CN102841965A - Modeling method of optimal power flow model of receiving end power grid security domain - Google Patents
Modeling method of optimal power flow model of receiving end power grid security domain Download PDFInfo
- Publication number
- CN102841965A CN102841965A CN2012103016290A CN201210301629A CN102841965A CN 102841965 A CN102841965 A CN 102841965A CN 2012103016290 A CN2012103016290 A CN 2012103016290A CN 201210301629 A CN201210301629 A CN 201210301629A CN 102841965 A CN102841965 A CN 102841965A
- Authority
- CN
- China
- Prior art keywords
- load
- power
- flow model
- lambda
- security domain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02E—REDUCTION OF GREENHOUSE GAS [GHG] EMISSIONS, RELATED TO ENERGY GENERATION, TRANSMISSION OR DISTRIBUTION
- Y02E60/00—Enabling technologies; Technologies with a potential or indirect contribution to GHG emissions mitigation
Landscapes
- Supply And Distribution Of Alternating Current (AREA)
Abstract
The invention discloses a modeling method of an optimal power flow model of a receiving end power grid security domain. The method includes a first step: constructing a system security domain through analysis of stability of a power flow equation, namely stability of quiescent voltage, phase angles and oscillation frequency of a system, and N-1 operation standards, wherein N loads of the system can be converted into M different sets composed in the load direction according to given power generation dispatching standards to generate a critical load matrix for approximate treatment of the security domain; a second step: constructing a dynamic security constraint optimal power flow model; a third step: constructing a self-adaptive neural fuzzy inference system; and a fourth step: training the self-adaptive fuzzy inference system and constructing the optimal power flow model. The optimal power flow model well expounds the operation standards of current electric power system dispatching. The optimal power flow security domain approximation technology based on the self-adaptive fuzzy inference system can be applied to dispatching optimization between receiving end power grid areas after distribution of hierarchy and areas.
Description
Technical field
The present invention relates to a kind of modeling method of optimal load flow model, relate in particular to a kind of modeling method of being held power grid security territory optimal load flow model.
Background technology
In electric system long-run development process, it is complementary that operation of power networks planning and system load flow calculate.On the one hand, for guaranteeing the safety and stability of whole electrical network, the formation of Electric Power Network Planning need be based upon system load flow and calculate on the basis; On the other hand, the system optimal trend is calculated the stability and the economy that can improve Electric Power Network Planning.Optimal load flow through control device capable of using in the Adjustment System, can be realized the system stable operation state that intended target is optimum satisfying under specific the system's operation and security constraints.Therefore, the system safety operation problem sharp-pointed day by day with complicated situation under, optimal load flow calculates nature becomes the system stability analysis aid indispensable with optimization.
After the access of extra-high voltage grid, the voltage unstability that power shifted initiation on a large scale when system broke down will become one of subject matter of being held electricity net safety stable.Especially after the extra-high voltage backbone network builds up basically, will increase the system short-circuit levels of current.Because the importance of 500kV subregion electrical network, it will be inevitably exists with the form of looped network, and this has just weakened the benefit that layering and zoning can bring.What the fault probability of happening of electric system was the highest is single-line to ground fault.Receiving-end system is comparatively weak, and load center lacks the forceful electric power source to be supported, especially a little less than the support of 500kV electrical network; Cause the 220kV electrical network too intensive; Short-circuit current exceeds standard, and extra-high voltage insert receive greatly to hold electrical network after, the electrical network layering and zoning operates to electricity net safety stable property and brings stern challenge.
Summary of the invention
The object of the invention is exactly in order to address the above problem, and a kind of computing method of being held power grid security territory optimal load flow are provided, and it has the advantage of the operation criterion of having explained current electric power system dispatching well.
