<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article article-type="brief-report" dtd-version="2.3" xml:lang="EN" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Energy Res.</journal-id>
<journal-title>Frontiers in Energy Research</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Energy Res.</abbrev-journal-title>
<issn pub-type="epub">2296-598X</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">881081</article-id>
<article-id pub-id-type="doi">10.3389/fenrg.2022.881081</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Energy Research</subject>
<subj-group>
<subject>Brief Research Report</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>Optimal Allocation of Emergency Repair Resources for Producer&#x2013;Consumer Communities Considering Fault Risk Classification and Emergency Repair Response Capability</article-title>
<alt-title alt-title-type="left-running-head">Mao and Qiu</alt-title>
<alt-title alt-title-type="right-running-head">Emergency Repair Resource Allocation Method</alt-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname>Mao</surname>
<given-names>Donghua</given-names>
</name>
<uri xlink:href="https://loop.frontiersin.org/people/1737067/overview"/>
</contrib>
<contrib contrib-type="author" corresp="yes">
<name>
<surname>Qiu</surname>
<given-names>Jinyi</given-names>
</name>
<xref ref-type="corresp" rid="c001">&#x2a;</xref>
<uri xlink:href="https://loop.frontiersin.org/people/1685119/overview"/>
</contrib>
</contrib-group>
<aff>
<institution>State Grid Zhejiang Xinchang Electric Power Supply Co</institution>, <addr-line>Shaoxing</addr-line>, <country>China</country>
</aff>
<author-notes>
<fn fn-type="edited-by">
<p>
<bold>Edited by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1259738/overview">Jian Zhao</ext-link>, Shanghai University of Electric Power, China</p>
</fn>
<fn fn-type="edited-by">
<p>
<bold>Reviewed by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1706696/overview">Yi He</ext-link>, Hong Kong Polytechnic University, Hong Kong, SAR China</p>
<p>
<ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1122261/overview">Dazhong Ma</ext-link>, Northeastern University, China</p>
<p>
<ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1706638/overview">Zhekang Dong</ext-link>, Hangzhou Dianzi University, China</p>
</fn>
<corresp id="c001">&#x2a;Correspondence: Jinyi Qiu, <email>763434451@qq.com</email>
</corresp>
<fn fn-type="other">
<p>This article was submitted to Process and Energy Systems Engineering, a section of the journal Frontiers in Energy Research</p>
</fn>
</author-notes>
<pub-date pub-type="epub">
<day>24</day>
<month>05</month>
<year>2022</year>
</pub-date>
<pub-date pub-type="collection">
<year>2022</year>
</pub-date>
<volume>10</volume>
<elocation-id>881081</elocation-id>
<history>
<date date-type="received">
<day>22</day>
<month>02</month>
<year>2022</year>
</date>
<date date-type="accepted">
<day>13</day>
<month>04</month>
<year>2022</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#xa9; 2022 Mao and Qiu.</copyright-statement>
<copyright-year>2022</copyright-year>
<copyright-holder>Mao and Qiu</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/">
<p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p>
</license>
</permissions>
<abstract>
<p>With the construction of new power systems, distributed power sources are connected in large numbers and the possibility of faults increases. The optimal allocation of repair resources is important to improve the fault management efficiency and the quality of power supply services in the producer&#x2013;consumer community. Using a large number of historical fault resources accumulated in the producer&#x2013;consumer community, we first preprocess the fault information by the rough set theory, then establish an optimal allocation model that minimizes the total fault loss, consider fault risk classification and repair response capability, and finally use the improved gray wolf optimization algorithm to perform the optimal calculation. To address the problems of the traditional gray wolf algorithm, tent mapping is introduced in the generation of the initial population to enhance the uniformity of the initial population. The cooperative competition mechanism is introduced to improve the utilization of effective information among individuals. Finally, the feasibility and superiority of the algorithm are verified through the analysis of calculation cases. Finally, the feasibility of this configuration method is verified through the analysis of arithmetic cases.</p>
</abstract>
<kwd-group>
<kwd>production and consumption community</kwd>
<kwd>fault risk classification</kwd>
<kwd>emergency response capability</kwd>
<kwd>optimal configuration</kwd>
<kwd>improved gray wolf algorithm</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1">
<title>1 Introduction</title>
<p>With the deepening reform of China&#x2019;s energy market and the development context of the transformation of the power system to low carbon, a large number of decentralized and small-scale distributed energy sources are bound to appear in the future distribution network (<xref ref-type="bibr" rid="B1">Bo et al., 2015</xref>; <xref ref-type="bibr" rid="B7">Mu et al., 2021</xref>). In recent years, under the pressure of climate change, people have become increasingly concerned about new energy sources, and with the steady construction of new power systems, the form of zonal autonomy among producer&#x2013;consumer communities has become more and more obvious (<xref ref-type="bibr" rid="B12">Zhang et al., 2021</xref>). Variability and uncertainty, important characteristics of distributed renewable energy, will directly affect the possibility of fault occurrence within the producer&#x2013;consumer community. Moreover, transformer&#x2013;customer relationship management has become one of the latest challenges due to the large number of end customers in the low-voltage distribution system and the lack of measurement equipment (<xref ref-type="bibr" rid="B13">Zhao et al., 2021</xref>). This also makes it more difficult for the producer&#x2013;consumer community to perform emergency repairs. When encountering power outages, customers are more concerned about service indicators such as &#x201c;promptness of arrival,&#x201d; &#x201c;speed of repair,&#x201d; and &#x201c;satisfaction of service,&#x201d; which put forward higher requirements for emergency repair resource allocation strategies. However, although a large amount of historical fault data resources is stored in the distribution system, they are not utilized. Therefore, it is necessary to improve the fault risk classification and repair response capability and to study the optimal allocation technology of repair resources for the producer&#x2013;consumer community under the power resource-sharing mode.</p>
<p>Since DG is not able to support the stable operation of the load for a long time, the study of the fault rescue strategy is particularly important (<xref ref-type="bibr" rid="B5">Lu et al., 2018</xref>). The literature (<xref ref-type="bibr" rid="B11">Zhang et al., 2008</xref>) investigates the multi-objective rescue strategy in the case of multiple faults and proposes a genetic topology hybrid algorithm to optimize the rescue strategy by determining the distribution network fault information through the topology analysis method. In the literature (<xref ref-type="bibr" rid="B6">Lu et al., 2011</xref>), a multi-objective mathematical model of multi-team repair is used for rapid restoration of faulty distribution networks, and the switching operation variables and repair control variables in the model are combined to obtain repair strategies using an optimized multi-objective bacterial population convergence algorithm, which improves the repair efficiency. In the literature (<xref ref-type="bibr" rid="B3">Deng et al., 2017</xref>), a two-layer decision model was established, with the maximum efficiency of the emergency repair grid as the goal in the upper layer and the minimum scheduling cost as the goal in the lower layer. The KKT (Karush&#x2013;Kuhn&#x2013;Tucker) condition was used to convert the two-layer model into a single layer, and the model was solved by an optimized genetic algorithm. Fault recovery and fault repair are two phases, and some scholars have jointly optimized the two phases (<xref ref-type="bibr" rid="B4">Huang et al., 2014</xref>; <xref ref-type="bibr" rid="B10">Yang et al., 2016</xref>). In the literature (<xref ref-type="bibr" rid="B4">Huang et al., 2014</xref>), a simple joint model of fault and repair was developed, and the repair path was obtained by the enumeration method. In the literature (<xref ref-type="bibr" rid="B10">Yang et al., 2016</xref>), the maximum restoration value and the minimum economic loss are the inner and outer objective functions in the repair and restoration phase, respectively, and the minimum network loss and the minimum repair time are the inner and outer objective functions in the repair and grid restoration phases, respectively, to restore the lost load using DG and emergency generators, etc. Most of the existing studies combine fault recovery and fault repair into two phases, without considering the load fluctuation during the repair process, ignoring the synergistic optimization of fault recovery and fault repair and reducing the recovery efficiency.</p>
<p>In this study, we propose an optimal allocation method for emergency repair resources in a producer&#x2013;consumer community considering fault risk classification and emergency repair response capability. The simulation results show that the optimal allocation of repair resources can significantly improve the reliability of power supply services and reduce potential fault losses.</p>
</sec>
<sec id="s2">
<title>2 Preprocessing of Fault Information Based on the Rough Set Theory</title>
