Automated Verification of LV Network Topologies

Maizura Mokhtar, Valentin Robu, David Flynn, Ciaran Higgins, Jim Whyte, Fiona Fulton

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)
5 Downloads (Pure)

Abstract

The increasing penetration of low carbon technologies and electric vehicles is expected to place a considerable burden to Low Voltage (LV) power distribution networks. The previously passive management of LV networks will no longer be sustainable to cope with this growth. A more proactive approach is required to manage LV networks, usually achieved by using Power System State Estimation (PSSE) tools. The effective use of PSSE tools however, requires accurate reporting of each LV network's topology and configuration of assets (cables) that compose it. This paper presents a method for ongoing accuracy improvement of the LV networks topologies, by automating the process of approximating missing cable information and validating the network architectures. The method proposed was derived based on the assumptions that a specific network infrastructure was selected to meet a certain distributed customer loading requirement. The results obtained agrees with the assumptions, providing also a mechanism that scores the confidence level for the choices made to approximate any missing asset information.
Original languageEnglish
Title of host publication2018 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe)
PublisherIEEE
ISBN (Electronic)9781538645055
DOIs
Publication statusPublished - 13 Dec 2018
Event8th IEEE PES Innovative Smart Grid Technologies Conference Europe - Sarajevo, Bosnia and Herzegovina
Duration: 21 Oct 201825 Oct 2018

Seminar

Seminar8th IEEE PES Innovative Smart Grid Technologies Conference Europe
Abbreviated title2018 IEEE PES ISGT Europe
Country/TerritoryBosnia and Herzegovina
CitySarajevo
Period21/10/1825/10/18

Fingerprint

Dive into the research topics of 'Automated Verification of LV Network Topologies'. Together they form a unique fingerprint.

Cite this