To achieve these goals, the present invention adopts following technical scheme:
A kind of modeling method of being held power grid security territory optimal load flow model, concrete steps are:
The first step: the stability analysis through to power flow equation promptly comes the constructing system security domain to the stability and the N-1 criterion of system's quiescent voltage, phase angle, oscillation frequency.Be the security domain expression formula that obtains to disperse; The N of a system load can be transformed to M the different sets that load direction is formed by given power generation dispatching criterion; N, M more than or equal to 1 be natural number; N is the quantity of loading in the system, and given system has fixing load quantity, generates following critical load matrix and comes security domain is carried out approximate processing:
Second step: it is following to make up dynamic security constrained optimum tide model:
Objective function:
Constraint condition: F
PF(δ, V, Q
g, P
s, P
d)=0 (3)
V
min≤V≤V
max (8)
Wherein, C
sAnd C
dBe respectively the bid of electric power supply and demand, the unit $/MWh of unit; System's supply and demand power is respectively P
sAnd P
d, unit is MW; F
PF() is the system load flow equation; V and δ are respectively that node voltage is with crossing; I
IjBe electric current through transmission line of electricity ij, this constraint definition the thermally-stabilised limit of system; Q
gBe generator reactive power; f
NR() is used to represent the security of system territory,
Be its suitable critical value.
The 3rd step: set up the white neural fuzzy inference system that adapts to.
The 4th step: training is white to be adapted to fuzzy inference system and sets up the optimal load flow model, and security domain constrained optimum tide model is:
Objective function:
Constraint condition: F
PF(δ, V, Q
g, P
s, P
d, Q
d)=0 (11)
0≤P
s≤P
smax (12)
Q
smin≤Q
s≤Q
smax (13)
V
min≤V≤V
max (14)
Δ P
Dj≤0 j is the natural number (16) more than or equal to 1
Wherein: Q
dBe the system requirements reactive powers, Q
sBe that system supplies with reactive power,
Be the changing load amount of j node, P
Dj0Be the initial load of j node, loading coefficient is represented in scalar ce>=0, α
0Be initial load coefficient, d
J0The expression initial load increases vector, d
jRepresent the load growth vector of all loads under i load growth rate: d
j=[d
J1, d
J2... D
JN]
T
0≤d
j≤1 j is the natural number (19) more than or equal to 1
α≥0(21)
Wherein, Δ P
dBe the changing load amount; M is m security of system territory of all G scheduling scheme.Constraint condition (11) makes Δ P by force
dBe 0 or negative.If Δ P
dBe 0, then the optimal load flow model is separated; Otherwise, if Δ P
dBe negative, represent then that the optimal load flow model does not have to separate.Therefore; This optimal load flow model has been explained the operation criterion of current electric power system dispatching well;
is the merit angle, and active power, reactive power and applied power are formed right-angle triangle, and applied power is a hypotenuse; Angle between the meritorious and applied power is at the merit angle; General G is an imaginary number with its cosine value representation power factor, and m is the number among 1 ~ G.
The concrete steps of the said first step are:
(1) setting up electric system can little algebraic equation be:
Wherein, x is a system state variables, and common have generator speed and a corner; Y represents the algebraically variable, like load side voltage etc.; ρ representes system's controllable variable, like the generator voltage grade; λ is one group of uncontrollable parameter, and common have load to gain merit and reactive power.
(2) confirm load direction d
i=[d
I1d
I2D
IN]
TWhen load increases along a certain specific direction, electric system will reach operational limit, come the constructing system security domain through the stability analysis to power flow equation; Promptly come the constructing system security domain, establish λ according to system's quiescent voltage, phase angle, oscillation frequency being carried out stability and N-1 operation criterion
i=[λ
I1λ
I2λ
IN]
TBe i load increasing rate in N the load, i is the natural number more than or equal to 1, and λ is expressed as
λ
il=αd
i1
λ
i2=αd
i2 (23)
...
λ
iN=αd
iN
Wherein, loading coefficient is represented in scalar ce>=0, d
IjThe load growth direction of expression load j under i load growth rate, i and j are the natural number more than or equal to 1, and load direction satisfies following condition:
(3) can make system reach the safety and stability border gradually through increasing loading coefficient α; And then N load of definite stability boundaris ultimate value
system can be transformed to M the different sets that load direction is formed by given power generation dispatching criterion, generates following critical load matrix and come security domain is similar to:
In said the 3rd step, Adaptive Neuro-fuzzy Inference is divided into six layers: X
1, X
2Be the input of system, the output of y inference system; Network has similar function with each node of one deck, uses O
1i, O
2iRepresent i node output, i is the natural number more than or equal to 1;
Ground floor: will import data and carry out Fuzzy Processing:
O
1i=μ
Ai(x
1),O
2i=μ
Bi(x
2),i=1,2 (25)
Wherein, A
iOr B
iIt is fuzzy set; μ
Ai(x
1), μ
Bi(x
2) be the membership function of fuzzy set.