<p>Fault information data are the information source for fault risk assessment and the basic component of the in-depth knowledge mining process (<xref ref-type="bibr" rid="B2">Chen et al., 2021</xref>). In order to solve the problems of diversity, noise, and incompleteness of the original data in fault information, discovering the characteristic attributes and classification knowledge from a large amount of sample data and performing attribute simplification, data preprocessing such as data cleaning and integration, incomplete data completion, and data discretization are required (<xref ref-type="bibr" rid="B9">Tian et al., 2016</xref>).</p>
<sec id="s2-1">
<title>2.1 Fault Data Cleaning and Integration</title>
<p>As one of the most important attributes of fault information, the time of fault occurrence and power restoration can be extracted from the data recorded in the original ledger. This time information includes year, quarter, month, day, and hour. of this time point, which can be used for statistical analysis of fault time properties in different depths in all aspects, and also indirectly to obtain information such as fault duration to test the self-healing, repairability, and timeliness of maintenance personnel after the damage occurred in this grid. As one of the most important attributes of fault information, the time of fault occurrence and restoration of power can be extracted from the data recorded in the original ledger. The time information includes year, quarter, month, day, and hour, which can be used to analyze the temporal characteristics of the fault in different depths, and also to indirectly obtain information such as the duration of the fault, in order to test the self-healing, repairability, and timeliness of maintenance after the damage of the power grid here.</p>
<p>The cause of the outage is one of the most important risk factors affecting the results of the grid fault risk assessment, which is mainly extracted from the data recorded in the original ledger to describe the responsibility and cause of the grid outage.</p>
<p>The fault level mainly refers to three levels extracted from the data recorded in the original ledger based on the severity of the fault, i.e., I, II, and III level faults. This fault attribute represents the severity of the consequences of the fault that is important in risk assessment, i.e., the severity of the fault occurrence commonly used in the original risk assessment.</p>
</sec>
<sec id="s2-2">
<title>2.2 Incomplete Fault Data Patching</title>
<p>In this study, in order to improve the correctness of the algorithm and to obtain the most realistic complementary data that better fits the possibility of the system, we use the idea of clustering to select similar samples when selecting data samples. The smaller the distance, the higher the similarity. The formula for calculating the &#x201c;distance&#x201d; between the two samples is:<disp-formula id="e1_1">
<mml:math id="m1">
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:msqrt>
<mml:mrow>
<mml:msup>
<mml:mrow>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>f</mml:mi>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>...</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:msup>
</mml:mrow>
</mml:msqrt>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
<label>(1-1)</label>
</disp-formula>where <inline-formula id="inf1">
<mml:math id="m2">
<mml:mrow>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> refers to the sample <inline-formula id="inf2">
<mml:math id="m3">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> on the attribute <inline-formula id="inf3">
<mml:math id="m4">
<mml:mrow>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> on which the value is taken.</p>
<p>The ROUSTIDA method is based on the identifiable matrix in the rough set as an algorithm to reflect the invisible inner law embodied in the information system as much as possible, and its basic goal is to keep the incomplete object as much as possible with the same property law of similar objects in the original system, i.e., the value difference is as small as possible.</p>
<p>Let the information table system be <inline-formula id="inf4">
<mml:math id="m5">
<mml:mrow>
<mml:mi>S</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo>&#x2329;</mml:mo>
<mml:mi>U</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>A</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>V</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>f</mml:mi>
<mml:mo>&#x232a;</mml:mo>
</mml:mrow>
<mml:mo>,</mml:mo>
<mml:mi>A</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>&#x7c;</mml:mo>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1,2</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>...</mml:mn>
<mml:mo>,</mml:mo>
<mml:mi>m</mml:mi>
</mml:mrow>
</mml:mrow>
</mml:mrow>
<mml:mo>}</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> be the set of attributes, <inline-formula id="inf5">
<mml:math id="m6">
<mml:mrow>
<mml:mi>U</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mn>...</mml:mn>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>n</mml:mi>
</mml:msub>
</mml:mrow>
<mml:mo>}</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> is the thesis domain and <inline-formula id="inf6">
<mml:math id="m7">
<mml:mrow>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> is the sample <inline-formula id="inf7">
<mml:math id="m8">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> on the attribute <inline-formula id="inf8">
<mml:math id="m9">
<mml:mrow>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> which is the value of the sample on the attribute and <inline-formula id="inf9">
<mml:math id="m10">
<mml:mrow>
<mml:mi>M</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> denotes the value of the sample after the expansion matrix in the <inline-formula id="inf10">
<mml:math id="m11">
<mml:mi>i</mml:mi>
</mml:math>
</inline-formula> row <inline-formula id="inf11">
<mml:math id="m12">
<mml:mi>j</mml:mi>
</mml:math>
</inline-formula> elements of the column, then the expanded identifiable matrix <inline-formula id="inf12">
<mml:math id="m13">
<mml:mi>M</mml:mi>
</mml:math>
</inline-formula> can be defined as:<disp-formula id="e1_2">
<mml:math id="m14">
<mml:mrow>
<mml:mi>M</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>&#x7c;</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x2208;</mml:mo>
<mml:mi>A</mml:mi>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x2260;</mml:mo>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x2260;</mml:mo>
<mml:mo>&#x2217;</mml:mo>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>a</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x2260;</mml:mo>
<mml:mo>&#x2217;</mml:mo>
</mml:mrow>
<mml:mo>}</mml:mo>
</mml:mrow>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
<label>(1-2)</label>
</disp-formula>where <inline-formula id="inf13">
<mml:math id="m15">
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1,2</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>...</mml:mn>
<mml:mo>,</mml:mo>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf14">
<mml:math id="m16">
<mml:mrow>
<mml:mo>"</mml:mo>
<mml:mo>&#x2217;</mml:mo>
<mml:mo>"</mml:mo>
</mml:mrow>
</mml:math>
</inline-formula> indicates omitted values.</p>
<p>Let the initial information system be <inline-formula id="inf15">
<mml:math id="m17">
<mml:mrow>
<mml:msup>
<mml:mi>S</mml:mi>
<mml:mn>0</mml:mn>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula>, the set of objects is <inline-formula id="inf16">
<mml:math id="m18">
<mml:mrow>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mstyle scriptlevel="+1">
<mml:mfrac>
<mml:mn>0</mml:mn>
<mml:mi>i</mml:mi>
</mml:mfrac>
</mml:mstyle>
</mml:mrow>
<mml:mo>}</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>, and the corresponding extended difference matrix is <inline-formula id="inf17">
<mml:math id="m19">
<mml:mrow>
<mml:msup>
<mml:mi>M</mml:mi>
<mml:mn>0</mml:mn>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula>, the object <inline-formula id="inf18">
<mml:math id="m20">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, the set of missing attributes <inline-formula id="inf19">
<mml:math id="m21">
<mml:mrow>
<mml:mi>M</mml:mi>
<mml:mi>A</mml:mi>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, the set of undifferentiated objects <inline-formula id="inf20">
<mml:math id="m22">
<mml:mrow>
<mml:mi>N</mml:mi>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> , and the information system <inline-formula id="inf21">
<mml:math id="m23">
<mml:mi>S</mml:mi>
</mml:math>
</inline-formula> the set of missing objects of <inline-formula id="inf23">
<mml:math id="m25">
<mml:mrow>
<mml:mi>M</mml:mi>
<mml:mi>O</mml:mi>
<mml:mi>S</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> are defined as:<disp-formula id="e1_3">
<mml:math id="m26">
<mml:mrow>
<mml:mi>N</mml:mi>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:mi>j</mml:mi>
<mml:mrow>
<mml:mo>&#x7c;</mml:mo>
<mml:mrow>
<mml:mi>M</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>&#x3c6;</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>i</mml:mi>
<mml:mo>&#x2260;</mml:mo>
<mml:mi>j</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>j</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1,2</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>...</mml:mn>
<mml:mo>,</mml:mo>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:mrow>
</mml:mrow>
<mml:mo>}</mml:mo>
</mml:mrow>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
<label>(1-3)</label>
</disp-formula>
<disp-formula id="e1_4">
<mml:math id="m27">
<mml:mrow>
<mml:mi>M</mml:mi>
<mml:mi>O</mml:mi>
<mml:mi>S</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mrow>
<mml:mo>&#x7c;</mml:mo>
<mml:mrow>
<mml:mi>M</mml:mi>
<mml:mi>A</mml:mi>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>&#x2260;</mml:mo>
<mml:mi>&#x3c6;</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1,2</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>...</mml:mn>
<mml:mo>,</mml:mo>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:mrow>
</mml:mrow>
<mml:mo>}</mml:mo>
</mml:mrow>
<mml:mo>.</mml:mo>
</mml:mrow>
</mml:math>
<label>(1-4)</label>
</disp-formula>
</p>
