CN102841965B - The modeling method of receiving end grid security domain optimal load flow model - Google Patents

The modeling method of receiving end grid security domain optimal load flow model Download PDF

Info

Publication number
CN102841965B
CN102841965B CN201210301629.0A CN201210301629A CN102841965B CN 102841965 B CN102841965 B CN 102841965B CN 201210301629 A CN201210301629 A CN 201210301629A CN 102841965 B CN102841965 B CN 102841965B
Authority
CN
China
Prior art keywords
load
lambda
security domain
power
sigma
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210301629.0A
Other languages
Chinese (zh)
Other versions
CN102841965A (en
Inventor
麻常辉
张磊
蒋哲
武乃虎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
Electric Power Research Institute of State Grid Shandong Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
Electric Power Research Institute of State Grid Shandong Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, Electric Power Research Institute of State Grid Shandong Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201210301629.0A priority Critical patent/CN102841965B/en
Publication of CN102841965A publication Critical patent/CN102841965A/en
Application granted granted Critical
Publication of CN102841965B publication Critical patent/CN102841965B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02EREDUCTION OF GREENHOUSE GAS [GHG] EMISSIONS, RELATED TO ENERGY GENERATION, TRANSMISSION OR DISTRIBUTION
    • Y02E60/00Enabling technologies; Technologies with a potential or indirect contribution to GHG emissions mitigation

Landscapes

  • Supply And Distribution Of Alternating Current (AREA)

Abstract

The invention discloses a kind of modeling method of receiving end grid security domain optimal load flow model, concrete steps are: the first step: carry out constructing system security domain by namely running criterion to the stability of static system voltage, phase angle, oscillation frequency and N-1 to the stability analysis of power flow equation, N number of load of system can be transformed to by given power generation dispatching criterion M the different sets that load direction forms, and generates critical load matrix and carries out approximate processing to security domain: second step: build dynamic security constrained optimum tide model; 3rd step: set up Adaptive Neuro-fuzzy Inference; 4th step: train adaptive nuero-fuzzy inference system system and set up optimal load flow model.Optimal load flow model of the present invention illustrates the operation criterion of current electric power system dispatching well, can apply to the optimizing scheduling behind layering and zoning between receiving end Grid based on the optimal load flow security domain approximation technique of adaptive nuero-fuzzy inference system system.