The second layer: each input data subordinate function is multiplied each other, as the relevance grade w of this layer rule
i:
w
i=μ
Ai(x
1)μ
Bi(x
2),i=1,2 (26)
The 3rd layer: the w that calculates i bar rule
iAnd all relevance grade sum w
1+ w
2, and pass through the normalization that both ratios are accomplished each bars rule relevance grade:
The 4th layer: the output that is used to calculate each bar rule:
O′
4i=w′
if
i=w′
i(p
ix
1+q
ix
2+r
i),i=1,2 (28)
Wherein, f
iBe the consequent conclusion output function of fuzzy system, p
i, q
iBe the system's weighting coefficient under the i bar rule, r
iBe the constant under the i rules and regulations, when this output function is linear function, be called " first-order system "; If constant is called " zeroth order system ".
Layer 5: be used for total output of computing system:
Layer 6 should be exported the result through method of weighted mean and carry out the defuzzification processing, and made the error between input and the output minimum through back propagation and least square method.
Concrete steps in said the 4th step are:
(1) training adaptive fuzzy inference system; Make of the input of the border formed of M ultimate value
of N-1 load as the adaptive fuzzy inference system; N is the natural number greater than 1; M is the natural number more than or equal to 1, and the safe edge dividing value
that defines i load bus is expressed as:
The mapping function that is got the load growth rate by formula (9) and formula (25) is:
(2) it is intrafascicular approximately formula (26) to be used for the security domain of optimal load flow equation, forms security domain constrained optimum tide model to be:
Objective function:
Constraint condition: F
PF(δ, V, Q
g, P
s, P
d, Q
d)=0 (11)
0≤P
s≤P
smax (12)
Q
smin≤Q
s≤Q
smax (13)
V
min≤V≤V
max (14)
α≥0 (21)
Beneficial effect of the present invention: the present invention is based on the adaptive fuzzy inference system and confirm the security of system territory.Adopt IEEE 118 node standard testing systems that the feasibility and the efficient of adaptive fuzzy inference system are carried out simulation calculation and checking, and verify that on layering and zoning theoretical foundation this method is to being held the feasibility of electrical network.The result shows, can apply to held the interregional optimizing scheduling of electrical network behind the layering and zoning based on the optimal load flow security domain approximation technique of adaptive fuzzy inference system.
Description of drawings
Fig. 1 is typical Bai Shiying fuzzy inference system structure;
Fig. 2 is IEEE three district system security domains.
Embodiment
Below in conjunction with accompanying drawing and embodiment the present invention is described further.
A kind of modeling method of being held power grid security territory optimal load flow model, concrete steps are:
The first step: the stability analysis through to power flow equation promptly comes the constructing system security domain to the stability and the N-1 criterion of system's quiescent voltage, phase angle, oscillation frequency; Be the security domain expression formula that obtains to disperse; The N of a system load can be transformed to M the different sets that load direction is formed by given power generation dispatching criterion; N is the quantity of loading in the system, and given system has fixing load quantity, generates following critical load matrix and comes security domain is carried out approximate processing:
Second step: it is following to make up dynamic security constrained optimum tide model:
Objective function:
Constraint condition: F
PF(δ, V, Q
g, P
s, P
d)=0 (3)
V
min≤V≤V
max (8)
Wherein, C
sAnd C
dBe respectively the bid of electric power supply and demand, the unit $/MWh of unit; System's supply and demand power is respectively P
sAnd P
d, unit is MW; F
PF() is the system load flow equation; V and δ are respectively that node voltage is with crossing; I
IjBe electric current through transmission line of electricity ij, this constraint definition the thermally-stabilised limit of system; Q
gBe generator reactive power; f
NR() is used to represent the security of system territory,
Be its suitable critical value.
The 3rd step: set up Adaptive Neuro-fuzzy Inference.