<p>First, for randomly selected data, a simple discretization is performed.<list list-type="simple">
<list-item>
<p>1) Fault duration a1 [0 &#x223c; 1.5, 1.5 &#x223c; 5.0, 5.0 &#x223c; 15.0, and 15.0&#x2013;506.4]</p>
</list-item>
<list-item>
<p>2) Fault level a2 [Class I failure, Class II failure, and Class III failure]</p>
</list-item>
<list-item>
<p>3) Faulty equipment a3 [Overhead lines and electric sin lines, transformers and busbars, equipment on column, and user equipment]</p>
</list-item>
<list-item>
<p>4) Cause of failure a4 [Problems with the equipment itself, external damage, weather, user impact, and system issues]</p>
</list-item>
</list>
</p>
</sec>
<sec id="s2-3">
<title>2.3 Fault Data Discretization</title>
<p>Since the fault frequency varies with the size of the selected sample base range, this study chooses to use the combination of the equal distance and equal frequency method and draws on the idea of &#x201c;adjacent attribute value midpoint&#x201d; to process the original data against the division of the original frequency range.</p>
<p>Let the equidistance division method be based on the number of intervals <inline-formula id="inf24">
<mml:math id="m28">
<mml:mi>K</mml:mi>
</mml:math>
</inline-formula>, the value domain of the numerical property interval <inline-formula id="inf25">
<mml:math id="m29">
<mml:mrow>
<mml:mrow>
<mml:mo>[</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>X</mml:mi>
<mml:mrow>
<mml:mi>min</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>X</mml:mi>
<mml:mrow>
<mml:mi>max</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo>]</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> is divided into intervals whose widths are all <inline-formula id="inf26">
<mml:math id="m30">
<mml:mrow>
<mml:mi>&#x3b4;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mrow>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>X</mml:mi>
<mml:mrow>
<mml:mi>max</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>X</mml:mi>
<mml:mrow>
<mml:mi>min</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mo>/</mml:mo>
<mml:mi>K</mml:mi>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> of <inline-formula id="inf27">
<mml:math id="m31">
<mml:mi>K</mml:mi>
</mml:math>
</inline-formula>. The right end of the breakpoint on the interval can be expressed as <inline-formula id="inf28">
<mml:math id="m32">
<mml:mrow>
<mml:msubsup>
<mml:mi>L</mml:mi>
<mml:mi>i</mml:mi>
<mml:mo>&#x2032;</mml:mo>
</mml:msubsup>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mi>X</mml:mi>
<mml:mrow>
<mml:mi>min</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>i</mml:mi>
<mml:mi>&#x3b4;</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo>,</mml:mo>
<mml:mn>...</mml:mn>
<mml:mo>,</mml:mo>
<mml:mi>K</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>.</p>
<p>Similarly, the equal frequency method divides the value domain of the numerical property interval <inline-formula id="inf29">
<mml:math id="m33">
<mml:mrow>
<mml:mrow>
<mml:mo>[</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>X</mml:mi>
<mml:mrow>
<mml:mi>min</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>X</mml:mi>
<mml:mrow>
<mml:mi>max</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo>]</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> into an equal number of objects in the interval <inline-formula id="inf30">
<mml:math id="m34">
<mml:mi>K</mml:mi>
</mml:math>
</inline-formula>. The right end of the breakpoint on the attribute is obtained as <inline-formula id="inf31">
<mml:math id="m35">
<mml:msubsup>
<mml:mi>L</mml:mi>
<mml:mi>p</mml:mi>
<mml:mo>&#x2033;</mml:mo>
</mml:msubsup>
</mml:math>
</inline-formula>.</p>
<p>Let the equal distance and equal frequency correspond to the first <inline-formula id="inf32">
<mml:math id="m36">
<mml:mi>P</mml:mi>
</mml:math>
</inline-formula>. The breakpoints at the right end of the interval are <inline-formula id="inf33">
<mml:math id="m37">
<mml:mrow>
<mml:mi>L</mml:mi>
<mml:mstyle scriptlevel="+1">
<mml:mfrac>
<mml:mo>&#x2032;</mml:mo>
<mml:mi>p</mml:mi>
</mml:mfrac>
</mml:mstyle>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf34">
<mml:math id="m38">
<mml:mrow>
<mml:msubsup>
<mml:mi>L</mml:mi>
<mml:mi>p</mml:mi>
<mml:mo>&#x2033;</mml:mo>
</mml:msubsup>
</mml:mrow>
</mml:math>
</inline-formula> , then the new breakpoint is <inline-formula id="inf35">
<mml:math id="m39">
<mml:mrow>
<mml:msub>
<mml:mi>L</mml:mi>
<mml:mi>p</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:msqrt>
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:msubsup>
<mml:mi>L</mml:mi>
<mml:mi>p</mml:mi>
<mml:mrow>
<mml:mo>&#x2032;</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msubsup>
<mml:mo>&#x2b;</mml:mo>
<mml:msubsup>
<mml:mi>L</mml:mi>
<mml:mi>p</mml:mi>
<mml:mrow>
<mml:mo>&#x2032;</mml:mo>
<mml:mo>&#x2032;</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:mfrac>
</mml:mrow>
</mml:msqrt>
</mml:mrow>
</mml:math>
</inline-formula>. Then, the first <inline-formula id="inf36">
<mml:math id="m40">
<mml:mi>P</mml:mi>
</mml:math>
</inline-formula> range of the first interval is changed to <inline-formula id="inf37">
<mml:math id="m41">
<mml:mrow>
<mml:mrow>
<mml:mo>[</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>L</mml:mi>
<mml:mrow>
<mml:mi>p</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>L</mml:mi>
<mml:mi>p</mml:mi>
</mml:msub>
</mml:mrow>
<mml:mo>]</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>.</p>
</sec>
</sec>
<sec id="s3">
<title>3 Emergency Repair Resource Optimization Allocation Model</title>
<sec id="s3-1">
<title>3.1 Objective Function</title>
<p>This study constructs an optimization model for the allocation of emergency repair resources in the producer&#x2013;consumer community with the objective of minimizing the total potential fault loss. The objective function is as follows:<disp-formula id="e2_1">
<mml:math id="m42">
<mml:mrow>
<mml:msub>
<mml:mi>C</mml:mi>
<mml:mi>F</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mi>W</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mfrac>
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mi>n</mml:mi>
</mml:munderover>
<mml:mrow>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:msub>
<mml:mi>L</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mstyle>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mi>S</mml:mi>
<mml:mo>&#x2211;</mml:mo>
</mml:msub>
</mml:mrow>
</mml:mfrac>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mi>W</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mi>n</mml:mi>
</mml:munderover>
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mi>L</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mi>V</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mstyle>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
<label>(2-1)</label>
</disp-formula>
</p>
<p>where W<sub>1</sub> and W<sub>2</sub> are the weight values of the fault risk classification and fault repair response capability, respectively. S<sub>i</sub> represents the fault subline classification of each producer and consumer, L<sub>i</sub> represents the distance between the repair station and each producer, and V<sub>i</sub> represents the speed between the repair station and each producer.</p>
</sec>
<sec id="s3-2">
<title>3.2 Fault Risk Classification</title>
<p>In this study, two aspects, frequency and time, as well as percentage indicators, are selected to deal with the quantification of fault risk in the producer&#x2013;consumer community in a certain way. Based on the fault attribute categories derived from the collation and with reference to the regulations, such as the &#x201c;Power Supply Reliability Regulations for Power Supply Systems,&#x201d; and combined with the assessment process, indicators such as the number of fault occurrences, the percentage of fault attributes, the average outage time of faults, and the probability of faults are selected.</p>
<p>In order to evaluate the risk of outage in the producer&#x2013;consumer community, the risk calculation method presented in this study is to establish a fault benchmark risk index system, as shown in <xref ref-type="fig" rid="F1">Figure 1</xref> quantify the probability and consequence of fault occurrence to obtain the fault probability and consequence values, which initially reflect the risk value of fault outage and then consider the influence of the remaining fault attributes and other factors on the probability of fault occurrence and the consequence of fault, and perform the corresponding calculation to obtain the integrated fault probability value and integrated fault consequence value. The calculation is based on these values.</p>
<fig id="F1" position="float">
<label>FIGURE 1</label>
<caption>
<p>Fault risk indicator system framework diagram.</p>
</caption>
<graphic xlink:href="fenrg-10-881081-g001.tif"/>
</fig>
<p>Based on the concepts related to risk assessment, the formula for the failure risk value can be derived:<disp-formula id="equ1">
<mml:math id="m43">
<mml:mrow>
<mml:mtext>Failure&#xa0;risk&#xa0;value&#xa0;</mml:mtext>
<mml:mo>&#x3d;</mml:mo>
<mml:mtext>&#xa0;integrated&#xa0;failure&#xa0;probability&#xa0;value&#xa0;</mml:mtext>
<mml:mo>&#xd7;</mml:mo>
<mml:mtext>&#xa0;integrated&#xa0;failure&#xa0;consequence&#xa0;value</mml:mtext>
<mml:mtext>.</mml:mtext>
</mml:mrow>
</mml:math>
</disp-formula>
</p>
<p>Since the risk of failure in the producer&#x2013;consumer community does not depend only on itself but also is influenced by factors related to the geographical area of the failure and the weather of the failure, etc., and the influence of the remaining attributes of the producer&#x2013;consumer community indicator system on the main risk indicators is introducedas follows:<list list-type="simple">
<list-item>
<p>1) Number of failures, n</p>
</list-item>
</list>
</p>
<p>Within the statistical data information, the number of failures under different fault attributes is indicated by n, and the statistical unit is [times]. For example, the number of failures in different regions, the number of failures at different times, and the number of failures in different devices, etc.<list list-type="simple">
<list-item>
<p>2) Probability of failure properties, <inline-formula id="inf38">
<mml:math id="m44">
<mml:mi>&#x3bb;</mml:mi>
</mml:math>
</inline-formula>
</p>
</list-item>
</list>
</p>
<p>Within the statistical data message, the proportion of the number of counts of the lower-level attributes of a fault attribute value to the total number of this fault attribute, is expressed as <inline-formula id="inf39">
<mml:math id="m45">
<mml:mi>&#x3bb;</mml:mi>
</mml:math>
</inline-formula>, and the statistical units are expressed as decimal points. For example, in the fault attribute weather factor, the occurrence of high winds as a percentage of all fault causes is weather conditions.<disp-formula id="e2_2">
<mml:math id="m46">
<mml:mrow>
<mml:mi>&#x3bb;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mi>n</mml:mi>
<mml:mrow>
<mml:msub>
<mml:mi>n</mml:mi>
<mml:mo>&#x2211;</mml:mo>
</mml:msub>
</mml:mrow>
</mml:mfrac>
<mml:mo>.</mml:mo>
</mml:mrow>
</mml:math>
<label>(2-2)</label>
</disp-formula>
<list list-type="simple">
<list-item>
<p>3) Average power outage time for faults, <inline-formula id="inf40">
<mml:math id="m47">
<mml:mrow>
<mml:mi>S</mml:mi>
<mml:mi>A</mml:mi>
<mml:mi>I</mml:mi>
<mml:mi>D</mml:mi>
<mml:mi>I</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>
</p>
</list-item>
</list>
</p>
<p>Within the statistical data information, the average number of hours of outages for fault outages, in statistical units [h/time], is expressed in <inline-formula id="inf41">
<mml:math id="m48">
<mml:mrow>
<mml:mi>S</mml:mi>
<mml:mi>A</mml:mi>
<mml:mi>I</mml:mi>
<mml:mi>D</mml:mi>
<mml:mi>I</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>. <inline-formula id="inf42">
<mml:math id="m49">
<mml:mi>T</mml:mi>
</mml:math>
</inline-formula> is the fault outage time. <inline-formula id="inf43">
<mml:math id="m50">
<mml:mi>N</mml:mi>
</mml:math>
</inline-formula> is the number of fault outages. For example, the average number of hours of fault outages in spring for urban faults in a region is as follows:<disp-formula id="e2_3">
<mml:math id="m51">
<mml:mrow>
<mml:mi>S</mml:mi>
<mml:mi>A</mml:mi>
<mml:mi>I</mml:mi>
<mml:mi>D</mml:mi>
<mml:mi>I</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mi>T</mml:mi>
<mml:mi>N</mml:mi>
</mml:mfrac>
<mml:mo>.</mml:mo>
</mml:mrow>
</mml:math>
<label>(2-3)</label>
</disp-formula>
</p>
</sec>
<sec id="s3-3">
<title>3.3 Fault Repair Response Capability</title>
<p>Based on the known geographical latitude and longitude information of the producer&#x2013;consumer distribution, the distance between the producer&#x2013;consumer and the ideal repair station is first calculated by applying the inverse half-positive sagittal function, then the time required to reach the repair location is calculated by considering the actual fault repair process, and finally the fault repair response capability is evaluated according to the required time.<list list-type="simple">
<list-item>
<p>1) Calculation of the distance between the producer and the ideal repair station</p>
</list-item>
</list>
</p>
<p>For any two points on the sphere, the semi-positive vector of the circular center angle can be calculated by the following equation:<disp-formula id="equ2">
<mml:math id="m52">
<mml:mrow>
<mml:mi>hav</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mfrac>
<mml:mi>d</mml:mi>
<mml:mi>r</mml:mi>
</mml:mfrac>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>hav</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>&#x3c6;</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>&#x3c6;</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>cos</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>&#x3c6;</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mi>cos</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>&#x3c6;</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mi>hav</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>&#x3bb;</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>&#x3bb;</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
</disp-formula>
</p>
<p>where hav is an abbreviation for semi-positive vector function, d is the distance between two points, r is the radius of the ball, <inline-formula id="inf44">
<mml:math id="m53">
<mml:mrow>
<mml:msub>
<mml:mi>&#x3b8;</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:msub>
<mml:mi>&#x3b8;</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is the latitude of point1 and the latitude of point2, measured in radians, and <inline-formula id="inf45">
<mml:math id="m54">
<mml:mrow>
<mml:msub>
<mml:mi>&#x3bb;</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:msub>
<mml:mi>&#x3bb;</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is the longitude of the point1 and the longitude of the point2, measured in radians.</p>
<p>
<inline-formula id="inf46">
<mml:math id="m55">
<mml:mi>d</mml:mi>
</mml:math>
</inline-formula> can be solved by applying the inverse semi-sine function or by using the inverse sine function:<disp-formula id="equ3">
<mml:math id="m56">
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>r</mml:mi>
<mml:mi>archav</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>h</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>2</mml:mn>
<mml:mi>r</mml:mi>
<mml:mo>&#x2061;</mml:mo>
<mml:mi>arcsin</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msqrt>
<mml:mi>h</mml:mi>
</mml:msqrt>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
</disp-formula>
<disp-formula id="equ4">
<mml:math id="m57">
<mml:mrow>
<mml:mi>h</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>hav</mml:mi>
<mml:mfrac>
<mml:mi>d</mml:mi>
<mml:mi>r</mml:mi>
</mml:mfrac>
<mml:mo>.</mml:mo>
</mml:mrow>
</mml:math>
</disp-formula>
</p>
<p>Substitute to get<disp-formula id="equ5">
<mml:math id="m58">
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>2</mml:mn>
<mml:mi>r</mml:mi>
<mml:mo>&#x2061;</mml:mo>
<mml:mi>arcsin</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msqrt>
<mml:mrow>
<mml:mi>hav</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>&#x3c6;</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>&#x3c6;</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>cos</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>&#x3c6;</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mi>cos</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>&#x3c6;</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mi>hav</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>&#x3bb;</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>&#x3bb;</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:msqrt>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
</disp-formula>
<disp-formula id="equ6">
<mml:math id="m59">
<mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>2</mml:mn>
<mml:mi>r</mml:mi>
<mml:mo>&#x2061;</mml:mo>
<mml:mi>arcsin</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msqrt>
<mml:mrow>
<mml:msup>
<mml:mrow>
<mml:mi>sin</mml:mi>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mi>&#x3c6;</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>&#x3c6;</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:mfrac>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>cos</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>&#x3c6;</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mi>cos</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>&#x3c6;</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:msup>
<mml:mrow>
<mml:mi>sin</mml:mi>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mi>&#x3bb;</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>&#x3bb;</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mn>2</mml:mn>
</mml:mfrac>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:msqrt>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>.</mml:mo>
</mml:mrow>
</mml:math>
</disp-formula>
<list list-type="simple">
<list-item>
<p>2) Calculation of the time required to rush to the repair site</p>
</list-item>
</list>
</p>
<p>Considering the fault repair process, the road congestion coefficient and road curvature coefficient can be set to <inline-formula id="inf47">
<mml:math id="m60">
<mml:mi>a</mml:mi>
</mml:math>
</inline-formula> and <inline-formula id="inf48">
<mml:math id="m61">
<mml:mi>&#x3bb;</mml:mi>
</mml:math>
</inline-formula>, respectively, and the average speed of the vehicle in which the repair personnel are traveling is <inline-formula id="inf49">
<mml:math id="m62">
<mml:mi>v</mml:mi>
</mml:math>
</inline-formula> and <inline-formula id="inf50">
<mml:math id="m63">
<mml:mi>i</mml:mi>
</mml:math>
</inline-formula> is the repair station and <inline-formula id="inf51">
<mml:math id="m64">
<mml:mi>j</mml:mi>
</mml:math>
</inline-formula> for the production and elimination of the person, which can be obtained in the time to the repair point <inline-formula id="inf52">
<mml:math id="m65">
<mml:mrow>
<mml:msub>
<mml:mi>T</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> that can be calculated according to the following formula.<disp-formula id="equ7">
<mml:math id="m66">
<mml:mrow>
<mml:msub>
<mml:mi>T</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mrow>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>d</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:mi>a</mml:mi>
<mml:mo>&#x22c5;</mml:mo>
<mml:mi>&#x3bb;</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mo>/</mml:mo>
<mml:mi>v</mml:mi>
</mml:mrow>
<mml:mo>.</mml:mo>
</mml:mrow>
</mml:math>
</disp-formula>
<list list-type="simple">
<list-item>
<p>3) The calculation of the maximum time to repair the road</p>
</list-item>
</list>
</p>
<p>Assuming that the total time specified by the power company to reach the emergency repair site at the latest is <inline-formula id="inf53">
<mml:math id="m67">
<mml:mrow>
<mml:msub>
<mml:mi>T</mml:mi>
<mml:mrow>
<mml:mi>max</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>. The maximum time to reach the urban area is 40&#xa0;min, i.e., <inline-formula id="inf54">
<mml:math id="m68">
<mml:mrow>
<mml:msub>
<mml:mi>T</mml:mi>
<mml:mrow>
<mml:mi>max</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>40</mml:mn>
<mml:mtext>mins</mml:mtext>
</mml:mrow>
</mml:math>
</inline-formula>, and the maximum time to reach the suburban area is 60&#xa0;min, i.e., <inline-formula id="inf55">
<mml:math id="m69">
<mml:mrow>
<mml:msub>
<mml:mi>T</mml:mi>
<mml:mrow>
<mml:mi>max</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>60</mml:mn>
<mml:mtext>mins</mml:mtext>
</mml:mrow>
</mml:math>
</inline-formula>. The time spent by the service center in processing work orders, the time spent by the dispatching layer in locating and handling faults, the time spent in preparing the repair vehicles before departure, and the time spent in searching for repair locations are set at <inline-formula id="inf56">
<mml:math id="m70">
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>, <inline-formula id="inf57">
<mml:math id="m71">
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>, <inline-formula id="inf58">
<mml:math id="m72">
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>, and <inline-formula id="inf59">
<mml:math id="m73">
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mn>4</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>. The time required for the repair station to reach the feeder is <inline-formula id="inf60">
<mml:math id="m74">
<mml:mrow>
<mml:mi>T</mml:mi>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>. Therefore, the formula for <inline-formula id="inf61">
<mml:math id="m75">
<mml:mrow>
<mml:mi>T</mml:mi>
<mml:mi>n</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> can be expressed by the following equation:<disp-formula id="equ8">
<mml:math id="m76">
<mml:mrow>
<mml:mi>T</mml:mi>
<mml:mi>n</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mi>T</mml:mi>
<mml:mrow>
<mml:mi>max</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>t</mml:mi>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>t</mml:mi>
<mml:mn>2</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>t</mml:mi>
<mml:mn>3</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>t</mml:mi>
<mml:mn>4</mml:mn>
<mml:mo>.</mml:mo>
</mml:mrow>
</mml:math>
</disp-formula>
</p>
<p>Time constraint<disp-formula id="equ9">
<mml:math id="m77">
<mml:mrow>
<mml:msub>
<mml:mi>T</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3c;</mml:mo>
<mml:mi>T</mml:mi>
<mml:mi>n</mml:mi>
<mml:mo>.</mml:mo>
</mml:mrow>
</mml:math>
</disp-formula>
</p>
<p>The aforementioned equation is a time constraint on the time required to travel from the repair station to the point of failure.</p>
<p>The latitude and longitude of the repair station are greater than the minimum latitude and longitude of the producer and less than the maximum latitude and longitude.</p>
</sec>
</sec>
<sec id="s4">
<title>4 Improving Gray Wolf Optimization Algorithm</title>
<p>For the aforementioned model of optimal allocation of resources for the community of production and consumption consumers, this study uses a particle swarm-based improved gray wolf optimization algorithm to solve it. Its mathematical model is simple, with few parameters, and easy to operate (<xref ref-type="bibr" rid="B8">Taha and Elattar, 2018</xref>). The programming is easy to implement. By referring to the rank ordering of wolf packs and hunting techniques, respectively, each solution is graded and searched, until the optimal solution is found.</p>
<sec id="s4-1">
<title>4.1 Population Initialization Based on Tent Mapping</title>
<p>The more uniformly the initial population is distributed in the search space, the better it is for improving the efficiency of the algorithm in finding the best solution and the accuracy of the solution. The initial gray wolf population of the traditional gray wolf optimization algorithm is randomly generated, which means it cannot guarantee that the initial population of individuals is uniformly distributed in the solution space. Chaotic sequences have better randomness, regularity, and traversal characteristics. Compared with other mappings, the tent mapping can generate a more balanced distribution of sequences, so the tent mapping is used to initialize the gray wolf population (<xref ref-type="bibr" rid="B9">Tian et al., 2021</xref>).</p>
<p>Tent mapping expressions<disp-formula id="e3_1">
<mml:math id="m78">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:mtable>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mtext>&#x200a;</mml:mtext>
<mml:mtable>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mtext>&#xa0;&#xa0;&#xa0;</mml:mtext>
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
</mml:mrow>
<mml:mi>u</mml:mi>
</mml:mfrac>
<mml:mtext>&#xa0;&#xa0;&#xa0;</mml:mtext>
</mml:mrow>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:mn>0</mml:mn>
<mml:mo>&#x2264;</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
<mml:mo>&#x3c;</mml:mo>
<mml:mi>u</mml:mi>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mtable>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>u</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mtext>&#xa0;</mml:mtext>
</mml:mrow>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:mi>u</mml:mi>
<mml:mo>&#x2264;</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
<mml:mo>&#x2264;</mml:mo>
<mml:mn>1.</mml:mn>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(3-1)</label>
</disp-formula>
</p>
<p>When <inline-formula id="inf62">
<mml:math id="m79">
<mml:mrow>
<mml:mi>u</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.5</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>, the most uniform distribution sequence can be produced, and the distribution density at this time is not sensitive to parameter changes. This belongs to the most typical tent mapping. At this time, the aforementioned equation can be changed to:<disp-formula id="e3_2">
<mml:math id="m80">
<mml:mrow>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:mtable>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mtable>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mtext>&#xa0;&#xa0;&#xa0;</mml:mtext>
<mml:mn>2</mml:mn>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
<mml:mtext>&#xa0;&#xa0;&#xa0;&#xa0;&#xa0;</mml:mtext>
</mml:mrow>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:mn>0</mml:mn>
<mml:mo>&#x2264;</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
<mml:mo>&#x3c;</mml:mo>
<mml:mn>0.5</mml:mn>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mtable>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mn>2</mml:mn>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mtext>&#xa0;</mml:mtext>
</mml:mrow>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:mn>0.5</mml:mn>
<mml:mo>&#x2264;</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
<mml:mo>&#x2264;</mml:mo>
<mml:mn>1.</mml:mn>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(3-2)</label>
</disp-formula>
</p>
<p>Based on the tent mapping, the population <inline-formula id="inf63">
<mml:math id="m81">
<mml:mi>X</mml:mi>
</mml:math>
</inline-formula> is represented as:<disp-formula id="e3_3">
<mml:math id="m82">
<mml:mrow>
<mml:mi>X</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mi>X</mml:mi>
<mml:mrow>
<mml:mi>min</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:msub>
<mml:mi>x</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
<mml:mo>&#x22c5;</mml:mo>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>X</mml:mi>
<mml:mrow>
<mml:mi>max</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>X</mml:mi>
<mml:mrow>
<mml:mi>min</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
<label>(3-3)</label>
</disp-formula>
</p>
<p>where <inline-formula id="inf64">
<mml:math id="m83">
<mml:mrow>
<mml:msub>
<mml:mi>X</mml:mi>
<mml:mrow>
<mml:mi>max</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf65">
<mml:math id="m84">
<mml:mrow>
<mml:msub>
<mml:mi>X</mml:mi>
<mml:mrow>
<mml:mi>min</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> are the <inline-formula id="inf66">
<mml:math id="m85">
<mml:mi>X</mml:mi>
</mml:math>
</inline-formula> upper and lower bounds of the search.</p>
</sec>
<sec id="s4-2">
<title>4.2 Competition and Cooperation Mechanism</title>
<p>In the GWO algorithm, the individuals of the population follow <inline-formula id="inf67">
<mml:math id="m86">
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b4;</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> . The algorithm will have the disadvantages of slow convergence speed and low accuracy in finding the best, so the cooperative competition mechanism is introduced, and before the prey is rounded up, all wolves except <inline-formula id="inf68">
<mml:math id="m87">
<mml:mrow>
<mml:mi>&#x3b1;</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b4;</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula>, each wolf of <inline-formula id="inf69">
<mml:math id="m88">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:msup>
<mml:mrow>
<mml:mstyle scriptlevel="+1">
<mml:mfrac>
<mml:mo>&#x27;</mml:mo>
<mml:mi>i</mml:mi>
</mml:mfrac>
</mml:mstyle>
</mml:mrow>
<mml:mi>k</mml:mi>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula> will randomly choose another wolf <inline-formula id="inf70">
<mml:math id="m89">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mstyle scriptlevel="+1">
<mml:mfrac>
<mml:mi>k</mml:mi>
<mml:mi>j</mml:mi>
</mml:mfrac>
</mml:mstyle>
</mml:mrow>
</mml:math>
</inline-formula> for communication, and if <inline-formula id="inf71">
<mml:math id="m90">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:msup>
<mml:mrow>
<mml:mstyle scriptlevel="+1">
<mml:mfrac>
<mml:mo>&#x27;</mml:mo>
<mml:mi>i</mml:mi>
</mml:mfrac>
</mml:mstyle>
</mml:mrow>
<mml:mi>k</mml:mi>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula> location is better than <inline-formula id="inf72">
<mml:math id="m91">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mstyle scriptlevel="+1">
<mml:mfrac>
<mml:mi>k</mml:mi>
<mml:mi>j</mml:mi>
</mml:mfrac>
</mml:mstyle>
</mml:mrow>
</mml:math>
</inline-formula>, then <inline-formula id="inf73">
<mml:math id="m92">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mstyle scriptlevel="+1">
<mml:mfrac>
<mml:mi>k</mml:mi>
<mml:mi>j</mml:mi>
</mml:mfrac>
</mml:mstyle>
</mml:mrow>
</mml:math>
</inline-formula> move closer to <inline-formula id="inf74">
<mml:math id="m93">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:msup>
<mml:mrow>
<mml:mstyle scriptlevel="+1">
<mml:mfrac>
<mml:mo>&#x27;</mml:mo>
<mml:mi>i</mml:mi>
</mml:mfrac>
</mml:mstyle>
</mml:mrow>
<mml:mi>k</mml:mi>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula>; <inline-formula id="inf75">
<mml:math id="m94">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mstyle scriptlevel="+1">
<mml:mfrac>
<mml:mi>k</mml:mi>
<mml:mi>j</mml:mi>
</mml:mfrac>
</mml:mstyle>
</mml:mrow>
</mml:math>
</inline-formula> move according to <xref ref-type="disp-formula" rid="e3_6">Eqn. 3-6</xref>, i.e., <inline-formula id="inf76">
<mml:math id="m95">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:msup>
<mml:mrow>
<mml:mstyle scriptlevel="+1">
<mml:mfrac>
<mml:mo>&#x27;</mml:mo>
<mml:mi>i</mml:mi>
</mml:mfrac>
</mml:mstyle>
</mml:mrow>
<mml:mi>k</mml:mi>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula> move away from <inline-formula id="inf77">
<mml:math id="m96">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mstyle scriptlevel="+1">
<mml:mfrac>
<mml:mi>k</mml:mi>
<mml:mi>j</mml:mi>
</mml:mfrac>
</mml:mstyle>
</mml:mrow>
</mml:math>
</inline-formula> and then <inline-formula id="inf78">
<mml:math id="m97">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:msup>
<mml:mrow>
<mml:mstyle scriptlevel="+1">
<mml:mfrac>
<mml:mo>&#x27;</mml:mo>
<mml:mi>i</mml:mi>
</mml:mfrac>
</mml:mstyle>
</mml:mrow>
<mml:mi>k</mml:mi>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula> move according to <xref ref-type="disp-formula" rid="e3_7">Eqn. 3-7</xref>; otherwise they perform the opposite operation.<disp-formula id="e3_4">
<mml:math id="m98">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:msup>
<mml:mrow>
<mml:mstyle scriptlevel="+1">
<mml:msub>
<mml:mo>&#x2032;</mml:mo>
<mml:mi>j</mml:mi>
</mml:msub>
</mml:mstyle>
</mml:mrow>
<mml:mi>k</mml:mi>
</mml:msup>
<mml:mo>&#x3d;</mml:mo>
<mml:msubsup>
<mml:mi>x</mml:mi>
<mml:mi>j</mml:mi>
<mml:mi>k</mml:mi>
</mml:msubsup>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>r</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>n</mml:mi>
<mml:mi>d</mml:mi>
<mml:mo>&#x22c5;</mml:mo>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msubsup>
<mml:mi>x</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>k</mml:mi>
</mml:msubsup>
<mml:mo>&#x2212;</mml:mo>
<mml:msubsup>
<mml:mi>x</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>k</mml:mi>
</mml:msubsup>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
<label>(3-4)</label>
</disp-formula>
<disp-formula id="e3_5">
<mml:math id="m99">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:msup>
<mml:mrow>
<mml:mstyle scriptlevel="+1">
<mml:msub>
<mml:mo>&#x2032;</mml:mo>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mstyle>
</mml:mrow>
<mml:mi>k</mml:mi>
</mml:msup>
<mml:mo>&#x3d;</mml:mo>
<mml:msubsup>
<mml:mi>x</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>k</mml:mi>
</mml:msubsup>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>r</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>n</mml:mi>
<mml:mi>d</mml:mi>
<mml:mo>&#x22c5;</mml:mo>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msubsup>
<mml:mi>x</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>k</mml:mi>
</mml:msubsup>
<mml:mo>&#x2212;</mml:mo>
<mml:msubsup>
<mml:mi>x</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>k</mml:mi>
</mml:msubsup>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
<label>(3-5)</label>
</disp-formula>where <inline-formula id="inf79">
<mml:math id="m100">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:msup>
<mml:mrow>
<mml:mstyle scriptlevel="+1">
<mml:mfrac>
<mml:mo>&#x27;</mml:mo>
<mml:mi>i</mml:mi>
</mml:mfrac>
</mml:mstyle>
</mml:mrow>
<mml:mi>k</mml:mi>
</mml:msup>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf80">
<mml:math id="m101">
<mml:mrow>
<mml:mi>x</mml:mi>
<mml:mstyle scriptlevel="+1">
<mml:mfrac>
<mml:mi>k</mml:mi>
<mml:mi>j</mml:mi>
</mml:mfrac>
</mml:mstyle>
</mml:mrow>
</mml:math>
</inline-formula> are, respectively, the cooperative competition mechanism after the first <inline-formula id="inf81">
<mml:math id="m102">
<mml:mi>i</mml:mi>
</mml:math>
</inline-formula>th individual and <inline-formula id="inf82">
<mml:math id="m103">
<mml:mi>j</mml:mi>
</mml:math>
</inline-formula>
<sup>th</sup> position of the first individual.</p>
</sec>
<sec id="s4-3">
<title>4.3 Adaptive Adjustment of Weighting Coefficients</title>
<p>In order to meet the requirements of the GWO algorithm in different iteration cycles for finding the best and to improve the convergence speed and the accuracy of finding the best, adaptive inertia weights are introduced in the position update <inline-formula id="inf83">
<mml:math id="m104">
<mml:mi>&#x3c9;</mml:mi>
</mml:math>
</inline-formula>:<disp-formula id="e3_6">
<mml:math id="m105">
<mml:mrow>
<mml:mi>&#x3c9;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mi>&#x3c9;</mml:mi>
<mml:mrow>
<mml:mi>min</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2b;</mml:mo>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>&#x3c9;</mml:mi>
<mml:mrow>
<mml:mi>max</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>&#x3c9;</mml:mi>
<mml:mrow>
<mml:mi>min</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mfrac>
<mml:mrow>
<mml:mi>max</mml:mi>
<mml:mo>_</mml:mo>
<mml:mi>i</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>r</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>t</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi>max</mml:mi>
<mml:mo>_</mml:mo>
<mml:mi>i</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>r</mml:mi>
</mml:mrow>
</mml:mfrac>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
<label>(3-6)</label>
</disp-formula>where <inline-formula id="inf84">
<mml:math id="m106">
<mml:mrow>
<mml:msub>
<mml:mi>&#x3c9;</mml:mi>
<mml:mrow>
<mml:mi>max</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf85">
<mml:math id="m107">
<mml:mrow>
<mml:msub>
<mml:mi>&#x3c9;</mml:mi>
<mml:mrow>
<mml:mi>min</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> are the upper and lower bounds of the weighting coefficients, respectively. <inline-formula id="inf86">
<mml:math id="m108">
<mml:mi>t</mml:mi>
</mml:math>
</inline-formula> is the number of iterations. <inline-formula id="inf87">
<mml:math id="m109">
<mml:mrow>
<mml:mi>max</mml:mi>
<mml:mo>_</mml:mo>
<mml:mi>i</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>r</mml:mi>
</mml:mrow>
</mml:math>
</inline-formula> is the maximum number of iterations.</p>
<p>The value of <inline-formula id="inf88">
<mml:math id="m110">
<mml:mi>&#x3c9;</mml:mi>
</mml:math>
</inline-formula> changes dynamically with the number of iterations, allowing the particles to continuously balance between global search and local search. The early iteration of the algorithm <inline-formula id="inf89">
<mml:math id="m111">
<mml:mi>&#x3c9;</mml:mi>
</mml:math>
</inline-formula> is larger, which is beneficial to the global search of the algorithm; later iterations of <inline-formula id="inf90">
<mml:math id="m112">
<mml:mi>&#x3c9;</mml:mi>
</mml:math>
</inline-formula> gradually decrease, so that the gray wolf can better find whether there is a better solution around the prey while updating its position, thus improving the local searchability of the algorithm.</p>
<p>The improved position equation is shown in <xref ref-type="disp-formula" rid="e3_7">Eqn. 3-7</xref>&#x2014;<xref ref-type="disp-formula" rid="e3_9">Eqn. 3-9</xref>.<disp-formula id="e3_7">
<mml:math id="m113">
<mml:mrow>
<mml:msub>
<mml:mi>X</mml:mi>
<mml:mn>1</mml:mn>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>&#x3c9;</mml:mi>
<mml:mo>&#x22c5;</mml:mo>
<mml:msubsup>
<mml:mi>x</mml:mi>
<mml:mi>&#x3b1;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msubsup>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>A</mml:mi>
<mml:mo>&#x22c5;</mml:mo>
<mml:msubsup>
<mml:mi>D</mml:mi>
<mml:mi>&#x3b1;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msubsup>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
<label>(3-7)</label>
</disp-formula>
<disp-formula id="e3_8">
<mml:math id="m114">
<mml:mrow>
<mml:msub>
<mml:mi>X</mml:mi>
<mml:mn>2</mml:mn>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>&#x3c9;</mml:mi>
<mml:mo>&#x22c5;</mml:mo>
<mml:msubsup>
<mml:mi>x</mml:mi>
<mml:mi>&#x3b2;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msubsup>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>A</mml:mi>
<mml:mo>&#x22c5;</mml:mo>
<mml:msubsup>
<mml:mi>D</mml:mi>
<mml:mi>&#x3b2;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msubsup>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
<label>(3-8)</label>
</disp-formula>
<disp-formula id="e3_9">
<mml:math id="m115">
<mml:mrow>
<mml:msub>
<mml:mi>X</mml:mi>
<mml:mn>3</mml:mn>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>&#x3c9;</mml:mi>
<mml:mo>&#x22c5;</mml:mo>
<mml:msubsup>
<mml:mi>x</mml:mi>
<mml:mi>&#x3b4;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msubsup>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>A</mml:mi>
<mml:mo>&#x22c5;</mml:mo>
<mml:msubsup>
<mml:mi>D</mml:mi>
<mml:mi>&#x3b4;</mml:mi>
<mml:mi>k</mml:mi>
</mml:msubsup>
<mml:mo>.</mml:mo>
</mml:mrow>
</mml:math>
<label>(3-9)</label>
</disp-formula>
</p>
<p>The flow chart is shown in <xref ref-type="fig" rid="F2">Figure 2</xref>.</p>
<fig id="F2" position="float">
<label>FIGURE 2</label>
<caption>
<p>Flow chart of the improved gray wolf optimization algorithm.</p>
</caption>
<graphic xlink:href="fenrg-10-881081-g002.tif"/>
</fig>
</sec>
</sec>
<sec id="s5">
<title>5 Case Study</title>
<p>In this study, an optimization model with the objective of minimizing the total fault loss is developed considering the fault risk classification and the emergency response capability, and the model is solved Intel Core i5-8400 by invoking GUROBI8.0.1 software under the MATLAB 2018b platform through the YALMIP toolbox with the computer parameters of Intel Core i5-8400 <email>CPU@2.80</email> GHz and 8&#xa0;GB memory.</p>
<sec id="s5-1">
<title>5.1 Basic Data Sources</title>
<p>The data are collected from the distribution network fault data provided by a city power company in the south for the year 2020&#x2013;2021. In total, three randomly distributed producers and consumers in a square producer&#x2013;consumer community with the same length and width are selected as the study case of the repair resource allocation optimization algorithm. The fault risk classification of the producers and consumers is shown in <xref ref-type="fig" rid="F3">Figure 3</xref>.</p>
<fig id="F3" position="float">
<label>FIGURE 3</label>
<caption>
<p>Fault risk classification chart.</p>
</caption>
<graphic xlink:href="fenrg-10-881081-g003.tif"/>
</fig>
<p>By preprocessing the historical failure data of three randomly distributed producers and consumers in a square producer&#x2013;consumer community with both length and width of 3 km, the failure risk value calculation formula is used to finally obtain the failure risk-grading map of producers and consumers shown in the aforementioned figure. From the information in the aforementioned figure, it can be seen that the failure risk level can be roughly divided into three categories: 0&#x2013;0.5, 0.5&#x2013;1.5, and 1.5 or more, among which the number of the first failure risk-level producers and consumers is the largest.</p>
<p>The distance between each producer and consumer is calculated using the latitude and longitude transformation method in 0.3 <xref ref-type="sec" rid="s2">Section 2</xref>, and then the information of each point is displayed on the two-dimensional coordinate plane, and the producer&#x2013;consumer configuration scenario shown as follows is obtained by combining the producer&#x2013;consumer failure risk-grading situation as shown in <xref ref-type="fig" rid="F4">Figure 4</xref>.</p>
<fig id="F4" position="float">
<label>FIGURE 4</label>
<caption>
<p>Production and consumption of consumer configuration scenarios.</p>
</caption>
<graphic xlink:href="fenrg-10-881081-g004.tif"/>
</fig>
</sec>
<sec id="s5-2">
<title>5.2 Optimization Results and Analysis</title>
<p>The convergence curve of the optimization process, the distance map of the optimized robotic stationing point, the comparison of the results of different algorithms, and the information of the optimal solution are shown in <xref ref-type="fig" rid="F5">Figures 5</xref>, <xref ref-type="fig" rid="F6">6</xref>, <xref ref-type="table" rid="T1">Tables 1</xref>, <xref ref-type="table" rid="T2">2</xref>, respectively.</p>
<fig id="F5" position="float">
<label>FIGURE 5</label>
<caption>
<p>Convergence curve of the optimization process.</p>
</caption>
<graphic xlink:href="fenrg-10-881081-g005.tif"/>
</fig>
<fig id="F6" position="float">
<label>FIGURE 6</label>
<caption>
<p>Optimal emergency repair stationing distance map.</p>
</caption>
<graphic xlink:href="fenrg-10-881081-g006.tif"/>
</fig>
<table-wrap id="T1" position="float">
<label>TABLE 1</label>
<caption>
<p>Comparison of optimization results of different algorithms.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">Algorithm</th>
<th align="center">Best advantage coordinate</th>
<th align="center">Total potential failure loss</th>
<th align="center">Average number of iterations</th>
<th align="center">Average elapsed time/S</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">Particle swarm algorithm</td>
<td align="center">(1.469,1.803)</td>
<td align="char" char=".">0.8950</td>
<td align="char" char=".">169</td>
<td align="char" char=".">58.46</td>
</tr>
<tr>
<td align="left">Traditional gray wolf algorithm</td>
<td align="center">(2.113,1.736)</td>
<td align="char" char=".">0.8634</td>
<td align="char" char=".">161</td>
<td align="char" char=".">47.23</td>
</tr>
<tr>
<td align="left">Algorithm of this study</td>
<td align="center">(1.772,1.433)</td>
<td align="char" char=".">0.8496</td>
<td align="char" char=".">143</td>
<td align="char" char=".">32.7</td>
</tr>
</tbody>
</table>
</table-wrap>
<table-wrap id="T2" position="float">
<label>TABLE 2</label>
<caption>
<p>Optimal solution information sheet.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">Weight value W1</th>
<th align="center">Weight value W2</th>
<th align="center">Speed of arrival of repair personnel</th>
<th align="center">Optimal stationing coordinate</th>
<th align="center">Total potential failure loss</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">0.6</td>
<td align="char" char=".">0.4</td>
<td align="center">1.5&#xa0;km/h</td>
<td align="center">(1.772,1.433)</td>
<td align="char" char=".">0.8496</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The aforementioned figure shows the iterative process of the optimization model. At the beginning of the iteration, the algorithm adaptation is large and the change in the value of the objective function fluctuates; as the iteration proceeds, the corresponding total potential fault loss gradually decreases. After about 200 iterations, the optimization model adaptation consistency variable converges to the same value, i.e., the global optimal solution is obtained.</p>
<p>To further illustrate the performance of the algorithm proposed in this article, the algorithm is compared with the particle swarm algorithm and the traditional gray wolf optimization algorithm, and each algorithm is performed 20 times independently, and then the average value is calculated, and the calculation results are shown in <xref ref-type="table" rid="T1">Table 1</xref>.</p>
<p>As can be seen from <xref ref-type="table" rid="T1">Table 1</xref>, the optimal solution of this algorithm is better than that of the traditional gray wolf optimization algorithm and particle swarm algorithm. Also, the algorithm is improved by introducing tent mapping chaos initialization, introducing a cooperative competition mechanism, and introducing adaptive inertia weights in generating the initial population. The comparison of the average number of iterations and the average time consumed by the three algorithms shows that this algorithm can take into account both the global and local searchability. It is not only better than the other two methods in terms of the number of convergence iterations, but also the average number of iterations is around 143, and the convergence time is shorter. Compared with the traditional gray wolf optimization algorithm, the speed is improved by 30.76%.</p>
<p>As can be seen in <xref ref-type="table" rid="T2">Table 2</xref>, when the objective function of minimizing the total potential failure loss is taken into account, the weight values of the failure risk classification and the repair response capability of the producer and consumer are set to 0.6 and 0.4, respectively, based on which the optimal stationing point coordinates obtained by solving the optimization model are 1.772 and 1.433, respectively. The total potential failure loss is 0.8496, and the distance between the repair stationing point and each producer and consumer is shown in <xref ref-type="fig" rid="F6">Figure 6</xref>.</p>
<p>Comparing the average distance and potential loss of fault between the stationing point and the producer and consumer before and after optimization, as shown in <xref ref-type="table" rid="T3">Table 3</xref>, the average distance is reduced by 10.21% after optimization; the potential loss of fault is reduced by 17.38% mainly because the optimized deployment of repair resources makes the repair resources closer to the high-risk fault in the region.</p>
<table-wrap id="T3" position="float">
<label>TABLE 3</label>
<caption>
<p>Comparison of results before and after optimization.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left"/>
<th align="center">Original emergency repair station</th>
<th align="center">This article optimal repair station</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">Two-dimensional coordinate points</td>
<td align="center">(1.603,1.907)</td>
<td align="center">(1.772,1.433)</td>
</tr>
<tr>
<td align="left">Average distance/km</td>
<td align="center">1.332</td>
<td align="center">1.196</td>
</tr>
<tr>
<td align="left">Failure potential loss</td>
<td align="center">1.0283</td>
<td align="center">0.8496</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
</sec>
<sec id="s6">
<title>6 Conclusion</title>
<p>In this study, we propose an optimal allocation method for emergency repair resources in the producer&#x2013;consumer community considering fault risk classification and emergency repair response capability. First, we preprocess the fault information by the rough set theory, then establish an optimal allocation model to minimize the total fault loss, consider fault risk classification and emergency repair response capability, and finally use the improved gray wolf optimization algorithm for the optimal search calculation. By improving the initial population generation, adaptive weight adjustment, and inter-individual information exchange, the ability of the algorithm to jump out of the local optimum and the efficiency of the optimization search are improved. Through the analysis of the optimization results, it is concluded that the proposed algorithm and the optimization strategy of repair resources are effective in reducing the potential fault loss and optimizing the repair station optimization, which have certain practical significance. In fact, the spatial correlation between the emergency repair resource allocation point and each producer and consumer is very complex and is not a simple straight-line distance. The model designed in this study does not consider the actual road distribution, and the subsequent research should first combine the real geographic information of GIS, then add the road influence factors into the model and give sufficient weights, and finally, build a more perfect resource allocation optimization model. The aforementioned problems can be studied in depth if necessary in the future.</p>
</sec>
</body>
<back>
<sec id="s7">
<title>Data Availability Statement</title>
<p>The raw data supporting the conclusion of this article will be made available by the authors, without undue reservation.</p>
</sec>
<sec id="s8">
<title>Author Contributions</title>
<p>The authors&#x2019; individual contributions are as follows: DM: data collation, formal analysis, and methodology; JQ: supervision and writing (original manuscript). All authors have read and agreed to the published version of the manuscript.</p>
</sec>
<sec id="s9">
<title>Funding</title>
<p>The study was funded by the Research and Application of One-stop Operation and Inspection Technology for Distribution Network Based on Multi-model Identification project and Double Innovation Project of Zhejiang Electric Power Company C511JZ200000.</p>
</sec>
<sec sec-type="COI-statement" id="s10">
<title>Conflict of Interest</title>
<p>Authors DM and JQ were employed by State Grid Zhejiang Xinchang Electric Power Supply Co, Shaoxing, 312500, China.</p>
<p>The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest. </p>
</sec>
<sec sec-type="disclaimer" id="s11">
<title>Publisher&#x2019;s Note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors, and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<ref-list>
<title>References</title>
<ref id="B1">
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Bo</surname>
<given-names>T.</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>Q.</given-names>
</name>
<name>
<surname>Gao</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Zhu</surname>
<given-names>C.</given-names>
</name>
</person-group> (<year>2015</year>). &#x201c;<article-title>Fuzzy Comprehensive Risk Assessment of Distribution Network Fault Based on Rough Set [C]</article-title>,&#x201d; in <conf-name>IEEE PES Asia-Pacific Power and Energy Engincering Conference APPEEC</conf-name>, <conf-loc>Brisbane, QLD, Australia</conf-loc>, <conf-date>15-18 Nov. 2015</conf-date> (<publisher-name>IEEE</publisher-name>). </citation>
</ref>
<ref id="B2">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Chen</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>X.</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>A Low False Alarm Rate Power Theft Detection Method Based on Improved XGBoost Model[J]</article-title>. <source>Power Syst. Prot. Control</source> <volume>49</volume> (<issue>23</issue>), <fpage>178</fpage>&#x2013;<lpage>186</lpage>. <pub-id pub-id-type="doi">10.19783/j.cnki.pspc.210094</pub-id> </citation>
</ref>
<ref id="B3">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Deng</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Tan</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Yu</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>J.</given-names>
</name>
</person-group> (<year>2017</year>). <article-title>A Method for scheduling power emergency resources considering the grid restoration process [J]</article-title>. <source>Power Grid. Tech</source> <volume>41</volume> (<issue>11</issue>), <fpage>3582</fpage>&#x2013;<lpage>3589</lpage>. <pub-id pub-id-type="doi">10.13335/j.1000-3673.pst.2017.0688</pub-id> </citation>
</ref>
<ref id="B4">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Huang</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Yang</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Fan</surname>
<given-names>W</given-names>
</name>
</person-group> (<year>2014</year>). <article-title>Joint optimization model for multi-fault repair and power supply restoration in distribution networks[J]</article-title>. <source>Power Syst. Automation</source> <volume>38</volume> (<issue>11</issue>), <fpage>68</fpage>&#x2013;<lpage>73</lpage>. <pub-id pub-id-type="doi">10.1109/ICAML51583.2020.00091</pub-id> </citation>
</ref>
<ref id="B5">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Lu</surname>
<given-names>ZG</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Lv</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Zhao</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Hou</surname>
<given-names>X</given-names>
</name>
</person-group> (<year>2018</year>). <article-title>Multi-fault repair strategy of distribution network under ice disaster containing distributed power supply[J]</article-title>. <source>J. Electrical Eng. Tech.</source> <volume>33</volume> (<issue>02</issue>), <fpage>423</fpage>&#x2013;<lpage>432</lpage>. <pub-id pub-id-type="doi">10.19595/j.cnki.1000-6753.tces.160919</pub-id> </citation>
</ref>
<ref id="B6">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Lu</surname>
<given-names>ZG</given-names>
</name>
<name>
<surname>Sun</surname>
<given-names>B</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>Z</given-names>
</name>
<name>
<surname>Yang</surname>
<given-names>L</given-names>
</name>
</person-group> (<year>2011</year>). <article-title>A Rush Repair Strategy for Distribution Networks Based on Improved Discrete Multi-Objective BCC Algorithm After Discretization</article-title>. <source>Power Syst. Automation</source> <volume>35</volume> (<issue>11</issue>), <fpage>55</fpage>&#x2013;<lpage>59</lpage>. </citation>
</ref>
<ref id="B7">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Mu</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Ding</surname>
<given-names>T</given-names>
</name>
<name>
<surname>Dong</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Ning</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Dong</surname>
<given-names>X</given-names>
</name>
<name>
<surname>He</surname>
<given-names>Y</given-names>
</name>
<etal/>
</person-group> (<year>2021</year>). <article-title>Development of decentralized peer-to-peer multi-energy trading system based on private blockchain[J]</article-title>. <source>Chinese. J. Electrical Eng.</source> <volume>41</volume> (<issue>03</issue>), <fpage>878</fpage>&#x2013;<lpage>890</lpage>. <pub-id pub-id-type="doi">10.13334/j.0258-8013.pcsee.200392</pub-id> </citation>
</ref>
<ref id="B8">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Taha</surname>
<given-names>I. B. M.</given-names>
</name>
<name>
<surname>Elattar</surname>
<given-names>E. E.</given-names>
</name>
</person-group> (<year>2018</year>). <article-title>Optimal reactive power resources sizing for power system operations enhancement based on improved grey wolf optimiser</article-title>. <source>IET Generation, Transmission &#x26;amp; Distribution</source> <volume>12</volume> (<issue>14</issue>), <fpage>3421</fpage>&#x2013;<lpage>3434</lpage>. <pub-id pub-id-type="doi">10.1049/iet-gtd.2018.0053</pub-id> </citation>
</ref>
<ref id="B9">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Tian</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Shurong</surname>
<given-names>W</given-names>
</name>
<name>
<surname>Fu</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Yang</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>S</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>Dynamic reconfiguration of distribution network based on improved grey wolf optimization algorithm[J]</article-title>. <source>Power System Protection and Control</source> <volume>49</volume> (<issue>16</issue>), <fpage>1</fpage>&#x2013;<lpage>11</lpage>. <pub-id pub-id-type="doi">10.19783/j.cnki.pspc.201356</pub-id> </citation>
</ref>
<ref id="B10">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Yang</surname>
<given-names>LJ</given-names>
</name>
<name>
<surname>Lv</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Lu</surname>
<given-names>ZG</given-names>
</name>
<name>
<surname>Yu</surname>
<given-names>Q</given-names>
</name>
</person-group> (<year>2016</year>). <article-title>Optimization strategy for multi-fault rescue and recovery coordination in distribution networks containing distributed power sources[J]</article-title>. <source>Power Syst. Automation</source> <volume>40</volume> (<issue>20</issue>), <fpage>13</fpage>&#x2013;<lpage>19</lpage>. <pub-id pub-id-type="doi">10.1016/j.energy.2015.03.101</pub-id> </citation>
</ref>
<ref id="B11">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>P</given-names>
</name>
<name>
<surname>Huang</surname>
<given-names>S</given-names>
</name>
</person-group> (<year>2008</year>). <article-title>A multi-fault repair strategy for distribution networks based on genetic topology hybrid algorithm[J]</article-title>. <source>Power System Automation</source> <volume>22</volume>, <fpage>32</fpage>&#x2013;<lpage>35&#x2b;60</lpage>. </citation>
</ref>
<ref id="B12">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Zhou</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Or</surname>
<given-names>S. W.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Chung</surname>
<given-names>C. Y.</given-names>
</name>
<name>
<surname>Voropai</surname>
<given-names>N.</given-names>
</name>
</person-group> (<year>2022</year>). <article-title>Optimal coordinated control of multi-renewable-to-hydrogen production system for hydrogen fueling stations</article-title>. <source>IEEE Trans. on Ind. Applicat.</source> <volume>58</volume>, <fpage>2728</fpage>&#x2013;<lpage>2739</lpage>. <pub-id pub-id-type="doi">10.1109/TIA.2021.3093841</pub-id> </citation>
</ref>
<ref id="B13">
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Zhao</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Xu</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Zhu</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Xuan</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Sun</surname>
<given-names>Z.</given-names>
</name>
</person-group> (<year>2021</year>). &#x201c;<article-title>Incidence Convolution Based Low-Voltage Distribution System Transformer-Customer Relationship Identification</article-title>,&#x201d; in <conf-name>IEEE Transactions on Power Delivery</conf-name> (<publisher-name>IEEE</publisher-name>), <fpage>1</fpage>. <pub-id pub-id-type="doi">10.1109/TPWRD.2021.3120625</pub-id> </citation>
</ref>
</ref-list>
</back>
</article>