Description

The modeling method of receiving end grid security domain optimal load flow model
Technical field
The present invention relates to a kind of modeling method of optimal load flow model, particularly relate to a kind of modeling method of receiving end grid security domain optimal load flow model.
Background technology
In electric system long-run development process, it is complementary that operation of power networks planning and system load flow calculate.On the one hand, for ensureing the safety and stability of whole electrical network, the formation of Electric Power Network Planning need be based upon system load flow and calculate on basis; On the other hand, system optimal Load flow calculation can improve stability and the economy of Electric Power Network Planning.Optimal load flow is meeting under specific system cloud gray model and security constraints, by utilizing control device in adjustment System, can realize the system stable operation state of intended target optimum.Therefore, in system safety operation problem under increasingly sharp-pointed and complicated situation, optimal load flow calculates nature becomes the system stability analysis aid indispensable with optimization.
After the access of extra-high voltage grid, the Voltage Instability that during system jam, power shifts initiation on a large scale will become one of subject matter of receiving end electricity net safety stable.Especially, after extra-high voltage backbone network builds up substantially, system short-circuit levels of current will be increased.Due to the importance of 500kV partition power grid, it will inevitably exist with the form of looped network, and this just weakens the benefit that layering and zoning can be brought.What the fault rate of electric system was the highest is single-line to ground fault.Receiving-end system is comparatively weak, and load center lacks forceful electric power source and supports, and especially the support of 500kV electrical network is weak, cause 220kV electrical network too intensive, short-circuit current exceeds standard, and after extra-high voltage access large receiving-end grid, power system delamination and subarea operates to power grid security and stability and brings stern challenge.
Summary of the invention
Object of the present invention is exactly that provide a kind of computing method of receiving end grid security domain optimal load flow, it has the advantage of the operation criterion illustrating current electric power system dispatching well in order to solve the problem.
To achieve these goals, the present invention adopts following technical scheme:
A modeling method for receiving end grid security domain optimal load flow model, concrete steps are:
The first step: by namely carrying out constructing system security domain to the stability of static system voltage, phase angle, oscillation frequency and N-1 criterion to the stability analysis of power flow equation.For obtaining discrete security domain expression formula, N number of load of system can be transformed to by given power generation dispatching criterion M the different sets that load direction forms, N, M be more than or equal to 1 for natural number, N is load quantity in system, given system has fixing load quantity, generates following critical load matrix and carries out approximate processing to security domain:
Second step: build dynamic security constrained optimum tide model as follows:
Objective function: S b = - ( C d T P d - C s T P s ) - - - ( 2 )
Constraint condition: F pF(δ, V, Q g, P s, P d)=0 (3)
0 ≤ P s ≤ P s max - - - ( 4 )
0 ≤ P d ≤ P d mac - - - ( 5 )
i, j be more than or equal to 1 natural number (6)
Q g min ≤ Q g ≤ Q g max - - - ( 7 )
V min≤V≤V max(8)
f NR 0 - f NR ( V , δ ) ≤ 0 - - - ( 9 )
Wherein, C sand C dbe the bid of electric power supply and demand respectively, unit is $/MWh; System supply and demand power is respectively P sand P d, unit is MW; F pF() is system load flow equation; V and δ is node voltage respectively and intersects; I ijthe electric current by transmission line of electricity ij, this constraint definition thermally-stabilised limit of system; Q gfor generator reactive power; f nR() for representing security of system territory, for the critical value that it is suitable.
3rd step: set up Adaptive Neuro-fuzzy Inference.
4th step: train adaptive nuero-fuzzy inference system system and set up optimal load flow model, security domain constrained optimum tide model is:
Objective function: S b = C s T P s - C d T Δ P d - - - ( 10 )
Constraint condition: F pF(δ, V, Q g, P s, P d, Q d)=0 (11)
0≤P s≤P smax(12)
Q smin≤Q s≤Q smax(13)
V min≤V≤V max(14)
λ l - Σ i w i m f i m Σ i w i m ≤ 0 , ∀ m = 1 , . . . , G - - - ( 15 )
Δ P dj≤ 0 j be more than or equal to 1 natural number (16)
j be more than or equal to 1 natural number (17)
Wherein: Q dsystem requirements reactive powers, Q ssystem supply reactive power, for the changing load amount of a jth node, P dj0for the initial load of a jth node, scalar ce>=0 represents loading coefficient, α 0for initial load coefficient, d j0represent that initial load increases vector, d jrepresent the load growth vector of all loads under i-th load growth rate: d j=[d j1, d j2... d jN] t.
j be more than or equal to 1 natural number (18)
0≤d j≤ 1j be more than or equal to 1 natural number (19)
Σ j = 1 N d j = 1 - - - ( 20 )
α≥0 (21)
Wherein, Δ P dfor changing load amount; M is m security of system territory of all G scheduling scheme.Constraint condition (11) makes Δ P by force dbe 0 or negative.If Δ P dbe 0, then optimal load flow model has solution; Otherwise, if Δ P dfor negative, then represent that optimal load flow model is without solution.Therefore, this optimal load flow model illustrates the operation criterion of current electric power system dispatching well, be merit angle, active power, reactive power and applied power composition right-angle triangle, applied power is hypotenuse, and the angle between meritorious and applied power is at merit angle, and generally represent power factor with its cosine value, G is an imaginary number, and m is the number in 1 ~ G.
The concrete steps of the described first step are:
(1) setting up electric system can micro-algebraic equation be: x · = h ( x , y , ρ , λ ) 0 = g ( x , y , ρ , λ ) - - - ( 22 ) Wherein, x is system state variables, and common have generator speed and corner; Y represents algebraic variable, as load side voltage etc.; ρ represents system controllable variable, as generator voltage grade; λ is one group of uncontrollable parameter, and common have load to gain merit and reactive power.
(2) load direction d is determined i=[d i1d i2... d iN] twhen load increases along a certain specific direction, electric system will reach operational limit, by carrying out constructing system security domain to the stability analysis of power flow equation, namely run criterion carry out constructing system security domain, if λ according to carrying out stability and N-1 to static system voltage, phase angle, oscillation frequency i=[λ i1λ i2... λ iN] tfor the rate of growth of i-th load in N number of load, i be more than or equal to 1 natural number, λ is expressed as
λ i1=αd i1
λ i2=αd i2(23)
λ iN=αd iN
Wherein, scalar ce>=0 represents loading coefficient, d ijrepresent the load growth direction of load j under i-th load growth rate, i and j is the natural number being more than or equal to 1, and load direction meets following condition:
0 ≤ d ij ≤ 1 ∀ j
Σ j = 1 N d ij = 1 - - - ( 24 )
(3) system can be made to reach safety and stability border gradually by increasing loading coefficient α, and then determine stability boundaris ultimate value n number of load of system can be transformed to by given power generation dispatching criterion M the different sets that load direction forms, and generates following critical load matrix and is similar to security domain:
In described 3rd step, Adaptive Neuro-fuzzy Inference is divided into six layers: X 1, X 2be the input of system, y inference system exports; Each node of network same layer has similar function, uses O 1i, O 2irepresent that i-th node exports, i be more than or equal to 1 natural number;
Ground floor: input data are carried out Fuzzy Processing:
O 1i=μ Ai(x 1),O 2i=μ Bi(x 2),i=1,2 (25)
Wherein, A ior B iit is fuzzy set; μ ai(x 1), μ bi(x 2) be the membership function of fuzzy set.
The second layer: be multiplied by each input data membership function, as this layer of regular relevance grade w i:
w i=μ Ai(x 1Bi(x 2),i=1,2 (26)
Third layer: the w calculating the i-th rule iand all relevance grade sum w 1+ w 2, and the normalization of each rule relevance grade is completed by both ratios:
w i ′ = w i w 1 + w 2 , i = 1,2 - - - ( 27 )
4th layer: for calculating the output of each rule:
O 4 i ′ = w i ′ f i = w i ′ ( p i x 1 + q i x 2 + r i ) , i = 1,2 - - - ( 28 )
Wherein, f ifor the consequent conclusion output function of fuzzy system, p i, q ibe the system weighting coefficient under the i-th rule, r ibe the constant under the i-th rules and regulations, when this output function is linear function, be called " first-order system "; If constant, be called " zero order system ".
Layer 5: the total output for computing system:
y = Σ i w i ′ f i = Σ i w i f i Σ i w i , i = 1,2 - - - ( 29 )