The 4th step: train the adaptive fuzzy inference system and set up the optimal load flow model, security domain constrained optimum tide model is:
Objective function:
Constraint condition: F
PF(δ, V, Q
g, P
s, P
d, Q
d)=0 (11)
0≤P
s≤P
smax (12)
Q
smin≤Q
s≤Q
smax (13)
V
min≤V≤V
max (14)
Δ P
Dj≤0j is the natural number (16) more than or equal to 1
j is the natural number (18) more than or equal to 1
0≤d
j≤1 j is the natural number (19) more than or equal to 1
α≥0 (21)
Wherein, Δ P
dBe the changing load amount; M is m security of system territory of all G scheduling scheme.Constraint condition (11) makes Δ P by force
dBe 0 or negative.If Δ P
dBe 0, then the optimal load flow model is separated; Otherwise, if Δ P
dBe negative, represent then that the optimal load flow model does not have to separate.Therefore; This optimal load flow model has been explained the operation criterion of current electric power system dispatching well;
is the merit angle, and active power, reactive power and applied power are formed right-angle triangle, and applied power is a hypotenuse; Angle between the meritorious and applied power is at the merit angle; General G is an imaginary number with its cosine value representation power factor, and m is the number among 1~G.
The concrete steps of the said first step are:
(1) setting up electric system can little algebraic equation be:
Wherein, x is a system state variables, and common have generator speed and a corner; Y represents the algebraically variable, like load side voltage etc.; ρ representes system's controllable variable, like the generator voltage grade; λ is one group of uncontrollable parameter, and common have load to gain merit and reactive power.
(2) confirm load direction d
i=[d
I1d
I2D
IN]
TWhen load increases along a certain specific direction, electric system will reach operational limit, come the constructing system security domain through the stability analysis to power flow equation; Promptly come the constructing system security domain, establish λ according to system's quiescent voltage, phase angle, oscillation frequency being carried out stability and N-1 operation criterion
i=[λ
I1λ
I2λ
IN]
TBe i load increasing rate in N the load, i is the natural number more than or equal to 1, and λ is expressed as
λ
il=αd
i1
λ
i2=αd
i2 (23)
...
λ
iN=αd
iN
Wherein, loading coefficient is represented in scalar ce>=0, d
IjThe load growth direction of expression load j under i load growth rate, i and j are the natural number more than or equal to 1, and load direction satisfies following condition:
0≤d
ij≤1
(3) can make system reach the safety and stability border gradually through increasing loading coefficient α; And then N load of definite stability boundaris ultimate value
system can be transformed to M the different sets that load direction is formed by given power generation dispatching criterion, generates following critical load matrix and come security domain is similar to:
In said the 3rd step, Adaptive Neuro-fuzzy Inference is divided into six layers: X
1, X
2Be the input of system, the output of y inference system; Network has similar function with each node of one deck, uses O
1iRepresent i node output, i is the natural number more than or equal to 1;
Ground floor: will import data and carry out Fuzzy Processing:
O
1i=μ
Ai(x
1),O
2i=μ
Bi(x
2),i=1,2 (25)
Wherein, A
iOr B
iIt is fuzzy set; μ
Ai(x
1) be the membership function of fuzzy set.
The second layer: each input data subordinate function is multiplied each other, as the relevance grade w of this layer rule
i:
w
i=μ
Ai(x
1)μ
Bi(x
2),i=1,2 (26)
The 3rd layer: the w that calculates i bar rule
iAnd all relevance grade sum w
1+ w
2, and pass through the normalization that both ratios are accomplished each bars rule relevance grade:
The 4th layer: the output that is used to calculate each bar rule:
O′
4i=w′
if
i=w′
i(p
ix
1+q
ix
2+r
i),i=1,2(28)
Wherein, f
iBe the consequent conclusion output function of fuzzy system, p
i, q
iBe the system's weighting coefficient under the i bar rule, r
iBe the constant under the i rules and regulations, when this output function is linear function, be called " first-order system "; If constant is called " zeroth order system ".
Layer 5: be used for total output of computing system:
Layer 6 should be exported the result through method of weighted mean and carry out the defuzzification processing, and made the error between input and the output minimum through back propagation and least square method.
Concrete steps in said the 4th step are:
(1) training adaptive fuzzy inference system; Make the input of the border formed of M ultimate value
of N-1 load as the adaptive fuzzy inference system, the safe edge dividing value
that defines i load bus is expressed as:
The mapping function that is got the load growth rate by formula (9) and formula (25) is:
(2) it is intrafascicular approximately formula (26) to be used for the security domain of optimal load flow equation, forms security domain constrained optimum tide model to be:
Objective function:
Constraint condition: F
PF(δ, V, Q
g, P
s, P
d, Q
d)=0 (11)
0≤P
s≤P
smax (12)
Q
smin≤Q
s≤Q
smax (13)
V
min≤V≤V
max (14)
α≥0 (21)
Utilize PST, PSAT and UWPFLOW software carry out emulation to system.PSAT is used to calculate the conventional trend parameter of electric system, and with the input of this flow data as UWPFLOW and PST, obtains the voltage stability boundaris and concussion stability boundaris of system respectively; Again by the output result of PST and UWPFLOW gained as the input among the PSAT, calculate remaining voltage-regulation coefficient with this, thereby confirm total system safety and stability territory.Generate the sealing differentiable function through adaptive fuzzy inference system software by gained safety and stability territory, and with this function embedded system optimal load flow model, respectively through Newton method and interior point method compute optimal tide model.
Select for use IEEE 118 node standard testing system verifications to put forward the practicality of optimal load flow model; Analyze and do not lose ubiquity for simplifying; Optimal load flow model security domain obtains through typical scheduling method; G=1 in the formula 31 for example, IEEE 118 node standard testing systems are made up of 53 generators and 91 loads, and table 1 is genset bid data.
Table 1 genset bid data
Press layering and zoning principle and electricity market related notion; Respectively this test macro is divided into three and four operation areas; Corresponding security domain is promptly represented each interregional power transmission limitations, with 631 different load flows that obtain to as adaptive fuzzy inference system training data.
Embodiment one:
As shown in Figure 2, former 118 node standard testing systems are divided into three zones, and wherein zone 1 respectively comprises 31 loads with zone 2, and zone 3 comprises 29 loads.To a station symbol semicomputer (Duo 2 double-core 2.2Ghz processors, 2G internal memory), remain in the 10-5 for making the error between input and the output, obtained the security of system territory altogether in 156 seconds consuming time.
Be the validity of the test optimal load flow model of putting forward, press the selected P of table 2
DA1, P
DA2And P
DA3Force the system running state security domain that jumps out, mark three among Fig. 2 respectively and jump out a little, the bid of wherein supposing the changing load amount is C
DA1=200$/MWh, C
DA2=400$/MWh and C
DA3=600$/MWh, separating of corresponding optimal load flow model is as shown in table 3; Analysis can know that in the ordinary course of things, the highest load P bids
DA1Reduction Δ Pd
A1Minimum is so that system running state is got back in the security domain.
Table 2 system testing scheme
Table 3 system loading change amount
Embodiment two:
Former 118 node standard testing systems are divided into four zones, and wherein zone 1, zone 2 respectively comprise 22 loads with zone 3, and zone 4 comprises 25 loads.For making the error between input and the output remain on 10
-5In, obtained the security of system territory altogether in 225 seconds consuming time.Know selected P by three regional sample calculation analysis
DA1, P
DA2, P
DA3And P
DA4Force the system running state security domain that jumps out, like table 4; The bid of supposing the changing load amount is C
DA1=800$/MWh, C
DA2=100$/MWh, C
DA3=300$/MWh and C
DA4=600$/MWh;
Table 5-4 system testing scheme
Table 5-5 system loading change amount
Separating of corresponding optimal load flow model is as shown in table 5; In the four regional examples, the highest load P bids
DA1The load P relatively low with bid
DA2And P
DA3Reduction all approaches 0, and the zone four load reduction Δ Ps bigger to the security of system influence
DA4Maximum, analysis can be known, in the ordinary course of things, measure valency than changing load, and security of system is bigger to the influence of load reduction.
Though the above-mentioned accompanying drawing specific embodiments of the invention that combines is described; But be not restriction to protection domain of the present invention; One of ordinary skill in the art should be understood that; On the basis of technical scheme of the present invention, those skilled in the art need not pay various modifications that creative work can make or distortion still in protection scope of the present invention.
Claims (5)
1. a modeling method of being held power grid security territory optimal load flow model is characterized in that, concrete steps are:
The first step: the stability analysis through to power flow equation promptly comes the constructing system security domain to the stability and the N-1 criterion of system's quiescent voltage, phase angle, oscillation frequency; Be the security domain expression formula that obtains to disperse; The N of system load is transformed to M the different sets that load direction is formed by given power generation dispatching criterion, and N, M are the natural number more than or equal to 1, and N is the quantity of loading in the system; Given system has fixing load quantity, generates the critical load matrix and comes security domain is carried out approximate processing;
Second step: make up dynamic security constrained optimum tide model;
The 3rd step: set up Adaptive Neuro-fuzzy Inference;
The 4th step: train the adaptive fuzzy inference system and set up the optimal load flow model.
2. a kind of according to claim 1 modeling method of being held power grid security territory optimal load flow model is characterized in that the concrete steps of the said first step are:
(1) setting up electric system can little algebraic equation be:
Wherein, x is a system state variables, and common have generator speed and a corner; Y represents the algebraically variable, like load side voltage etc.; ρ representes system's controllable variable, like the generator voltage grade; λ is one group of uncontrollable parameter, and common have load to gain merit and reactive power;
(2) confirm load direction d
i=[d
I1d
I2D
IN]
TWhen load increases along a certain specific direction, electric system will reach operational limit, come the constructing system security domain through the stability analysis to power flow equation; Promptly come the constructing system security domain according to system's quiescent voltage, phase angle, oscillation frequency being carried out stability and N-1 operation criterion
Be the merit angle, active power, reactive power and applied power are formed right-angle triangle, and applied power is a hypotenuse, and the angle between the meritorious and applied power is generally used its cosine value representation power factor at the merit angle, and G is an imaginary number, and m is the number among 1 ~ G;
If λ
i=[λ
I1λ
I2λ
IN]
TBe i load increasing rate in N the load, i is the natural number more than or equal to 1, and λ is expressed as:
λ
il=αd
i1
λ
i2=αd
i2 (23)
...
λ
iN=αd
iN
Wherein, loading coefficient is represented in scalar ce>=0, d
IjThe load growth direction of expression load j under i load growth rate, i and j are the natural number more than or equal to 1, and load direction satisfies following condition:
(3) can make system reach the safety and stability border gradually through increasing loading coefficient α; And then N load of definite stability boundaris ultimate value
system can be transformed to M the different sets that load direction is formed by given power generation dispatching criterion, generates following critical load matrix and come security domain is similar to:
3. a kind of according to claim 1 modeling method of being held power grid security territory optimal load flow model is characterized in that, the optimal load flow model in said second step is following:
Objective function:
Constraint condition: F
PF(δ, V, Q
g, P
s, P
d)=0 (3)
V
min≤V≤V
max (8)
Wherein, C
sAnd C
dBe respectively the bid of electric power supply and demand, the unit $/MWh of unit; System's supply and demand power is respectively P
sAnd P
d, unit is MW; F
PF() is the system load flow equation; V and δ are respectively that node voltage is with crossing; I
IjBe electric current through transmission line of electricity ij, this constraint definition the thermally-stabilised limit of system; Q
gBe generator reactive power; f
NR() is used to represent the security of system territory,
Be its suitable critical value.
4. a kind of according to claim 1 modeling method of being held power grid security territory optimal load flow model is characterized in that, in said the 3rd step, Adaptive Neuro-fuzzy Inference is divided into six layers: X
1, X
2Be the input of system, the output of y inference system; Network has similar function with each node of one deck, uses O
1iRepresent i node output, i is the natural number more than or equal to 1;
Ground floor: will import data and carry out Fuzzy Processing:
O
1i=μ
Ai(x
1),O
2i=μ
Bi(x
2),i=1,2(25)
Wherein, A
iOr B
iIt is fuzzy set; μ
Ai(x
1) be the membership function of fuzzy set;
The second layer: each input data subordinate function is multiplied each other, as the relevance grade w of this layer rule
i:
w
i=μ
Ai(x
1)μ
Bi(x
2),i=1,2(26)
The 3rd layer: the w that calculates i bar rule
iAnd all relevance grade sum w
1+ w
2, and pass through the normalization that both ratios are accomplished each bars rule relevance grade:
The 4th layer: the output that is used to calculate each bar rule:
O′
4i=w′
if
i=w′
i(p
ix
1+q
ix
2+r
i),i=1,2(28)
Wherein, f
iBe the consequent conclusion output function of fuzzy system, p
i, q
iBe the system's weighting coefficient under the i bar rule, r
iBe the constant under the i rules and regulations, when this output function is linear function, be called " first-order system "; If constant is called " zeroth order system ";
Layer 5: be used for total output of computing system:
Layer 6 should be exported the result through method of weighted mean and carry out the defuzzification processing, and made the error between input and the output minimum through back propagation and least square method.
5. a kind of according to claim 1 modeling method of being held power grid security territory optimal load flow model is characterized in that, the concrete steps in said the 4th step are:
(1) training adaptive fuzzy inference system; Make of the input of the border formed of M ultimate value λ ic of N-1 load as the adaptive fuzzy inference system; N is the quantity of loading in the system; Given system has fixing load quantity, and M is a natural number, and the safe edge dividing value λ lic that defines i load bus is expressed as:
The mapping function that is got the load growth rate by formula (9) and formula (25) is:
(2) it is intrafascicular approximately formula (26) to be used for the security domain of optimal load flow equation, forms security domain constrained optimum tide model to be:
Objective function:
Constraint condition: F
PF(δ, V, Q
g, P
s, P
d, Q
d)=0 (11)
0≤P
s≤P
smax (12)
Q
smin≤Q
s≤Q
smax (13)
V
min≤V≤V
max (14)
α≥0(21);
Wherein, Δ P
dBe the changing load amount; M is m security of system territory of all G scheduling scheme, and constraint condition (11) makes Δ P by force
dBe 0 or negative; If Δ P
dBe 0, then the optimal load flow model is separated; Otherwise, if Δ P
dBe negative, represent then that the optimal load flow model does not have to separate that therefore, this optimal load flow model has been explained the operation criterion of current electric power system dispatching well,
Be the merit angle, active power, reactive power and applied power are formed right-angle triangle, and applied power is a hypotenuse, and the angle between the meritorious and applied power is generally used its cosine value representation power factor at the merit angle, and G is an imaginary number, and m is the number among 1 ~ G.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210301629.0A CN102841965B (en) | 2012-08-23 | 2012-08-23 | The modeling method of receiving end grid security domain optimal load flow model |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210301629.0A CN102841965B (en) | 2012-08-23 | 2012-08-23 | The modeling method of receiving end grid security domain optimal load flow model |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102841965A true CN102841965A (en) | 2012-12-26 |
CN102841965B CN102841965B (en) | 2015-10-28 |
Family
ID=47369324
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210301629.0A Active CN102841965B (en) | 2012-08-23 | 2012-08-23 | The modeling method of receiving end grid security domain optimal load flow model |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102841965B (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103050970A (en) * | 2013-01-15 | 2013-04-17 | 华北电力大学 | Stability analyzing and optimizing method suitable for layering and zoning of ultra-high voltage electric network |
CN103106338A (en) * | 2013-01-17 | 2013-05-15 | 天津大学 | Method of fast generating boundary of electric system thermal stability security domain in decision space |
CN104680262A (en) * | 2015-03-18 | 2015-06-03 | 国网上海市电力公司 | Receiving-end grid optimal layering and districting scheme obtaining method |
CN104809521A (en) * | 2015-05-05 | 2015-07-29 | 国家电网公司 | Double-layer optimization based evaluation method for external power receiving capability of receiving-end power grid |
CN105552906A (en) * | 2016-02-14 | 2016-05-04 | 华南理工大学 | Regional power grid load margin analysis method based on prime-dual interior point method |
CN107341615A (en) * | 2017-07-10 | 2017-11-10 | 上海海能信息科技有限公司 | A kind of local power net dynamic security economic load dispatching management system |
CN109376939A (en) * | 2018-11-01 | 2019-02-22 | 三峡大学 | A kind of grid stability real-time predicting method based on adaptive neural network |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101247045A (en) * | 2008-03-20 | 2008-08-20 | 天津大学 | Electric voltage safety monitoring method based on voltage stabilization field in partition load space |
CN101281637A (en) * | 2008-05-09 | 2008-10-08 | 天津大学 | Electric power system optimizing swim and real time pricing method based on hyperplane form safety field periphery |
-
2012
- 2012-08-23 CN CN201210301629.0A patent/CN102841965B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101247045A (en) * | 2008-03-20 | 2008-08-20 | 天津大学 | Electric voltage safety monitoring method based on voltage stabilization field in partition load space |
CN101281637A (en) * | 2008-05-09 | 2008-10-08 | 天津大学 | Electric power system optimizing swim and real time pricing method based on hyperplane form safety field periphery |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103050970A (en) * | 2013-01-15 | 2013-04-17 | 华北电力大学 | Stability analyzing and optimizing method suitable for layering and zoning of ultra-high voltage electric network |
CN103106338A (en) * | 2013-01-17 | 2013-05-15 | 天津大学 | Method of fast generating boundary of electric system thermal stability security domain in decision space |
CN103106338B (en) * | 2013-01-17 | 2016-04-27 | 天津大学 | The border rapid generation of electric system thermal stability security domain on decision space |
CN104680262A (en) * | 2015-03-18 | 2015-06-03 | 国网上海市电力公司 | Receiving-end grid optimal layering and districting scheme obtaining method |
CN104809521A (en) * | 2015-05-05 | 2015-07-29 | 国家电网公司 | Double-layer optimization based evaluation method for external power receiving capability of receiving-end power grid |
CN104809521B (en) * | 2015-05-05 | 2018-01-05 | 国家电网公司 | By electric energy power evaluation method outside a kind of receiving end power network based on dual-layer optimization |
CN105552906A (en) * | 2016-02-14 | 2016-05-04 | 华南理工大学 | Regional power grid load margin analysis method based on prime-dual interior point method |
CN105552906B (en) * | 2016-02-14 | 2018-04-13 | 华南理工大学 | A kind of area power grid load nargin analysis method based on prim al- dual interior point m ethod |
CN107341615A (en) * | 2017-07-10 | 2017-11-10 | 上海海能信息科技有限公司 | A kind of local power net dynamic security economic load dispatching management system |
CN109376939A (en) * | 2018-11-01 | 2019-02-22 | 三峡大学 | A kind of grid stability real-time predicting method based on adaptive neural network |
Also Published As
Publication number | Publication date |
---|---|
CN102841965B (en) | 2015-10-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Xu et al. | Modeling a pumped storage hydropower integrated to a hybrid power system with solar-wind power and its stability analysis | |
CN102841965A (en) | Modeling method of optimal power flow model of receiving end power grid security domain | |
Ali et al. | Wind farm model aggregation using probabilistic clustering | |
CN103441506B (en) | Method for multi-target coordination reactive power optimization control of distributed wind farm in different time scales | |
Kouba et al. | LFC enhancement concerning large wind power integration using new optimised PID controller and RFBs | |
CN102611118B (en) | Method for comprehensively controlling reactive voltage of wind farm with imported prediction method | |
Malekpour et al. | Probabilistic approach to multi-objective Volt/Var control of distribution system considering hybrid fuel cell and wind energy sources using improved shuffled frog leaping algorithm | |
CN103050970A (en) | Stability analyzing and optimizing method suitable for layering and zoning of ultra-high voltage electric network | |
CN106026113A (en) | Micro-grid system monitoring method having reactive automatic compensation function | |
CN103904644B (en) | A kind of Automatic load distribution method for intelligent transformer substation accessed based on distributed power source | |
CN103219732A (en) | reactive voltage controlling method of power distribution network with variable speed constant frequency wind farm | |
Hong et al. | Optimized interval type-II fuzzy controller-based STATCOM for voltage regulation in power systems with photovoltaic farm | |
Bhukya et al. | Mathematical modelling and stability analysis of PSS for damping LFOs of wind power system | |
CN103701134A (en) | Grid-connected wind power plant point voltage control method based on MCR (Magnetic Control Reactor) and capacitance mixed compensation | |
CN103094920A (en) | Equivalence method of direct-drive-type wind turbine generator wind power plant | |
CN106532758A (en) | DC power re-allocation method during quit running of converter in multi-end DC power transmission system connected with offshore wind power | |
CN106099991B (en) | A kind of power grid wind electricity digestion capability appraisal procedure | |
Mastoi et al. | Large-scale wind power grid integration challenges and their solution: a detailed review | |
CN102769299A (en) | Wind farm voltage control method based on voltage operating state | |
Somefun et al. | Review of different methods for siting and sizing distributed generator | |
Sanchez et al. | Dynamic model of wind energy conversion systems with variable speed synchronous generator and full-size power converter for large-scale power system stability studies | |
CN105958530A (en) | Microgrid system with reactive power automatic compensation function | |
Wang et al. | Modeling and coordinated control for active power regulation of pumped storage‐battery integrated system under small‐disturbances | |
Ma et al. | Coordination of generation and transmission planning for power system with large wind farms | |
CN115392565A (en) | Low-carbon operation optimization method and device for multifunctional park |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |