CN102841965A - Modeling method of optimal power flow model of receiving end power grid security domain - Google Patents

Modeling method of optimal power flow model of receiving end power grid security domain Download PDF

Info

Publication number
CN102841965A
CN102841965A CN2012103016290A CN201210301629A CN102841965A CN 102841965 A CN102841965 A CN 102841965A CN 2012103016290 A CN2012103016290 A CN 2012103016290A CN 201210301629 A CN201210301629 A CN 201210301629A CN 102841965 A CN102841965 A CN 102841965A
Authority
CN
China
Prior art keywords
load
power
flow model
lambda
security domain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012103016290A
Other languages
Chinese (zh)
Other versions
CN102841965B (en
Inventor
麻常辉
张磊
蒋哲
武乃虎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
Electric Power Research Institute of State Grid Shandong Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
Electric Power Research Institute of State Grid Shandong Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, Electric Power Research Institute of State Grid Shandong Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201210301629.0A priority Critical patent/CN102841965B/en
Publication of CN102841965A publication Critical patent/CN102841965A/en
Application granted granted Critical
Publication of CN102841965B publication Critical patent/CN102841965B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02EREDUCTION OF GREENHOUSE GAS [GHG] EMISSIONS, RELATED TO ENERGY GENERATION, TRANSMISSION OR DISTRIBUTION
    • Y02E60/00Enabling technologies; Technologies with a potential or indirect contribution to GHG emissions mitigation

Landscapes

  • Supply And Distribution Of Alternating Current (AREA)

Abstract

The invention discloses a modeling method of an optimal power flow model of a receiving end power grid security domain. The method includes a first step: constructing a system security domain through analysis of stability of a power flow equation, namely stability of quiescent voltage, phase angles and oscillation frequency of a system, and N-1 operation standards, wherein N loads of the system can be converted into M different sets composed in the load direction according to given power generation dispatching standards to generate a critical load matrix for approximate treatment of the security domain; a second step: constructing a dynamic security constraint optimal power flow model; a third step: constructing a self-adaptive neural fuzzy inference system; and a fourth step: training the self-adaptive fuzzy inference system and constructing the optimal power flow model. The optimal power flow model well expounds the operation standards of current electric power system dispatching. The optimal power flow security domain approximation technology based on the self-adaptive fuzzy inference system can be applied to dispatching optimization between receiving end power grid areas after distribution of hierarchy and areas.