Layer 6, carries out defuzzification process by method of weighted mean by this Output rusults, and makes the error between constrained input minimum by back propagation and least square method.
Concrete steps in described 4th step are:
(1) adaptive nuero-fuzzy inference system system is trained; Make M ultimate value of N-1 load the border formed as the input of adaptive nuero-fuzzy inference system system, N be greater than 1 natural number, M be more than or equal to 1 natural number, definition i-th load bus safe edge dividing value be expressed as:
λ il c ≈ f ( λ i 1 , λ i 2 , . . . , λ il - 1 , λ il + 1 , . . . , λ iN ) ≈ f ( λ ^ i ) I be more than or equal to 1 natural number: (30) by formula (9) and formula (25) the mapping function of load growth rate is:
λ l c = Σ i w i f i Σ i w i - - - ( 31 )
(2) formula (26) is about intrafascicular for the security domain of optimal load flow equation, forming security domain constrained optimum tide model is:
Objective function: S b = C s T P s - C d T Δ P d - - - ( 10 )
Constraint condition: F pF(δ, V, Q g, P s, P d, Q d)=0 (11)
0≤P s≤P smax(12)
Q smin≤Q s≤Q smax(13)
V min≤V≤V max(14)
λ l - Σ i w i m f i m Σ i w i m ≤ 0 , ∀ m = 1 , . . . , G - - - ( 15 )
Δ P dj ≤ 0 , ∀ j = 1 , . . . , N - - - ( 16 )
Δ P d j = ( αd j - α 0 d j 0 ) P dj 0 , ∀ j = 1 , . . . , N - - - ( 17 )
0 ≤ d j ≤ 1 , ∀ j = 1 , . . . , N - - - ( 19 )
Σ j = 1 N d j = 1 - - - ( 20 )
α≥0 (21)
Beneficial effect of the present invention: the present invention is based on adaptive nuero-fuzzy inference system system certainty annuity security domain.Adopt IEEE 118 node standard test system to carry out simulation calculation and checking to the feasibility of adaptive nuero-fuzzy inference system system and efficiency, and in the theoretical foundation of layering and zoning, verify the feasibility of the method to receiving end electrical network.Result shows, can apply to the optimizing scheduling behind layering and zoning between receiving end Grid based on the optimal load flow security domain approximation technique of adaptive nuero-fuzzy inference system system.
Accompanying drawing explanation
Fig. 1 is typical adaptive nuero-fuzzy inference system system architecture;
Fig. 2 is IEEE tri-district system security domain.
Embodiment
Below in conjunction with accompanying drawing and embodiment, the invention will be further described.
A modeling method for receiving end grid security domain optimal load flow model, concrete steps are:
The first step: by namely carrying out constructing system security domain to the stability of static system voltage, phase angle, oscillation frequency and N-1 criterion to the stability analysis of power flow equation, for obtaining discrete security domain expression formula, N number of load of system can be transformed to by given power generation dispatching criterion M the different sets that load direction forms, N is load quantity in system, given system has fixing load quantity, generates following critical load matrix and carries out approximate processing to security domain:
Second step: build dynamic security constrained optimum tide model as follows:
Objective function: S b = - ( C d T P d - C s T P s ) - - - ( 2 )
Constraint condition: F pF(δ, V, Q g, P s, P d)=0(3)
0 ≤ P s ≤ P s max - - - ( 4 )
0 ≤ P d ≤ P d max - - - ( 5 )
i, j be more than or equal to 1 natural number (6)
Q g min ≤ Q g ≤ Q g max - - - ( 7 )
V min≤V≤V max(8)
f NR 0 - f NR ( V , δ ) ≤ 0 - - - ( 9 )
Wherein, C sand C dbe the bid of electric power supply and demand respectively, unit is $/MWh; System supply and demand power is respectively P sand P d, unit is MW; F pF() is system load flow equation; V and δ is node voltage respectively and intersects; I ijthe electric current by transmission line of electricity ij, this constraint definition thermally-stabilised limit of system; Q gfor generator reactive power; f nR() for representing security of system territory, for the critical value that it is suitable.
3rd step: set up Adaptive Neuro-fuzzy Inference.
4th step: train adaptive nuero-fuzzy inference system system and set up optimal load flow model, security domain constrained optimum tide model is:
Objective function: S b = C s T P s - C d T Δ P d - - - ( 10 )
Constraint condition: F pF(δ, V, Q g, P s, P d, Q d)=0 (11)
0≤P s≤P smax(12)
Q smin≤Q s≤Q smax(13)
V min≤V≤V max(14)
λ l - Σ i w i m f i m Σ i w i m ≤ 0 , ∀ m = 1 , . . . , G - - - ( 15 )
Δ P di≤ 0j be more than or equal to 1 natural number (16)
j be more than or equal to 1 natural number (17)
j be more than or equal to 1 natural number (18)
0≤d j≤ 1j be more than or equal to 1 natural number (19)
Σ j = 1 N d j = 1 - - - ( 20 )
α≥0(21)
Wherein, Δ P dfor changing load amount; M is m security of system territory of all G scheduling scheme.Constraint condition (11) makes Δ P by force dbe 0 or negative.If Δ P dbe 0, then optimal load flow model has solution; Otherwise, if Δ P dfor negative, then represent that optimal load flow model is without solution.Therefore, this optimal load flow model illustrates the operation criterion of current electric power system dispatching well, be merit angle, active power, reactive power and applied power composition right-angle triangle, applied power is hypotenuse, and the angle between meritorious and applied power is at merit angle, and generally represent power factor with its cosine value, G is an imaginary number, and m is the number in 1 ~ G.
The concrete steps of the described first step are:
(1) setting up electric system can micro-algebraic equation be: x · = h ( x , y , ρ , λ ) 0 = g ( x , y , ρ , λ ) - - - ( 22 ) Wherein, x is system state variables, and common have generator speed and corner; Y represents algebraic variable, as load side voltage etc.; ρ represents system controllable variable, as generator voltage grade; λ is one group of uncontrollable parameter, and common have load to gain merit and reactive power.
(2) load direction d is determined i=[d i1d i2... d iN] twhen load increases along a certain specific direction, electric system will reach operational limit, by carrying out constructing system security domain to the stability analysis of power flow equation, namely run criterion carry out constructing system security domain, if λ according to carrying out stability and N-1 to static system voltage, phase angle, oscillation frequency i=[λ i1λ i2... λ iN] tfor the rate of growth of i-th load in N number of load, i be more than or equal to 1 natural number, λ is expressed as
λ i1=αd i1
λ i2=αd i2(23)
λ i=αd iN
Wherein, scalar ce>=0 represents loading coefficient, d ijrepresent the load growth direction of load j under i-th load growth rate, i and j is the natural number being more than or equal to 1, and load direction meets following condition:
0 ≤ d ij ≤ 1 ∀ j
Σ j = 1 N d ij = 1 - - - ( 24 )
(3) system can be made to reach safety and stability border gradually by increasing loading coefficient α, and then determine stability boundaris ultimate value n number of load of system can be transformed to by given power generation dispatching criterion M the different sets that load direction forms, and generates following critical load matrix and is similar to security domain:
In described 3rd step, Adaptive Neuro-fuzzy Inference is divided into six layers: X 1, X 2be the input of system, y inference system exports; Each node of network same layer has similar function, uses O 1irepresent that i-th node exports, i be more than or equal to 1 natural number;
Ground floor: input data are carried out Fuzzy Processing:
O 1iai(x 1), O 2ibi(x 2), i=1,2(25) wherein, A ior B iit is fuzzy set; μ ai(x 1) be the membership function of fuzzy set.
The second layer: be multiplied by each input data membership function, as this layer of regular relevance grade w i:
w i=μ Ai(x 1Bi(x 2),i=1,2(26)
Third layer: the w calculating the i-th rule iand all relevance grade sum w 1+ w 2, and the normalization of each rule relevance grade is completed by both ratios:
w i ′ = w i w 1 + w 2 , i = 1,2 - - - ( 27 )
4th layer: for calculating the output of each rule:
O 4 i ′ = w i ′ f i = w i ′ ( p i x 1 + q i x 2 + r i ) , i = 1,2 - - - ( 28 )
Wherein, f ifor the consequent conclusion output function of fuzzy system, p i, q ibe the system weighting coefficient under the i-th rule, r ibe the constant under the i-th rules and regulations, when this output function is linear function, be called " first-order system "; If constant, be called " zero order system ".
Layer 5: the total output for computing system:
y = Σ i w i ′ f i = Σ i w i f i Σ i w i - - - ( 29 )
Layer 6, carries out defuzzification process by method of weighted mean by this Output rusults, and makes the error between constrained input minimum by back propagation and least square method.
Concrete steps in described 4th step are:
(1) adaptive nuero-fuzzy inference system system is trained; Make M ultimate value of N-1 load the border formed, as the input of adaptive nuero-fuzzy inference system system, defines the safe edge dividing value of i-th load bus be expressed as:
λ il c ≈ f ( λ i 1 , λ i 2 , . . . , λ il - 1 , λ il + 1 , . . . , λ iN ) ≈ f ( λ ^ i ) I be more than or equal to 1 natural number: (30)
The mapping function being obtained load growth rate by formula (9) and formula (25) is:
λ l c = Σ i w i f i Σ i w i - - - ( 31 )
(2) formula (26) is about intrafascicular for the security domain of optimal load flow equation, forming security domain constrained optimum tide model is:
Objective function: S b = C s T P s - C d T Δ P d - - - ( 10 )
Constraint condition: F pF(δ, V, Q g, P s, P d, Q d)=0 (11)
0≤P s≤P smax(12)
Q smin≤Q s≤Q smax(13)
V min≤V≤V max(14)
λ l - Σ i w i m f i m Σ i w i m ≤ 0 , ∀ m = 1 , . . . , G - - - ( 15 )
Δ P dj ≤ 0 , ∀ j = 1 , . . . , N - - - ( 16 )
Δ P d j = ( αd j - α 0 d j 0 ) P dj 0 , ∀ j = 1 , . . . , N - - - ( 17 )
0 ≤ d j ≤ 1 , ∀ j = 1 , . . . , N - - - ( 19 )
Σ j = 1 N d j = 1 - - - ( 20 )
α≥0 (21)
Utilize PST, PSAT and UWPFLOW software emulates system.PSAT for calculating electric system conventional Load Flow parameter, and using the input of this flow data as UWPFLOW and PST, obtains voltage stability boundary and the concussion stability boundaris of system respectively; Again by the Output rusults of PST and UWPFLOW gained as the input in PSAT, calculate remaining voltage-regulation coefficient with this, thus determine whole system safety and stability territory.Generate closed differentiable function by adaptive nuero-fuzzy inference system system software by gained safety and stability territory, and by this function embedded system optimal load flow model, calculate optimal load flow model respectively by Newton method and interior point method.
Select IEEE 118 node standard test system to verify put forward the practicality of optimal load flow model, to simplify the analysis and do not lose ubiquity, optimal load flow model safety territory is by typical deployments pattern acquiring, such as, in formula 31 G=1, IEEE 118 node standard test system is made up of 53 generators and 91 loads, and table 1 is genset bid data.
Table 1 genset bid data
By layering and zoning principle and electricity market related notion, this test macro is divided into three and four operation areas respectively, namely corresponding security domain represents the restriction of each interregional power delivery, using 631 different load flows obtaining to as adaptive nuero-fuzzy inference system systematic training data.
Embodiment one:
As shown in Figure 2, former 118 node standard test system are divided into three pieces of regions, and wherein region 1 and region 2 respectively comprise 31 loads, and region 3 comprises 29 loads.To a station symbol semicomputer (Duo 2 double-core 2.2Ghz processor, 2G internal memory), within remaining on 10-5 for making the error between constrained input, within 156 seconds consuming time, obtain security of system territory altogether.
Put forward by test the validity of optimal load flow model, select P by table 2 dA1, P dA2and P dA3force system running state to jump out security domain, mark three in Fig. 2 respectively and jump out a little, wherein suppose that the bid of changing load amount is C dA1=200 $/MWh, C dA2=400 $/MWh and C dA3=600 $/MWh, corresponding optimal load flow solution to model is as shown in table 3; Analyze known, in the ordinary course of things, bid the highest load P dA1reduction Δ Pd a1minimum, get back in security domain to make system running state.
Table 2 system testing scheme
Table 3 system loading knots modification
Embodiment two:
Former 118 node standard test system are divided into four pieces of regions, and wherein region 1, region 2 respectively comprise 22 loads with region 3, and region 4 comprises 25 loads.10 are remained on for making the error between constrained input -5within, within 225 seconds consuming time, obtain security of system territory altogether.Known to three region sample calculation analysis, selected P dA1, P dA2, P dA3and P dA4system running state is forced to jump out security domain, as table 4; Suppose that the bid of changing load amount is C dA1=800 $/MWh, C dA2=100 $/MWh, C dA3=300 $/MWh and C dA4=600 $/MWh;
Table 5-4 system testing scheme
Table 5-5 system loading knots modification
Corresponding optimal load flow solution to model is as shown in table 5; In four region examples, bid the highest load P dA1the load P relatively low with bid dA2and P dA3reduction is all close to 0, and the region four load reduction Δ Pd larger on security of system impact a4maximum, analyze known, in the ordinary course of things, measure valency compared to changing load, security of system is larger on the impact of load reduction.
By reference to the accompanying drawings the specific embodiment of the present invention is described although above-mentioned; but not limiting the scope of the invention; one of ordinary skill in the art should be understood that; on the basis of technical scheme of the present invention, those skilled in the art do not need to pay various amendment or distortion that creative work can make still within protection scope of the present invention.

Claims (1)

1. a modeling method for receiving end grid security domain optimal load flow model, is characterized in that, concrete steps are:
The first step: by namely carrying out constructing system security domain to the stability of static system voltage, phase angle, oscillation frequency and N-1 criterion to the stability analysis of power flow equation, for obtaining discrete security domain expression formula, N number of load of system is transformed to by given power generation dispatching criterion M the different sets that load direction forms, N, M be more than or equal to 1 natural number, N is load quantity in system, given system has fixing load quantity, generates critical load matrix and carries out approximate processing to security domain;
Second step: build dynamic security constrained optimum tide model;
3rd step: set up Adaptive Neuro-fuzzy Inference;
4th step: train adaptive nuero-fuzzy inference system system and set up optimal load flow model;
The concrete steps of the described first step are:
(1) setting up electric system can micro-algebraic equation be: x · = h ( x , y , ρ , λ ) 0 = g ( x , y , ρ , λ ) - - - ( 22 ) Wherein, x is system state variables, and y represents algebraic variable, and ρ represents system controllable variable; λ is one group of uncontrollable parameter;
(2) load direction d is determined i=[d i1d i2... d iN] twhen load increases along a certain specific direction, electric system will reach operational limit, by carrying out constructing system security domain to the stability analysis of power flow equation, namely run criterion carry out constructing system security domain according to carrying out stability and N-1 to static system voltage, phase angle, oscillation frequency merit angle, active power, reactive power and applied power composition right-angle triangle, applied power is hypotenuse, and the angle between meritorious and applied power is at merit angle, and generally represent power factor with its cosine value, G is an imaginary number, and m is the number in 1 ~ G;
If λ i=[λ i1λ i2... λ iN] tfor the rate of growth of i-th load in N number of load, i be more than or equal to 1 natural number, λ is expressed as:
λ i 1 = α d i 1 λ i 2 = α d i 2 · · · λ iN = α d iN - - - ( 23 )
Wherein, scalar ce>=0 represents loading coefficient, d ijrepresent the load growth direction of load j under i-th load growth rate, i and j is the natural number being more than or equal to 1, and load direction meets following condition:
0 ≤ d ij ≤ 1 ∀ j Σ j = 1 N d ij = 1 - - - ( 24 )
(3) system can be made to reach safety and stability border gradually by increasing loading coefficient α, and then determine stability boundaris ultimate value n number of load of system can be transformed to by given power generation dispatching criterion M the different sets that load direction forms, and generates following critical load matrix and is similar to security domain:
The optimal load flow model of described second step is as follows:
Objective function: S b = - ( C d T P d - C s T P s ) - - - ( 2 )
Constraint condition: F pF(δ, V, Q g, P s, P d)=0 (3)
0 ≤ P s ≤ P s max - - - ( 4 )
0 ≤ P d ≤ P d max - - - ( 5 )
I ij ( δ , V ) ≤ I ij max , ∀ i , j , i ≠ j I, j be more than or equal to 1 natural number (6)
Q gmin≤Q g≤Q gmax(7)
V min≤V≤V max(8)
f NR0-f NR(V,δ)≤0 (9)
Wherein, C sand C dbe the bid of electric power supply and demand respectively, unit is $/MWh; System supply and demand power is respectively P sand P d, unit is MW; F pF() is system load flow equation; V and δ is node voltage respectively and intersects; I ijthe electric current by transmission line of electricity ij, this constraint definition thermally-stabilised limit of system; Q gfor generator reactive power; f nR() for representing security of system territory, for the critical value that it is suitable;
In described 3rd step, Adaptive Neuro-fuzzy Inference is divided into six layers: X 1, X 2be the input of system, y is that inference system exports; Each node of network same layer has similar function, uses O 1irepresent that i-th node exports, i be more than or equal to 1 natural number;
Ground floor: input data are carried out Fuzzy Processing:
O 1i=μ Ai(x 1),O 2i=μ Bi(x 2),i=1,2 (25)
Wherein, A ior B iit is fuzzy set; μ ai(x 1) be the membership function of fuzzy set;
The second layer: be multiplied by each input data membership function, as this layer of regular relevance grade w i:
w i=μ Ai(x 1Bi(x 2),i=1,2 (26)
Third layer: the w calculating the i-th rule iand all relevance grade sum w 1+ w 2, and the normalization of each rule relevance grade is completed by both ratios:
w i ′ = w i w 1 + w 2 , i = 1,2 - - - ( 27 )
4th layer: for calculating the output of each rule:
O 4 i ′ = w i ′ f i = w i ′ ( p i x 1 + q i x 2 + r i ) , i = 1,2 - - - ( 28 )
Wherein, f ifor the consequent conclusion output function of fuzzy system, p i, q ibe the system weighting coefficient under the i-th rule, r ibe the constant under the i-th rules and regulations, when this output function is linear function, be called " first-order system "; If constant, be called " zero order system ";
Layer 5: the total output for computing system:
y = Σ i w i ′ f i = Σ i w i f i Σ i w i - - - ( 29 )
Layer 6, carries out defuzzification process by method of weighted mean by this Output rusults, and makes the error between constrained input minimum by back propagation and least square method;
Concrete steps in described 4th step are:
(1) adaptive nuero-fuzzy inference system system is trained; Make M ultimate value of N-1 load the border formed is as the input of adaptive nuero-fuzzy inference system system, and N is load quantity in system, and given system has fixing load quantity, and M is natural number, the safe edge dividing value of definition i-th load bus be expressed as:
λ il c ≈ f ( λ i 1 , λ i 2 , . . . , λ il - 1 , λ il + 1 , . . . , λ iN ) ≈ f ( λ ^ i ) I be more than or equal to 1 natural number: (30) by formula (9) and formula (25) the mapping function of load growth rate is:
λ l c = Σ i w i f i Σ i w i - - - ( 31 )
(2) formula (26) is about intrafascicular for the security domain of optimal load flow equation, forming security domain constrained optimum tide model is:
Objective function: S b = C s T P s - C d T Δ P d - - - ( 10 )
Constraint condition: F pF(δ, V, Q g, P s, P d, Q d)=0 (11)
0≤P s≤P smax(12)
Q smin≤Q s≤Q smax(13)
V min≤V≤V max(14)
λ l - Σ w i m i f i m Σ i w i m ≤ 0 , ∀ m = 1 , . . . , G - - - ( 15 )
ΔP dj ≤ 0 , ∀ j = 1 , . . . , N - - - ( 16 )
ΔP d j = ( α d j - α 0 d j 0 ) P dj 0 , ∀ j = 1 , . . . , N - - - ( 17 )
0 ≤ d j ≤ 1 , ∀ j = 1 , . . . , N - - - ( 19 )
Σ j = 1 N d j = 1 - - - ( 20 )
α≥0 (21);
Wherein, P dj0for the initial load of a jth node, P djfor the load of a jth node, Δ P dfor changing load amount; M is m security of system territory of all G scheduling scheme, and constraint condition (11) makes Δ P by force dbe 0 or negative; If Δ P dbe 0, then optimal load flow model has solution; Otherwise, if Δ P dfor negative, then represent that optimal load flow model is without solution, therefore, this optimal load flow model illustrates the operation criterion of current electric power system dispatching well, be merit angle, active power, reactive power and applied power composition right-angle triangle, applied power is hypotenuse, and the angle between meritorious and applied power is at merit angle, and generally represent power factor with its cosine value, G is an imaginary number, and m is the number in 1 ~ G.
CN201210301629.0A 2012-08-23 2012-08-23 The modeling method of receiving end grid security domain optimal load flow model Active CN102841965B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210301629.0A CN102841965B (en) 2012-08-23 2012-08-23 The modeling method of receiving end grid security domain optimal load flow model

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210301629.0A CN102841965B (en) 2012-08-23 2012-08-23 The modeling method of receiving end grid security domain optimal load flow model

Publications (2)

Publication Number Publication Date
CN102841965A CN102841965A (en) 2012-12-26
CN102841965B true CN102841965B (en) 2015-10-28

Family

ID=47369324

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210301629.0A Active CN102841965B (en) 2012-08-23 2012-08-23 The modeling method of receiving end grid security domain optimal load flow model

Country Status (1)

Country Link
CN (1) CN102841965B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103050970A (en) * 2013-01-15 2013-04-17 华北电力大学 Stability analyzing and optimizing method suitable for layering and zoning of ultra-high voltage electric network
CN103106338B (en) * 2013-01-17 2016-04-27 天津大学 The border rapid generation of electric system thermal stability security domain on decision space
CN104680262A (en) * 2015-03-18 2015-06-03 国网上海市电力公司 Receiving-end grid optimal layering and districting scheme obtaining method
CN104809521B (en) * 2015-05-05 2018-01-05 国家电网公司 By electric energy power evaluation method outside a kind of receiving end power network based on dual-layer optimization
CN105552906B (en) * 2016-02-14 2018-04-13 华南理工大学 A kind of area power grid load nargin analysis method based on prim al- dual interior point m ethod
CN107341615A (en) * 2017-07-10 2017-11-10 上海海能信息科技有限公司 A kind of local power net dynamic security economic load dispatching management system
CN109376939B (en) * 2018-11-01 2021-08-10 三峡大学 Power grid stability real-time prediction method based on adaptive neural network

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101247045A (en) * 2008-03-20 2008-08-20 天津大学 Electric voltage safety monitoring method based on voltage stabilization field in partition load space
CN101281637A (en) * 2008-05-09 2008-10-08 天津大学 Electric power system optimizing swim and real time pricing method based on hyperplane form safety field periphery

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101247045A (en) * 2008-03-20 2008-08-20 天津大学 Electric voltage safety monitoring method based on voltage stabilization field in partition load space
CN101281637A (en) * 2008-05-09 2008-10-08 天津大学 Electric power system optimizing swim and real time pricing method based on hyperplane form safety field periphery

Also Published As

Publication number Publication date
CN102841965A (en) 2012-12-26

Similar Documents

Publication Publication Date Title
CN102841965B (en) The modeling method of receiving end grid security domain optimal load flow model
CN102012956B (en) A kind of wind energy turbine set equivalence method considering the random fluctuation of wind energy turbine set input wind speed and direction
Syahputra et al. Reconfiguration of distribution network with distributed energy resources integration using PSO algorithm
Kouba et al. LFC enhancement concerning large wind power integration using new optimised PID controller and RFBs
Mohammadpour et al. SSR damping in wind farms using observed-state feedback control of DFIG converters
CN102856917B (en) Reactive power optimization method of power distribution network
CN102594244B (en) Joint control method of primary frequency modulation for doubly-fed wind power generation set
Rueda et al. Impacts of large scale integration of wind power on power system small-signal stability
CN103441506B (en) Method for multi-target coordination reactive power optimization control of distributed wind farm in different time scales
CN103050970A (en) Stability analyzing and optimizing method suitable for layering and zoning of ultra-high voltage electric network
Pulgar-Painemal et al. Towards a wind farm reduced-order model
CN103094920B (en) A kind of equivalence method of direct-drive-type wind turbine generator wind power plant
CN106026113A (en) Micro-grid system monitoring method having reactive automatic compensation function
CN102760191A (en) Double-fed machine set wind power station equivalent modeling system and method based on rotation speed grouping
CN103701134A (en) Grid-connected wind power plant point voltage control method based on MCR (Magnetic Control Reactor) and capacitance mixed compensation
Bhukya et al. Mathematical modelling and stability analysis of PSS for damping LFOs of wind power system
Jinxin et al. Dynamic equivalent model of doubly fed wind farm during electromagnetic transient process
CN105678033A (en) Wind farm equivalent modeling method suitable for electromagnetism transient simulation
CN106532758A (en) DC power re-allocation method during quit running of converter in multi-end DC power transmission system connected with offshore wind power
Wu et al. Development of an equivalent wind farm model for frequency regulation
Sanchez et al. Dynamic model of wind energy conversion systems with variable speed synchronous generator and full-size power converter for large-scale power system stability studies
Duppala et al. The technical impact of increase in penetration level of dg technologies on power system
Wang et al. Modeling and coordinated control for active power regulation of pumped storage‐battery integrated system under small‐disturbances
Madadi et al. Probabilistic small signal stability evaluation of power systems with high penetration of wind farms
Gao et al. Multi-segment droop control and optimal parameter setting strategy of wind turbine for frequency regulation

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant