DSSR boundary. Therefore, derivation should be performed to transform the original model to a new expression form. Select as research object, and . First, formula (4) can be transformed to Second, substitute formulas (5) and (6) into (7), and then perform identical deformation. We obtain Third, add on both sides of formula (9), and then Finally, according to (8) and (10), the expression of DSSR boundary in direction of can be neatly formulated as
There are boundaries if the system consists of load transfer units. To express the dimension of boundary clearly, we denote all “” by . Because the transfer scheme in this paper is fixed, as is illustrated in Section 2.2, an important equivalence holds as follows:
Through (12), and have onetoone corresponding relation. Above all, the complete and succinct boundary formulation for DSSR is expressed as With the form transformation of DSSR model, corresponding symbols and their meaning should be adjusted too. Thus, and are used for new expression. the number of backfeed feeders of ; = all of the load supplied by the backfeed feeder ; = the set of transfer unit loads, of which both normalfeed and backfeed transformer are the same as those of . It should be pointed out that feeder feeder are not different actual feeders. Take the case in Figure 2 as an example again; when fault occurs, the backfeed feeders of and are both feeder 1, which means feeder b3 = feeder b4 = feeder 1. When any equality in (13) holds, the operating point is just upon the DSSR boundary. We denote the n boundaries by .
The DSSR boundary formulation can also reflect both substation transformer and feeder N1 secure constraints. Take subformula of (13) to concretely explain; shows that transfer of cannot cause the feeder overloading, which ensures that the feeder N1 is secure; shows that transfer of cannot lead to the substation transformer overloading, which ensures that the transformer N1 is secure.
5. Topological Characteristics of DSSR and Mathematical Proof
The research on differential topological characteristics of the DSSR focuses on several aspects as follows.(1)Are there any holes inside the DSSR, that is, the denseness in terms of the topology?(2)Does the boundary of the DSSR have suspension?(3)Could the boundary of the DSSR be expressed with the union of several subsurfaces?
The identical deformation from formulas (2)–(7) to (13) is a breakthrough for the research on topological characteristics of the DSSR. However, to research on these characteristics, formula (13) should be further simplified to obtain the mathematical essence. Take subformula of (13) as research object; the equivalent form is According to formulas (3) and (12), and can be expressed as linear combination of a series of different element “.” Then, formula (14) will be simplified as where and are positive constants. Through formula (14), coefficients and have the following features: Let be a set which consists of operating point . DSSR boundary formulation can be abstracted as where is a vector defined as formula (1). Through formulas (15)(16), matrices and should satisfy Because one integrated subformula is divided into equivalent two parts, as is shown in formula (15), the dimension of is instead of . Here, is both linear space and Euclidean space, which has been proved in [17]. Besides this important premise, we should review some preparation definitions and theorems about topology and Euclidean space, including cluster point, closure, dense set, and hyperplane.
Definition 1 (cluster point). Let be a point in Euclidean space, . If there is a point sequence in set converging to , then is the cluster point of set [17].
Definition 2 (closure). is a subset of topological space; represents all the points inside and cluster points of , and then is called closure of [18].
Theorem 3. If the is a subset of , , then is dense in [18].
Theorem 4. Let be a subspace of linear space ; is a fixed vector which does not belong to generally. Considering set which consists of the vector , is obtained by where vector varies in the whole subspace . Thus, is called hyperplane. The dimension of equals that of subspace [17].
The topological characteristics of DSSR are mathematically proved in the following section.
Characteristic 1. The is dense inside.
Proof. First, a new set is defined as the set of all points of except those on boundaries. meets
Select randomly a vector from , and then construct a sequence as the following formula:
According to (20)(21), we obtain
Therefore, sequence is inside . Let be the distance between and in Euclidean space, and then
This means that, for any vector in , sequence exists and converges to , and is also inside . Therefore, any point inside is cluster point of .
Similarly, select vector which is just upon boundary of Ω_{DSSR}:
Construct a sequence :
Then we obtain
According to formula (26), sequence is also inside . Through the following
We obtain that any point just upon the boundary is also cluster point of . Above all, cluster points of include not only all the points inside but also all the points just upon the boundaries of . Thus, the following formula holds:
Through Theorem 3, is dense in . This proof is completed.
Characteristic 2. The boundary of has no suspension.
Proof. This characteristic can be approximately simplified to prove that any 2dimension crosssection of is convex polygon. For , select a 2dimension crosssection by taking and as variables and in another dimension as constants. According to formula (16), the coefficient of (including variable and constant ones) can be only 1 or 0; thus, in process of dimension reduction, and are simply constrained by
The shape of 2dimension crosssection varies with the values of , , and , as is shown in Figure 3. The dashed oblique line represents .
As is shown in Figure 3, the shapes of 2dimension section are confined to rectangle, triangle, ladder, and convex pentagon. This means that any 2dimension section of DSSR is convex polygon, which proves that the boundary of has no suspension in an indirect way. The proof is completed.
Characteristic 3. The boundary can be expressed with several subsurfaces.
Proof. is a set of vector , each of which satisfies nonhomogeneous linear equation set
where matrices and meet formula (18) and is the operating point just upon the boundary of . Let be a fixed solution of equation set (31). Meanwhile, is a subspace of , which consists of ; that is, varies in the whole subspace . The coordinates of meet the following homogeneous linear equation set:
If is a solution of (31), is obviously a solution of equation set (30); that is, is included in set . Meanwhile, is not in . Through Theorem 3, is hyperplane. The boundary of can be expressed with hyperplane, that is, several subsurfaces. Because the dimension of is , the dimension of hyperplane is also . This proof is completed.
In transmission area, topological characteristics of security region (SR) have been deeply studied [7]. It has shown that the boundary of SR has no suspension and is compact and approximately linear; there is no hole inside the SR. The proof above demonstrates that characteristics of DSSR are similar but it has its own features. (a)DSSR is a convex set of denseness in terms of the topology. This means that DSSR has no holes inside and its boundary has no suspension. Based on this feature, dispatchers can analyze the security of operating point by judging whether the point is inside the DSSR boundary, without being afraid of any insecure point inside or losing security points. (b)DSSR boundary can be described by hyperplane (several Euclidean subsurfaces); meanwhile, the boundary is more linear than that of SR. In practical application, calculation of high dimensional security region will incur great computation burdens and consume large amount of time. Therefore, this characteristic will improve the computational efficiency.
6. Case Study
In order to verify the effectiveness of the proposed model, two cases are illustrated in this section. The first one is a test case, and the second is a practical case.
6.1. Test Case
6.1.1. Overview of Test Case
As is shown in Figure 4, the grid is comprised of 4 substations, 8 substation transformers, and 75 feeders. 68 feeders form 34 single loop networks, and 7 form twotie connections, resulting in 82 load transfer units. The total capacity of substations is 412 MVA. To illustrate the modeling process clearly, each load transfer unit is numbered. Case profile is shown in Table 1.

The conductor type of all feeders is LGJ185 (8.92 MVA). This type is selected based on the national electrical code in China.
6.1.2. Boundary Formulation
The test case grid has 75 feeders; 14 feeders form 7 twotie connections. Each load of these 7 feeders can be divided into 2 parts to transfer in different backfeed path. So the number of load transfer units is 82, which means that the dimension of operation point W is 82 and the number of subformulas of DSSR boundary is 82. Based on the topology of the test case, we substitute the rated capacity of substation transformers and feeders into and of formula (13). Then, the boundary formulation for DSSR of test case can be expressed as
Considering the similarity of calculation approach of each boundary and thesis length, we present 5 subformulas of here. Complete formulation is given in the appendix (in the Supplementary Material available online at http://dx.doi.org/10.1155/2014/327078). Take the first subformula in (32) as an example to explain the modeling process. Figure 5 shows the local topology related with , including all relative transfer units in the first subformula.
First, analyze the topology and determine the parameters of formula (13). We know that backfeed feeder of is feeder 36 and the backfeed substation transformer of is T5. In normal state, and are all load of T5, which means ; and are load of feeder 36, which means . are the load transferred from T1 to T5 when fault occurs at T1, which means . Therefore, the formula of B_{1} is preliminary expressed as Second, according to case profile, substitute = 8.92 MVA and = 63 MVA, into formula (33), and then we obtain
6.1.3. Visualization and Topological Characteristics
To visualize the shape of DSSR, the dimension is reduced to 2 and 3, which means that the coordinates of should be constants other than those to be visualized. Thus, an operating point has to be predetermined to provide the constants. TSC is a special operating point just upon the security boundary [1], on which the facilities are usually fully utilized. The operation of distribution system is closing to the boundaries and load level is reaching TSC. Thus, in this test case, we select the TSC point as the predetermined operating point , which is shown in Table 2. The calculation approach for TSC has been presented in [15].

Choose randomly transfer unit loads and to observe. Substitute the rated capacity of transformers T1~T6, capacity of all feeders, and all transfer unit loads other than and , into formula (32). Then the 2D DSSR shown in Figure 6 is obtained.
Although the dimension is 2, the number of subformulas which constrain the figure shape is not just 2. In fact, each of the subformulas which contains or should be considered. But the subformulas with more severe constraints will cover the others and finally form the DSSR boundary. The final formulation of 2D figure is
Similarly, we choose randomly transfer unit loads , , and to observe, and then the 3D DSSR is obtained, as is shown in Figure 7.
In Figure 6, it can be seen that the 2D DSSR is a dense rectangle, of which boundaries are linear without suspension. In Figure 7, the 3D DSSR is surrounded by several subplanes, forming a convex pentagon, that is, a special 3dimension hyperplane.
6.2. Practical Case
In this section, the assessment and control method based on DSSR is demonstrated on a real mediumvoltage distribution network of one city in southern China, which consists of 12 substations, 26 substation transformers, and 114 main feeders, as is shown in Figure 8. Total capacity of substation transformers is 1094.5 MVA. It is notable that each two of all main feeders form a single loop network in this case, which leads to the fact that the number of main feeders is equal to that of load transfer units.
Paper [1] has presented concept and calculation method of relative location of operating point in DSSR based on substation transformer contingency. Similarly, in this paper, relative location describes the distance from the operating point to the boundary :
is an index which is applied in security assessment. Here is an example. Let be an insecure operating point. Each transfer unit load of is 0.8 times of TSC load in the practical case, except and , while MVA and MVA. Total load of is 508.7 MVA, while TSC is 628.9 MVA. Average load rate is 0.46. That means that current operating point can be controlled back to security region. Through formula (36), the location of a given operating point in DSSR can be calculated. We present the of which are negative in Table 3.

Table 3 shows that the system should lose 3.222 MVA if fault occurs at feeder 1 or feeder 10, so the system is locally overloading. The location of W_{1} can be easily observed in Figure 9. To meet operational constraints under N1 contingency, and should be adjusted. For example, is adjusted to through the dashed arrow shown in Figure 9. The location of is shown in Table 4.

7. Conclusion and Further Work
This paper proposes a mathematical model for distribution system security region (DSSR); generic topological characteristics of DSSR are discussed and proved.
First, the operating point for a distribution system is defined as the set of transfer unit loads, which is a vector in the Euclidean space. Then, the DSSR model for both substation transformer and feeder contingency is proposed, which is the set of all operating points; each ensures that the system N1 is secure.
Second, to perform research on the characteristic of DSSR, the boundary formulation for DSSR is derived from the DSSR model. Then, three generic characteristics are proposed and proved by rigor mathematical approach, which are as follows: DSSR is dense inside; DSSR boundary has no suspension; DSSR boundary can be expressed with the union of several subsurfaces.
Finally, the results from a test case and a practical case demonstrate the effectiveness of the proposed model. The visualization for DSSR boundary is also discussed to verify the topological characteristics of DSSR. Security assessment method based on DSSR is preliminary exhibited to show the applicability of DSSR for future smart distribution system.
This paper improves the accuracy and understanding of DSSR, which is fundamental theoretic work for future smart distribution system. Further works to improve the accuracy of DSSR model include fully considering power flow, voltage constraints, and integration of DGs.
Conflict of Interests
The authors declare that there is no conflict of interests regarding the publication of this paper. None of the authors have a commercial interest, financial interest, and/or other relationship with manufacturers of pharmaceuticals,laboratory supplies, and/or medical devices or with commercialproviders of medically related services.
Acknowledgments
This work was supported by the National Natural Science Foundation of China (no. 51277129) and National High Technology Research and Development Program of China (863 Program) (no. 2011AA05A117).
Supplementary Materials
This supplementary material contains the complete DSSR boundary formulation of test case in main text, 6.1. The boundary formulation consists of 82 subformulas, of which 5 subformulas are shown as an example in the main text due to the space limitation.
References
 J. Xiao, W. Gu, C. Wang, and F. Li, “Distribution system security region: definition, model and security assessment,” IET Generation, Transmission & Distribution, vol. 6, no. 10, pp. 1029–1035, 2012. View at: Publisher Site  Google Scholar
 State Grid Corporation of China, Guidelines of Urban Power Network Planning, State Grid Corporation of China, Beijing, China, 2006 (Chinese).
 E. Lakervi and E. J. Holmes, Electricity Distribution Network Design, IET, Peregrinus, UK, 1995.
 K. N. Miu and H. D. Chiang, “Service restoration for unbalanced radial distribution systems with varying loads: solution algorithm,” in Proceedings of the IEEE Power Engineering Society Summer Meeting, vol. 1, pp. 254–258, 1999. View at: Google Scholar
 Y. X. Yu, “Security region of bulk power system,” in Proceedings of the International Conference on Power System Technology (PowerCon '02), vol. 1, pp. 13–17, Kunming, China, October 2002. View at: Publisher Site  Google Scholar
 F. Wu and S. Kumagai, “Steadystate security regions of power systems,” IEEE Transactions on Circuits and Systems, vol. 29, no. 11, pp. 703–711, 1982. View at: Publisher Site  Google Scholar  MathSciNet
 Y. Yu, Y. Zeng, and F. Feng, “Differential topological characteristics of the DSR on injection space of electrical power system,” Science in China E. Technological Sciences, vol. 45, no. 6, pp. 576–584, 2002. View at: Google Scholar  MathSciNet
 S. J. Chen, Q. X. Chen, Q. Xia, and C. Q. Kang, “Steadystate security assessment method based on distance to security region boundaries,” IET Generation, Transmission & Distribution, vol. 7, no. 3, pp. 288–297, 2013. View at: Publisher Site  Google Scholar
 D. M. Staszesky, D. Craig, and C. Befus, “Advanced feeder automation is here,” IEEE Power and Energy Magazine, vol. 3, no. 5, pp. 56–63, 2005. View at: Publisher Site  Google Scholar
 C. L. Smallwood and J. Wennermark, “Benefits of distribution automation,” IEEE Industry Applications Magazine, vol. 16, no. 1, pp. 65–73, 2010. View at: Publisher Site  Google Scholar
 X. Mamo, S. Mallet, T. Coste, and S. Grenard, “Distribution automation: the cornerstone for smart grid development strategy,” in Proceedings of the IEEE Power & Energy Society General Meeting (PES '09), pp. 1–6, July 2009. View at: Google Scholar
 P. W. Sauer, B. C. Lesieutre, and M. A. Pai, “Maximum loadability and voltage stability in power systems,” International Journal of Electrical Power & Energy Systems, vol. 15, no. 3, pp. 145–153, 1993. View at: Publisher Site  Google Scholar
 K. N. Miu and H. Chiang, “Electric distribution system load capability: problem formulation, solution algorithm, and numerical results,” IEEE Transactions on Power Delivery, vol. 15, no. 1, pp. 436–442, 2000. View at: Publisher Site  Google Scholar
 F. Z. Luo, C. S. Wang, J. Xiao, and S. Ge, “Rapid evaluation method for power supply capability of urban distribution system based on N1 contingency analysis of maintransformers,” International Journal of Electrical Power and Energy Systems, vol. 32, no. 10, pp. 1063–1068, 2010. View at: Publisher Site  Google Scholar
 J. Xiao, F. X. Li, W. Z. Gu, C. S. Wang, and P. Zhang, “Total supply capability and its extended indices for distribution systems: definition, model calculation and applications,” IET Generation, Transmission and Distribution, vol. 5, no. 8, pp. 869–876, 2011. View at: Publisher Site  Google Scholar
 J. Xiao, X. X. Gong, and C. S. Wang, “Topology properties and algorithm of N1 security boundary for smart grid,” Proceedings of the CSEE, vol. 34, no. 4, pp. 545–554, 2014 (Chinese). View at: Google Scholar
 G. E. Shilov, An Introduction to the Theory of Linear Spaces, Dover, New York, NY. USA, 1975. View at: MathSciNet
 J. R. Munkres, Topology, vol. 2, Prentice Hall, Upper Saddle River, NJ, USA, 2000.
Copyright
Copyright © 2014 Jun Xiao et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.