Description

Held the modeling method of power grid security territory optimal load flow model
Technical field
The present invention relates to a kind of modeling method of optimal load flow model, relate in particular to a kind of modeling method of being held power grid security territory optimal load flow model.
Background technology
In electric system long-run development process, it is complementary that operation of power networks planning and system load flow calculate.On the one hand, for guaranteeing the safety and stability of whole electrical network, the formation of Electric Power Network Planning need be based upon system load flow and calculate on the basis; On the other hand, the system optimal trend is calculated the stability and the economy that can improve Electric Power Network Planning.Optimal load flow through control device capable of using in the Adjustment System, can be realized the system stable operation state that intended target is optimum satisfying under specific the system's operation and security constraints.Therefore, the system safety operation problem sharp-pointed day by day with complicated situation under, optimal load flow calculates nature becomes the system stability analysis aid indispensable with optimization.
After the access of extra-high voltage grid, the voltage unstability that power shifted initiation on a large scale when system broke down will become one of subject matter of being held electricity net safety stable.Especially after the extra-high voltage backbone network builds up basically, will increase the system short-circuit levels of current.Because the importance of 500kV subregion electrical network, it will be inevitably exists with the form of looped network, and this has just weakened the benefit that layering and zoning can bring.What the fault probability of happening of electric system was the highest is single-line to ground fault.Receiving-end system is comparatively weak, and load center lacks the forceful electric power source to be supported, especially a little less than the support of 500kV electrical network; Cause the 220kV electrical network too intensive; Short-circuit current exceeds standard, and extra-high voltage insert receive greatly to hold electrical network after, the electrical network layering and zoning operates to electricity net safety stable property and brings stern challenge.
Summary of the invention
The object of the invention is exactly in order to address the above problem, and a kind of computing method of being held power grid security territory optimal load flow are provided, and it has the advantage of the operation criterion of having explained current electric power system dispatching well.
To achieve these goals, the present invention adopts following technical scheme:
A kind of modeling method of being held power grid security territory optimal load flow model, concrete steps are:
The first step: the stability analysis through to power flow equation promptly comes the constructing system security domain to the stability and the N-1 criterion of system's quiescent voltage, phase angle, oscillation frequency.Be the security domain expression formula that obtains to disperse; The N of a system load can be transformed to M the different sets that load direction is formed by given power generation dispatching criterion; N, M more than or equal to 1 be natural number; N is the quantity of loading in the system, and given system has fixing load quantity, generates following critical load matrix and comes security domain is carried out approximate processing:
Second step: it is following to make up dynamic security constrained optimum tide model:
Objective function: S b = - ( C d T P d - C s T P s ) - - - ( 2 )
Constraint condition: F PF(δ, V, Q g, P s, P d)=0 (3)
0 ≤ P s ≤ P s max - - - ( 4 )
0 ≤ P d ≤ P d max - - - ( 5 )
Figure BDA00002045902100025
Figure BDA00002045902100026
is a natural number greater than or equal to 1 (6)
Q g min ≤ Q g ≤ Q g max - - - ( 7 )
V min≤V≤V max (8)
f NR 0 - f NR ( V , δ ) ≤ 0 - - - ( 9 )
Wherein, C sAnd C dBe respectively the bid of electric power supply and demand, the unit $/MWh of unit; System's supply and demand power is respectively P sAnd P d, unit is MW; F PF() is the system load flow equation; V and δ are respectively that node voltage is with crossing; I IjBe electric current through transmission line of electricity ij, this constraint definition the thermally-stabilised limit of system; Q gBe generator reactive power; f NR() is used to represent the security of system territory, Be its suitable critical value.
The 3rd step: set up the white neural fuzzy inference system that adapts to.
The 4th step: training is white to be adapted to fuzzy inference system and sets up the optimal load flow model, and security domain constrained optimum tide model is:
Objective function: S b = C s T P s - C d T Δ P d - - - ( 10 )
Constraint condition: F PF(δ, V, Q g, P s, P d, Q d)=0 (11)
0≤P s≤P smax (12)
Q smin≤Q s≤Q smax (13)
V min≤V≤V max (14)
λ l - Σ i w i m f i m Σ i w i m ≤ 0 ∀ m = 1 , . . . , G - - - ( 15 )
Δ P Dj≤0 j is the natural number (16) more than or equal to 1
Δ P d j = ( α d j - α 0 d j 0 ) P Dj 0 J is the natural number (17) more than or equal to 1
Wherein: Q dBe the system requirements reactive powers, Q sBe that system supplies with reactive power,
Figure BDA00002045902100034
Be the changing load amount of j node, P Dj0Be the initial load of j node, loading coefficient is represented in scalar ce>=0, α 0Be initial load coefficient, d J0The expression initial load increases vector, d jRepresent the load growth vector of all loads under i load growth rate: d j=[d J1, d J2... D JN] T
Figure BDA00002045902100035
j is the natural number (18) more than or equal to 1
0≤d j≤1 j is the natural number (19) more than or equal to 1
Σ j = 1 N d j = 1 - - - ( 20 )
α≥0(21)
Wherein, Δ P dBe the changing load amount; M is m security of system territory of all G scheduling scheme.Constraint condition (11) makes Δ P by force dBe 0 or negative.If Δ P dBe 0, then the optimal load flow model is separated; Otherwise, if Δ P dBe negative, represent then that the optimal load flow model does not have to separate.Therefore; This optimal load flow model has been explained the operation criterion of current electric power system dispatching well;
Figure BDA00002045902100037
is the merit angle, and active power, reactive power and applied power are formed right-angle triangle, and applied power is a hypotenuse; Angle between the meritorious and applied power is at the merit angle; General G is an imaginary number with its cosine value representation power factor, and m is the number among 1 ~ G.
The concrete steps of the said first step are:
(1) setting up electric system can little algebraic equation be: x · = h ( x , y , ρ , λ ) 0 = g ( x , y , ρ , λ ) - - - ( 22 ) Wherein, x is a system state variables, and common have generator speed and a corner; Y represents the algebraically variable, like load side voltage etc.; ρ representes system's controllable variable, like the generator voltage grade; λ is one group of uncontrollable parameter, and common have load to gain merit and reactive power.
(2) confirm load direction d i=[d I1d I2D IN] TWhen load increases along a certain specific direction, electric system will reach operational limit, come the constructing system security domain through the stability analysis to power flow equation; Promptly come the constructing system security domain, establish λ according to system's quiescent voltage, phase angle, oscillation frequency being carried out stability and N-1 operation criterion i=[λ I1λ I2λ IN] TBe i load increasing rate in N the load, i is the natural number more than or equal to 1, and λ is expressed as
λ il=αd i1
λ i2=αd i2 (23)
...
λ iN=αd iN
Wherein, loading coefficient is represented in scalar ce>=0, d IjThe load growth direction of expression load j under i load growth rate, i and j are the natural number more than or equal to 1, and load direction satisfies following condition:
0 ≤ d ij ≤ 1 , ∀ j
Σ j = 1 N d ij = 1 - - - ( 24 )
(3) can make system reach the safety and stability border gradually through increasing loading coefficient α; And then N load of definite stability boundaris ultimate value
Figure BDA00002045902100043
system can be transformed to M the different sets that load direction is formed by given power generation dispatching criterion, generates following critical load matrix and come security domain is similar to:
Figure BDA00002045902100044
In said the 3rd step, Adaptive Neuro-fuzzy Inference is divided into six layers: X 1, X 2Be the input of system, the output of y inference system; Network has similar function with each node of one deck, uses O 1i, O 2iRepresent i node output, i is the natural number more than or equal to 1;
Ground floor: will import data and carry out Fuzzy Processing:
O 1i=μ Ai(x 1),O 2i=μ Bi(x 2),i=1,2 (25)
Wherein, A iOr B iIt is fuzzy set; μ Ai(x 1), μ Bi(x 2) be the membership function of fuzzy set.
The second layer: each input data subordinate function is multiplied each other, as the relevance grade w of this layer rule i:
w i=μ Ai(x 1Bi(x 2),i=1,2 (26)
The 3rd layer: the w that calculates i bar rule iAnd all relevance grade sum w 1+ w 2, and pass through the normalization that both ratios are accomplished each bars rule relevance grade:
w i ′ = w i w 1 + w 2 , i=1,2 (27)
The 4th layer: the output that is used to calculate each bar rule:
O′ 4i=w′ if i=w′ i(p ix 1+q ix 2+r i),i=1,2 (28)
Wherein, f iBe the consequent conclusion output function of fuzzy system, p i, q iBe the system's weighting coefficient under the i bar rule, r iBe the constant under the i rules and regulations, when this output function is linear function, be called " first-order system "; If constant is called " zeroth order system ".
Layer 5: be used for total output of computing system:
y = Σ i w i ′ f i = Σ i w i f i Σ i w i i=1,2 (29)
Layer 6 should be exported the result through method of weighted mean and carry out the defuzzification processing, and made the error between input and the output minimum through back propagation and least square method.
Concrete steps in said the 4th step are:
(1) training adaptive fuzzy inference system; Make of the input of the border formed of M ultimate value of N-1 load as the adaptive fuzzy inference system; N is the natural number greater than 1; M is the natural number more than or equal to 1, and the safe edge dividing value that defines i load bus is expressed as:
λ Il c ≈ f ( λ i 1 , λ i 2 , . . . , λ Il - 1 , λ Il + 1 , . . . , λ IN ) ≈ f ( λ ^ i ) I is the natural number more than or equal to 1: (30)
The mapping function that is got the load growth rate by formula (9) and formula (25) is:
λ l c = Σ i w i f i Σ i w i - - - ( 31 )
(2) it is intrafascicular approximately formula (26) to be used for the security domain of optimal load flow equation, forms security domain constrained optimum tide model to be:
Objective function: S b = C s T P s - C d T Δ P d - - - ( 10 )
Constraint condition: F PF(δ, V, Q g, P s, P d, Q d)=0 (11)
0≤P s≤P smax (12)
Q smin≤Q s≤Q smax (13)
V min≤V≤V max (14)
λ l - Σ i w i m f i m Σ i w i m ≤ 0 , ∀ m = 1 , . . . , G - - - ( 15 )
ΔP dj ≤ 0 , ∀ j = 1 , . . . , N - - - ( 16 )
ΔP d j = ( α d j - α 0 d j 0 ) P dj 0 , ∀ j = 1 , . . . , N - - - ( 17 )
Figure BDA00002045902100066
0 ≤ d j ≤ 1 , ∀ j = 1 , . . . , N - - - ( 19 )
Σ j = 1 N d j = 1 - - - ( 20 )
α≥0 (21)
Beneficial effect of the present invention: the present invention is based on the adaptive fuzzy inference system and confirm the security of system territory.Adopt IEEE 118 node standard testing systems that the feasibility and the efficient of adaptive fuzzy inference system are carried out simulation calculation and checking, and verify that on layering and zoning theoretical foundation this method is to being held the feasibility of electrical network.The result shows, can apply to held the interregional optimizing scheduling of electrical network behind the layering and zoning based on the optimal load flow security domain approximation technique of adaptive fuzzy inference system.
Description of drawings
Fig. 1 is typical Bai Shiying fuzzy inference system structure;
Fig. 2 is IEEE three district system security domains.
Embodiment
Below in conjunction with accompanying drawing and embodiment the present invention is described further.
A kind of modeling method of being held power grid security territory optimal load flow model, concrete steps are:
The first step: the stability analysis through to power flow equation promptly comes the constructing system security domain to the stability and the N-1 criterion of system's quiescent voltage, phase angle, oscillation frequency; Be the security domain expression formula that obtains to disperse; The N of a system load can be transformed to M the different sets that load direction is formed by given power generation dispatching criterion; N is the quantity of loading in the system, and given system has fixing load quantity, generates following critical load matrix and comes security domain is carried out approximate processing:
Second step: it is following to make up dynamic security constrained optimum tide model:
Objective function: S b = - ( C d T P d - C s T P s ) - - - ( 2 )
Constraint condition: F PF(δ, V, Q g, P s, P d)=0 (3)
0 ≤ P s ≤ P s max - - - ( 4 )
0 ≤ P d ≤ P d max - - - ( 5 )
I Ij ( δ , V ) ≤ I i j Max ∀ i , j , i ≠ J i , j For more than or equal to 1 natural number (6)
Q g min ≤ Q g ≤ Q g max - - - ( 7 )
V min≤V≤V max (8)
f NR 0 - f NR ( V , δ ) ≤ 0 - - - ( 9 )
Wherein, C sAnd C dBe respectively the bid of electric power supply and demand, the unit $/MWh of unit; System's supply and demand power is respectively P sAnd P d, unit is MW; F PF() is the system load flow equation; V and δ are respectively that node voltage is with crossing; I IjBe electric current through transmission line of electricity ij, this constraint definition the thermally-stabilised limit of system; Q gBe generator reactive power; f NR() is used to represent the security of system territory,
Figure BDA00002045902100081
Be its suitable critical value.
The 3rd step: set up Adaptive Neuro-fuzzy Inference.
The 4th step: train the adaptive fuzzy inference system and set up the optimal load flow model, security domain constrained optimum tide model is:
Objective function: S b = C s T P s - C d T Δ P d - - - ( 10 )
Constraint condition: F PF(δ, V, Q g, P s, P d, Q d)=0 (11)
0≤P s≤P smax (12)
Q smin≤Q s≤Q smax (13)
V min≤V≤V max (14)
λ l - Σ i w i m f i m Σ i w i m ≤ 0 ∀ m = 1 , . . . , G - - - ( 15 )
Δ P Dj≤0j is the natural number (16) more than or equal to 1
Δ P d j = ( α d j - α 0 d j 0 ) P Dj 0 J is the natural number (17) more than or equal to 1
j is the natural number (18) more than or equal to 1
0≤d j≤1 j is the natural number (19) more than or equal to 1
Σ j = 1 N d j = 1 - - - ( 20 )
α≥0 (21)
Wherein, Δ P dBe the changing load amount; M is m security of system territory of all G scheduling scheme.Constraint condition (11) makes Δ P by force dBe 0 or negative.If Δ P dBe 0, then the optimal load flow model is separated; Otherwise, if Δ P dBe negative, represent then that the optimal load flow model does not have to separate.Therefore; This optimal load flow model has been explained the operation criterion of current electric power system dispatching well;
Figure BDA00002045902100091
is the merit angle, and active power, reactive power and applied power are formed right-angle triangle, and applied power is a hypotenuse; Angle between the meritorious and applied power is at the merit angle; General G is an imaginary number with its cosine value representation power factor, and m is the number among 1~G.
The concrete steps of the said first step are:
(1) setting up electric system can little algebraic equation be: x · = h ( x , y , ρ , λ ) 0 = g ( x , y , ρ , λ ) - - - ( 22 ) Wherein, x is a system state variables, and common have generator speed and a corner; Y represents the algebraically variable, like load side voltage etc.; ρ representes system's controllable variable, like the generator voltage grade; λ is one group of uncontrollable parameter, and common have load to gain merit and reactive power.
(2) confirm load direction d i=[d I1d I2D IN] TWhen load increases along a certain specific direction, electric system will reach operational limit, come the constructing system security domain through the stability analysis to power flow equation; Promptly come the constructing system security domain, establish λ according to system's quiescent voltage, phase angle, oscillation frequency being carried out stability and N-1 operation criterion i=[λ I1λ I2λ IN] TBe i load increasing rate in N the load, i is the natural number more than or equal to 1, and λ is expressed as
λ il=αd i1
λ i2=αd i2 (23)
...
λ iN=αd iN
Wherein, loading coefficient is represented in scalar ce>=0, d IjThe load growth direction of expression load j under i load growth rate, i and j are the natural number more than or equal to 1, and load direction satisfies following condition:
0≤d ij≤1 ∀ j
Σ j = 1 N d ij = 1 - - - ( 24 )
(3) can make system reach the safety and stability border gradually through increasing loading coefficient α; And then N load of definite stability boundaris ultimate value system can be transformed to M the different sets that load direction is formed by given power generation dispatching criterion, generates following critical load matrix and come security domain is similar to:
Figure BDA00002045902100101
In said the 3rd step, Adaptive Neuro-fuzzy Inference is divided into six layers: X 1, X 2Be the input of system, the output of y inference system; Network has similar function with each node of one deck, uses O 1iRepresent i node output, i is the natural number more than or equal to 1;
Ground floor: will import data and carry out Fuzzy Processing:
O 1i=μ Ai(x 1),O 2i=μ Bi(x 2),i=1,2 (25)
Wherein, A iOr B iIt is fuzzy set; μ Ai(x 1) be the membership function of fuzzy set.
The second layer: each input data subordinate function is multiplied each other, as the relevance grade w of this layer rule i:
w i=μ Ai(x 1Bi(x 2),i=1,2 (26)
The 3rd layer: the w that calculates i bar rule iAnd all relevance grade sum w 1+ w 2, and pass through the normalization that both ratios are accomplished each bars rule relevance grade:
w i ′ = w i w 1 + w 2 , i = 1,2 - - - ( 27 )
The 4th layer: the output that is used to calculate each bar rule:
O′ 4i=w′ if i=w′ i(p ix 1+q ix 2+r i),i=1,2(28)
Wherein, f iBe the consequent conclusion output function of fuzzy system, p i, q iBe the system's weighting coefficient under the i bar rule, r iBe the constant under the i rules and regulations, when this output function is linear function, be called " first-order system "; If constant is called " zeroth order system ".
Layer 5: be used for total output of computing system:
y = Σ i w i ′ f i = Σ i w i f i Σ i w i - - - ( 29 )
Layer 6 should be exported the result through method of weighted mean and carry out the defuzzification processing, and made the error between input and the output minimum through back propagation and least square method.
Concrete steps in said the 4th step are:
(1) training adaptive fuzzy inference system; Make the input of the border formed of M ultimate value
Figure BDA00002045902100111
of N-1 load as the adaptive fuzzy inference system, the safe edge dividing value
Figure BDA00002045902100112
that defines i load bus is expressed as:
λ Il c ≈ f ( λ i 1 , λ i 2 , . . . , λ Il - 1 , λ Il + 1 , . . . , λ IN ) ≈ f ( λ ^ i ) I is the natural number more than or equal to 1: (30)
The mapping function that is got the load growth rate by formula (9) and formula (25) is:
λ l c = Σ i w i f i Σ i w i - - - ( 31 )
(2) it is intrafascicular approximately formula (26) to be used for the security domain of optimal load flow equation, forms security domain constrained optimum tide model to be:
Objective function: S b = C s T P s - C d T Δ P d - - - ( 10 )
Constraint condition: F PF(δ, V, Q g, P s, P d, Q d)=0 (11)
0≤P s≤P smax (12)
Q smin≤Q s≤Q smax (13)
V min≤V≤V max (14)
λ l - Σ i w i m f i m Σ i w i m ≤ 0 , ∀ m = 1 , . . . , G - - - ( 15 )
ΔP dj ≤ 0 , ∀ j = 1 , . . . , N - - - ( 16 )
ΔP d j = ( α d j - α 0 d j 0 ) P dj 0 , ∀ j = 1 , . . . , N - - - ( 17 )
Figure BDA00002045902100119
0 ≤ d j ≤ 1 , ∀ j = 1 , . . . , N - - - ( 19 )
Σ j = 1 N d j = 1 - - - ( 20 )
α≥0 (21)
Utilize PST, PSAT and UWPFLOW software carry out emulation to system.PSAT is used to calculate the conventional trend parameter of electric system, and with the input of this flow data as UWPFLOW and PST, obtains the voltage stability boundaris and concussion stability boundaris of system respectively; Again by the output result of PST and UWPFLOW gained as the input among the PSAT, calculate remaining voltage-regulation coefficient with this, thereby confirm total system safety and stability territory.Generate the sealing differentiable function through adaptive fuzzy inference system software by gained safety and stability territory, and with this function embedded system optimal load flow model, respectively through Newton method and interior point method compute optimal tide model.
Select for use IEEE 118 node standard testing system verifications to put forward the practicality of optimal load flow model; Analyze and do not lose ubiquity for simplifying; Optimal load flow model security domain obtains through typical scheduling method; G=1 in the formula 31 for example, IEEE 118 node standard testing systems are made up of 53 generators and 91 loads, and table 1 is genset bid data.
Table 1 genset bid data
Figure BDA00002045902100122
Press layering and zoning principle and electricity market related notion; Respectively this test macro is divided into three and four operation areas; Corresponding security domain is promptly represented each interregional power transmission limitations, with 631 different load flows that obtain to as adaptive fuzzy inference system training data.
Embodiment one:
As shown in Figure 2, former 118 node standard testing systems are divided into three zones, and wherein zone 1 respectively comprises 31 loads with zone 2, and zone 3 comprises 29 loads.To a station symbol semicomputer (Duo 2 double-core 2.2Ghz processors, 2G internal memory), remain in the 10-5 for making the error between input and the output, obtained the security of system territory altogether in 156 seconds consuming time.
Be the validity of the test optimal load flow model of putting forward, press the selected P of table 2 DA1, P DA2And P DA3Force the system running state security domain that jumps out, mark three among Fig. 2 respectively and jump out a little, the bid of wherein supposing the changing load amount is C DA1=200$/MWh, C DA2=400$/MWh and C DA3=600$/MWh, separating of corresponding optimal load flow model is as shown in table 3; Analysis can know that in the ordinary course of things, the highest load P bids DA1Reduction Δ Pd A1Minimum is so that system running state is got back in the security domain.
Table 2 system testing scheme
Figure BDA00002045902100131
Table 3 system loading change amount
Figure BDA00002045902100132
Embodiment two:
Former 118 node standard testing systems are divided into four zones, and wherein zone 1, zone 2 respectively comprise 22 loads with zone 3, and zone 4 comprises 25 loads.For making the error between input and the output remain on 10 -5In, obtained the security of system territory altogether in 225 seconds consuming time.Know selected P by three regional sample calculation analysis DA1, P DA2, P DA3And P DA4Force the system running state security domain that jumps out, like table 4; The bid of supposing the changing load amount is C DA1=800$/MWh, C DA2=100$/MWh, C DA3=300$/MWh and C DA4=600$/MWh;
Table 5-4 system testing scheme
Figure BDA00002045902100133
Table 5-5 system loading change amount
Figure BDA00002045902100134
Figure BDA00002045902100141
Separating of corresponding optimal load flow model is as shown in table 5; In the four regional examples, the highest load P bids DA1The load P relatively low with bid DA2And P DA3Reduction all approaches 0, and the zone four load reduction Δ Ps bigger to the security of system influence DA4Maximum, analysis can be known, in the ordinary course of things, measure valency than changing load, and security of system is bigger to the influence of load reduction.
Though the above-mentioned accompanying drawing specific embodiments of the invention that combines is described; But be not restriction to protection domain of the present invention; One of ordinary skill in the art should be understood that; On the basis of technical scheme of the present invention, those skilled in the art need not pay various modifications that creative work can make or distortion still in protection scope of the present invention.

Claims (5)

1. a modeling method of being held power grid security territory optimal load flow model is characterized in that, concrete steps are:
The first step: the stability analysis through to power flow equation promptly comes the constructing system security domain to the stability and the N-1 criterion of system's quiescent voltage, phase angle, oscillation frequency; Be the security domain expression formula that obtains to disperse; The N of system load is transformed to M the different sets that load direction is formed by given power generation dispatching criterion, and N, M are the natural number more than or equal to 1, and N is the quantity of loading in the system; Given system has fixing load quantity, generates the critical load matrix and comes security domain is carried out approximate processing;
Second step: make up dynamic security constrained optimum tide model;
The 3rd step: set up Adaptive Neuro-fuzzy Inference;
The 4th step: train the adaptive fuzzy inference system and set up the optimal load flow model.
2. a kind of according to claim 1 modeling method of being held power grid security territory optimal load flow model is characterized in that the concrete steps of the said first step are:
(1) setting up electric system can little algebraic equation be: x · = h ( x , y , ρ , λ ) 0 = g ( x , y , ρ , λ ) - - - ( 22 ) Wherein, x is a system state variables, and common have generator speed and a corner; Y represents the algebraically variable, like load side voltage etc.; ρ representes system's controllable variable, like the generator voltage grade; λ is one group of uncontrollable parameter, and common have load to gain merit and reactive power;
(2) confirm load direction d i=[d I1d I2D IN] TWhen load increases along a certain specific direction, electric system will reach operational limit, come the constructing system security domain through the stability analysis to power flow equation; Promptly come the constructing system security domain according to system's quiescent voltage, phase angle, oscillation frequency being carried out stability and N-1 operation criterion
Figure FDA00002045902000012
Be the merit angle, active power, reactive power and applied power are formed right-angle triangle, and applied power is a hypotenuse, and the angle between the meritorious and applied power is generally used its cosine value representation power factor at the merit angle, and G is an imaginary number, and m is the number among 1 ~ G;
If λ i=[λ I1λ I2λ IN] TBe i load increasing rate in N the load, i is the natural number more than or equal to 1, and λ is expressed as:
λ il=αd i1
λ i2=αd i2 (23)
...
λ iN=αd iN
Wherein, loading coefficient is represented in scalar ce>=0, d IjThe load growth direction of expression load j under i load growth rate, i and j are the natural number more than or equal to 1, and load direction satisfies following condition:
0 ≤ d ij ≤ 1 , ∀ j Σ j = 1 N d ij = 1 - - - ( 24 )
(3) can make system reach the safety and stability border gradually through increasing loading coefficient α; And then N load of definite stability boundaris ultimate value system can be transformed to M the different sets that load direction is formed by given power generation dispatching criterion, generates following critical load matrix and come security domain is similar to:
3. a kind of according to claim 1 modeling method of being held power grid security territory optimal load flow model is characterized in that, the optimal load flow model in said second step is following:
Objective function: S b = - ( C d T P d - C s T P s ) - - - ( 2 )
Constraint condition: F PF(δ, V, Q g, P s, P d)=0 (3)
0 ≤ P s ≤ P s max - - - ( 4 )
0 ≤ P d ≤ P d max - - - ( 5 )
I Ij ( δ , V ) ≤ I i j Max ∀ i , j , i ≠ J i , j Be natural number (6) more than or equal to l
Q g min ≤ Q g ≤ Q g max - - - ( 7 )
V min≤V≤V max (8)
f NR 0 - f NR ( V , δ ) ≤ 0 - - - ( 9 )
Wherein, C sAnd C dBe respectively the bid of electric power supply and demand, the unit $/MWh of unit; System's supply and demand power is respectively P sAnd P d, unit is MW; F PF() is the system load flow equation; V and δ are respectively that node voltage is with crossing; I IjBe electric current through transmission line of electricity ij, this constraint definition the thermally-stabilised limit of system; Q gBe generator reactive power; f NR() is used to represent the security of system territory,
Figure FDA00002045902000031
Be its suitable critical value.
4. a kind of according to claim 1 modeling method of being held power grid security territory optimal load flow model is characterized in that, in said the 3rd step, Adaptive Neuro-fuzzy Inference is divided into six layers: X 1, X 2Be the input of system, the output of y inference system; Network has similar function with each node of one deck, uses O 1iRepresent i node output, i is the natural number more than or equal to 1;
Ground floor: will import data and carry out Fuzzy Processing:
O 1i=μ Ai(x 1),O 2i=μ Bi(x 2),i=1,2(25)
Wherein, A iOr B iIt is fuzzy set; μ Ai(x 1) be the membership function of fuzzy set;
The second layer: each input data subordinate function is multiplied each other, as the relevance grade w of this layer rule i:
w i=μ Ai(x 1Bi(x 2),i=1,2(26)
The 3rd layer: the w that calculates i bar rule iAnd all relevance grade sum w 1+ w 2, and pass through the normalization that both ratios are accomplished each bars rule relevance grade:
w i ′ = w i w 1 + w 2 , i = 1,2 - - - ( 27 )
The 4th layer: the output that is used to calculate each bar rule:
O′ 4i=w′ if i=w′ i(p ix 1+q ix 2+r i),i=1,2(28)
Wherein, f iBe the consequent conclusion output function of fuzzy system, p i, q iBe the system's weighting coefficient under the i bar rule, r iBe the constant under the i rules and regulations, when this output function is linear function, be called " first-order system "; If constant is called " zeroth order system ";
Layer 5: be used for total output of computing system:
y = Σ i w i ′ f i = Σ i w i f i Σ i w i - - - ( 29 )
Layer 6 should be exported the result through method of weighted mean and carry out the defuzzification processing, and made the error between input and the output minimum through back propagation and least square method.
5. a kind of according to claim 1 modeling method of being held power grid security territory optimal load flow model is characterized in that, the concrete steps in said the 4th step are:
(1) training adaptive fuzzy inference system; Make of the input of the border formed of M ultimate value λ ic of N-1 load as the adaptive fuzzy inference system; N is the quantity of loading in the system; Given system has fixing load quantity, and M is a natural number, and the safe edge dividing value λ lic that defines i load bus is expressed as:
λ Il c ≈ f ( λ i 1 , λ i 2 , . . . , λ Il - 1 , λ Il + 1 , . . . , λ IN ) ≈ f ( λ ^ i ) I is the natural number more than or equal to 1: (30)
The mapping function that is got the load growth rate by formula (9) and formula (25) is:
λ l c = Σ i w i f i Σ i w i - - - ( 31 )
(2) it is intrafascicular approximately formula (26) to be used for the security domain of optimal load flow equation, forms security domain constrained optimum tide model to be:
Objective function: S b = C s T P s - C d T Δ P d - - - ( 10 )
Constraint condition: F PF(δ, V, Q g, P s, P d, Q d)=0 (11)
0≤P s≤P smax (12)
Q smin≤Q s≤Q smax (13)
V min≤V≤V max (14)
λ l - Σ i w i m f i m Σ i w i m ≤ 0 , ∀ m = 1 , . . . , G - - - ( 15 )
ΔP dj ≤ 0 , ∀ j = 1 , . . . , N - - - ( 16 )
ΔP d j = ( α d j - α 0 d j 0 ) P dj 0 , ∀ j = 1 , . . . , N - - - ( 17 )
Figure FDA00002045902000047
0 ≤ d j ≤ 1 , ∀ j = 1 , . . . , N - - - ( 19 )
Σ j = 1 N d j = 1 - - - ( 20 )
α≥0(21);
Wherein, Δ P dBe the changing load amount; M is m security of system territory of all G scheduling scheme, and constraint condition (11) makes Δ P by force dBe 0 or negative; If Δ P dBe 0, then the optimal load flow model is separated; Otherwise, if Δ P dBe negative, represent then that the optimal load flow model does not have to separate that therefore, this optimal load flow model has been explained the operation criterion of current electric power system dispatching well,
Figure FDA00002045902000052
Be the merit angle, active power, reactive power and applied power are formed right-angle triangle, and applied power is a hypotenuse, and the angle between the meritorious and applied power is generally used its cosine value representation power factor at the merit angle, and G is an imaginary number, and m is the number among 1 ~ G.
CN201210301629.0A 2012-08-23 2012-08-23 The modeling method of receiving end grid security domain optimal load flow model Active CN102841965B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210301629.0A CN102841965B (en) 2012-08-23 2012-08-23 The modeling method of receiving end grid security domain optimal load flow model

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210301629.0A CN102841965B (en) 2012-08-23 2012-08-23 The modeling method of receiving end grid security domain optimal load flow model

Publications (2)

Publication Number Publication Date
CN102841965A true CN102841965A (en) 2012-12-26
CN102841965B CN102841965B (en) 2015-10-28

Family

ID=47369324

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210301629.0A Active CN102841965B (en) 2012-08-23 2012-08-23 The modeling method of receiving end grid security domain optimal load flow model

Country Status (1)

Country Link
CN (1) CN102841965B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103050970A (en) * 2013-01-15 2013-04-17 华北电力大学 Stability analyzing and optimizing method suitable for layering and zoning of ultra-high voltage electric network
CN103106338A (en) * 2013-01-17 2013-05-15 天津大学 Method of fast generating boundary of electric system thermal stability security domain in decision space
CN104680262A (en) * 2015-03-18 2015-06-03 国网上海市电力公司 Receiving-end grid optimal layering and districting scheme obtaining method
CN104809521A (en) * 2015-05-05 2015-07-29 国家电网公司 Double-layer optimization based evaluation method for external power receiving capability of receiving-end power grid
CN105552906A (en) * 2016-02-14 2016-05-04 华南理工大学 Regional power grid load margin analysis method based on prime-dual interior point method
CN107341615A (en) * 2017-07-10 2017-11-10 上海海能信息科技有限公司 A kind of local power net dynamic security economic load dispatching management system
CN109376939A (en) * 2018-11-01 2019-02-22 三峡大学 A kind of grid stability real-time predicting method based on adaptive neural network

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101247045A (en) * 2008-03-20 2008-08-20 天津大学 Electric voltage safety monitoring method based on voltage stabilization field in partition load space
CN101281637A (en) * 2008-05-09 2008-10-08 天津大学 Electric power system optimizing swim and real time pricing method based on hyperplane form safety field periphery

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101247045A (en) * 2008-03-20 2008-08-20 天津大学 Electric voltage safety monitoring method based on voltage stabilization field in partition load space
CN101281637A (en) * 2008-05-09 2008-10-08 天津大学 Electric power system optimizing swim and real time pricing method based on hyperplane form safety field periphery

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103050970A (en) * 2013-01-15 2013-04-17 华北电力大学 Stability analyzing and optimizing method suitable for layering and zoning of ultra-high voltage electric network
CN103106338A (en) * 2013-01-17 2013-05-15 天津大学 Method of fast generating boundary of electric system thermal stability security domain in decision space
CN103106338B (en) * 2013-01-17 2016-04-27 天津大学 The border rapid generation of electric system thermal stability security domain on decision space
CN104680262A (en) * 2015-03-18 2015-06-03 国网上海市电力公司 Receiving-end grid optimal layering and districting scheme obtaining method
CN104809521A (en) * 2015-05-05 2015-07-29 国家电网公司 Double-layer optimization based evaluation method for external power receiving capability of receiving-end power grid
CN104809521B (en) * 2015-05-05 2018-01-05 国家电网公司 By electric energy power evaluation method outside a kind of receiving end power network based on dual-layer optimization
CN105552906A (en) * 2016-02-14 2016-05-04 华南理工大学 Regional power grid load margin analysis method based on prime-dual interior point method
CN105552906B (en) * 2016-02-14 2018-04-13 华南理工大学 A kind of area power grid load nargin analysis method based on prim al- dual interior point m ethod
CN107341615A (en) * 2017-07-10 2017-11-10 上海海能信息科技有限公司 A kind of local power net dynamic security economic load dispatching management system
CN109376939A (en) * 2018-11-01 2019-02-22 三峡大学 A kind of grid stability real-time predicting method based on adaptive neural network

Also Published As

Publication number Publication date
CN102841965B (en) 2015-10-28

Similar Documents

Publication Publication Date Title
Xu et al. Modeling a pumped storage hydropower integrated to a hybrid power system with solar-wind power and its stability analysis
CN102841965A (en) Modeling method of optimal power flow model of receiving end power grid security domain
Ali et al. Wind farm model aggregation using probabilistic clustering
CN103441506B (en) Method for multi-target coordination reactive power optimization control of distributed wind farm in different time scales
Kouba et al. LFC enhancement concerning large wind power integration using new optimised PID controller and RFBs
CN102611118B (en) Method for comprehensively controlling reactive voltage of wind farm with imported prediction method
Malekpour et al. Probabilistic approach to multi-objective Volt/Var control of distribution system considering hybrid fuel cell and wind energy sources using improved shuffled frog leaping algorithm
CN103050970A (en) Stability analyzing and optimizing method suitable for layering and zoning of ultra-high voltage electric network
CN106026113A (en) Micro-grid system monitoring method having reactive automatic compensation function
CN103904644B (en) A kind of Automatic load distribution method for intelligent transformer substation accessed based on distributed power source
CN103219732A (en) reactive voltage controlling method of power distribution network with variable speed constant frequency wind farm
Hong et al. Optimized interval type-II fuzzy controller-based STATCOM for voltage regulation in power systems with photovoltaic farm
Bhukya et al. Mathematical modelling and stability analysis of PSS for damping LFOs of wind power system
CN103701134A (en) Grid-connected wind power plant point voltage control method based on MCR (Magnetic Control Reactor) and capacitance mixed compensation
CN103094920A (en) Equivalence method of direct-drive-type wind turbine generator wind power plant
CN106532758A (en) DC power re-allocation method during quit running of converter in multi-end DC power transmission system connected with offshore wind power
CN106099991B (en) A kind of power grid wind electricity digestion capability appraisal procedure
Mastoi et al. Large-scale wind power grid integration challenges and their solution: a detailed review
CN102769299A (en) Wind farm voltage control method based on voltage operating state
Somefun et al. Review of different methods for siting and sizing distributed generator
Sanchez et al. Dynamic model of wind energy conversion systems with variable speed synchronous generator and full-size power converter for large-scale power system stability studies
CN105958530A (en) Microgrid system with reactive power automatic compensation function
Wang et al. Modeling and coordinated control for active power regulation of pumped storage‐battery integrated system under small‐disturbances
Ma et al. Coordination of generation and transmission planning for power system with large wind farms
CN115392565A (en) Low-carbon operation optimization method and device for multifunctional park

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant