CN102841965B - The modeling method of receiving end grid security domain optimal load flow model - Google Patents
The modeling method of receiving end grid security domain optimal load flow model Download PDFInfo
- Publication number
- CN102841965B CN102841965B CN201210301629.0A CN201210301629A CN102841965B CN 102841965 B CN102841965 B CN 102841965B CN 201210301629 A CN201210301629 A CN 201210301629A CN 102841965 B CN102841965 B CN 102841965B
- Authority
- CN
- China
- Prior art keywords
- load
- lambda
- security domain
- power
- sigma
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 23
- 230000003044 adaptive effect Effects 0.000 claims abstract description 24
- 238000004458 analytical method Methods 0.000 claims abstract description 10
- 239000011159 matrix material Substances 0.000 claims abstract description 7
- 230000010355 oscillation Effects 0.000 claims abstract description 7
- 238000010248 power generation Methods 0.000 claims abstract description 7
- 238000012545 processing Methods 0.000 claims abstract description 7
- 230000003068 static effect Effects 0.000 claims abstract description 7
- 239000004576 sand Substances 0.000 claims description 6
- 230000005611 electricity Effects 0.000 claims description 5
- 239000000203 mixture Substances 0.000 claims description 4
- 230000008569 process Effects 0.000 claims description 4
- 230000033228 biological regulation Effects 0.000 claims description 3
- 230000005540 biological transmission Effects 0.000 claims description 3
- 238000012886 linear function Methods 0.000 claims description 3
- 238000013507 mapping Methods 0.000 claims description 3
- 238000010606 normalization Methods 0.000 claims description 3
- 238000013316 zoning Methods 0.000 abstract description 5
- 230000006870 function Effects 0.000 description 20
- 238000012360 testing method Methods 0.000 description 9
- 238000004364 calculation method Methods 0.000 description 4
- 102000030592 phosphoserine aminotransferase Human genes 0.000 description 3
- 108010088694 phosphoserine aminotransferase Proteins 0.000 description 3
- 238000013439 planning Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000009467 reduction Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 230000009514 concussion Effects 0.000 description 1
- 230000032798 delamination Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
- 230000009897 systematic effect Effects 0.000 description 1
- 238000012549 training Methods 0.000 description 1
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02E—REDUCTION OF GREENHOUSE GAS [GHG] EMISSIONS, RELATED TO ENERGY GENERATION, TRANSMISSION OR DISTRIBUTION
- Y02E60/00—Enabling technologies; Technologies with a potential or indirect contribution to GHG emissions mitigation
Landscapes
- Supply And Distribution Of Alternating Current (AREA)
Abstract
The invention discloses a kind of modeling method of receiving end grid security domain optimal load flow model, concrete steps are: the first step: carry out constructing system security domain by namely running criterion to the stability of static system voltage, phase angle, oscillation frequency and N-1 to the stability analysis of power flow equation, N number of load of system can be transformed to by given power generation dispatching criterion M the different sets that load direction forms, and generates critical load matrix and carries out approximate processing to security domain: second step: build dynamic security constrained optimum tide model; 3rd step: set up Adaptive Neuro-fuzzy Inference; 4th step: train adaptive nuero-fuzzy inference system system and set up optimal load flow model.Optimal load flow model of the present invention illustrates the operation criterion of current electric power system dispatching well, can apply to the optimizing scheduling behind layering and zoning between receiving end Grid based on the optimal load flow security domain approximation technique of adaptive nuero-fuzzy inference system system.
Description
Technical field
The present invention relates to a kind of modeling method of optimal load flow model, particularly relate to a kind of modeling method of receiving end grid security domain optimal load flow model.
Background technology
In electric system long-run development process, it is complementary that operation of power networks planning and system load flow calculate.On the one hand, for ensureing the safety and stability of whole electrical network, the formation of Electric Power Network Planning need be based upon system load flow and calculate on basis; On the other hand, system optimal Load flow calculation can improve stability and the economy of Electric Power Network Planning.Optimal load flow is meeting under specific system cloud gray model and security constraints, by utilizing control device in adjustment System, can realize the system stable operation state of intended target optimum.Therefore, in system safety operation problem under increasingly sharp-pointed and complicated situation, optimal load flow calculates nature becomes the system stability analysis aid indispensable with optimization.
After the access of extra-high voltage grid, the Voltage Instability that during system jam, power shifts initiation on a large scale will become one of subject matter of receiving end electricity net safety stable.Especially, after extra-high voltage backbone network builds up substantially, system short-circuit levels of current will be increased.Due to the importance of 500kV partition power grid, it will inevitably exist with the form of looped network, and this just weakens the benefit that layering and zoning can be brought.What the fault rate of electric system was the highest is single-line to ground fault.Receiving-end system is comparatively weak, and load center lacks forceful electric power source and supports, and especially the support of 500kV electrical network is weak, cause 220kV electrical network too intensive, short-circuit current exceeds standard, and after extra-high voltage access large receiving-end grid, power system delamination and subarea operates to power grid security and stability and brings stern challenge.
Summary of the invention
Object of the present invention is exactly that provide a kind of computing method of receiving end grid security domain optimal load flow, it has the advantage of the operation criterion illustrating current electric power system dispatching well in order to solve the problem.
To achieve these goals, the present invention adopts following technical scheme:
A modeling method for receiving end grid security domain optimal load flow model, concrete steps are:
The first step: by namely carrying out constructing system security domain to the stability of static system voltage, phase angle, oscillation frequency and N-1 criterion to the stability analysis of power flow equation.For obtaining discrete security domain expression formula, N number of load of system can be transformed to by given power generation dispatching criterion M the different sets that load direction forms, N, M be more than or equal to 1 for natural number, N is load quantity in system, given system has fixing load quantity, generates following critical load matrix and carries out approximate processing to security domain:
Second step: build dynamic security constrained optimum tide model as follows:
Objective function:
Constraint condition: F
pF(δ, V, Q
g, P
s, P
d)=0 (3)
i, j be more than or equal to 1 natural number (6)
V
min≤V≤V
max(8)
Wherein, C
sand C
dbe the bid of electric power supply and demand respectively, unit is $/MWh; System supply and demand power is respectively P
sand P
d, unit is MW; F
pF() is system load flow equation; V and δ is node voltage respectively and intersects; I
ijthe electric current by transmission line of electricity ij, this constraint definition thermally-stabilised limit of system; Q
gfor generator reactive power; f
nR() for representing security of system territory,
for the critical value that it is suitable.
3rd step: set up Adaptive Neuro-fuzzy Inference.
4th step: train adaptive nuero-fuzzy inference system system and set up optimal load flow model, security domain constrained optimum tide model is:
Objective function:
Constraint condition: F
pF(δ, V, Q
g, P
s, P
d, Q
d)=0 (11)
0≤P
s≤P
smax(12)
Q
smin≤Q
s≤Q
smax(13)
V
min≤V≤V
max(14)
Δ P
dj≤ 0 j be more than or equal to 1 natural number (16)
j be more than or equal to 1 natural number (17)
Wherein: Q
dsystem requirements reactive powers, Q
ssystem supply reactive power,
for the changing load amount of a jth node, P
dj0for the initial load of a jth node, scalar ce>=0 represents loading coefficient, α
0for initial load coefficient, d
j0represent that initial load increases vector, d
jrepresent the load growth vector of all loads under i-th load growth rate: d
j=[d
j1, d
j2... d
jN]
t.
j be more than or equal to 1 natural number (18)
0≤d
j≤ 1j be more than or equal to 1 natural number (19)
α≥0 (21)
Wherein, Δ P
dfor changing load amount; M is m security of system territory of all G scheduling scheme.Constraint condition (11) makes Δ P by force
dbe 0 or negative.If Δ P
dbe 0, then optimal load flow model has solution; Otherwise, if Δ P
dfor negative, then represent that optimal load flow model is without solution.Therefore, this optimal load flow model illustrates the operation criterion of current electric power system dispatching well,
be merit angle, active power, reactive power and applied power composition right-angle triangle, applied power is hypotenuse, and the angle between meritorious and applied power is at merit angle, and generally represent power factor with its cosine value, G is an imaginary number, and m is the number in 1 ~ G.
The concrete steps of the described first step are:
(1) setting up electric system can micro-algebraic equation be:
Wherein, x is system state variables, and common have generator speed and corner; Y represents algebraic variable, as load side voltage etc.; ρ represents system controllable variable, as generator voltage grade; λ is one group of uncontrollable parameter, and common have load to gain merit and reactive power.
(2) load direction d is determined
i=[d
i1d
i2... d
iN]
twhen load increases along a certain specific direction, electric system will reach operational limit, by carrying out constructing system security domain to the stability analysis of power flow equation, namely run criterion carry out constructing system security domain, if λ according to carrying out stability and N-1 to static system voltage, phase angle, oscillation frequency
i=[λ
i1λ
i2... λ
iN]
tfor the rate of growth of i-th load in N number of load, i be more than or equal to 1 natural number, λ is expressed as
λ
i1=αd
i1
λ
i2=αd
i2(23)
λ
iN=αd
iN
Wherein, scalar ce>=0 represents loading coefficient, d
ijrepresent the load growth direction of load j under i-th load growth rate, i and j is the natural number being more than or equal to 1, and load direction meets following condition:
(3) system can be made to reach safety and stability border gradually by increasing loading coefficient α, and then determine stability boundaris ultimate value
n number of load of system can be transformed to by given power generation dispatching criterion M the different sets that load direction forms, and generates following critical load matrix and is similar to security domain:
In described 3rd step, Adaptive Neuro-fuzzy Inference is divided into six layers: X
1, X
2be the input of system, y inference system exports; Each node of network same layer has similar function, uses O
1i, O
2irepresent that i-th node exports, i be more than or equal to 1 natural number;
Ground floor: input data are carried out Fuzzy Processing:
O
1i=μ
Ai(x
1),O
2i=μ
Bi(x
2),i=1,2 (25)
Wherein, A
ior B
iit is fuzzy set; μ
ai(x
1), μ
bi(x
2) be the membership function of fuzzy set.
The second layer: be multiplied by each input data membership function, as this layer of regular relevance grade w
i:
w
i=μ
Ai(x
1)μ
Bi(x
2),i=1,2 (26)
Third layer: the w calculating the i-th rule
iand all relevance grade sum w
1+ w
2, and the normalization of each rule relevance grade is completed by both ratios:
4th layer: for calculating the output of each rule:
Wherein, f
ifor the consequent conclusion output function of fuzzy system, p
i, q
ibe the system weighting coefficient under the i-th rule, r
ibe the constant under the i-th rules and regulations, when this output function is linear function, be called " first-order system "; If constant, be called " zero order system ".
Layer 5: the total output for computing system:
Layer 6, carries out defuzzification process by method of weighted mean by this Output rusults, and makes the error between constrained input minimum by back propagation and least square method.
Concrete steps in described 4th step are:
(1) adaptive nuero-fuzzy inference system system is trained; Make M ultimate value of N-1 load
the border formed as the input of adaptive nuero-fuzzy inference system system, N be greater than 1 natural number, M be more than or equal to 1 natural number, definition i-th load bus safe edge dividing value
be expressed as:
(2) formula (26) is about intrafascicular for the security domain of optimal load flow equation, forming security domain constrained optimum tide model is:
Objective function:
Constraint condition: F
pF(δ, V, Q
g, P
s, P
d, Q
d)=0 (11)
0≤P
s≤P
smax(12)
Q
smin≤Q
s≤Q
smax(13)
V
min≤V≤V
max(14)
α≥0 (21)
Beneficial effect of the present invention: the present invention is based on adaptive nuero-fuzzy inference system system certainty annuity security domain.Adopt IEEE 118 node standard test system to carry out simulation calculation and checking to the feasibility of adaptive nuero-fuzzy inference system system and efficiency, and in the theoretical foundation of layering and zoning, verify the feasibility of the method to receiving end electrical network.Result shows, can apply to the optimizing scheduling behind layering and zoning between receiving end Grid based on the optimal load flow security domain approximation technique of adaptive nuero-fuzzy inference system system.
Accompanying drawing explanation
Fig. 1 is typical adaptive nuero-fuzzy inference system system architecture;
Fig. 2 is IEEE tri-district system security domain.
Embodiment
Below in conjunction with accompanying drawing and embodiment, the invention will be further described.
A modeling method for receiving end grid security domain optimal load flow model, concrete steps are:
The first step: by namely carrying out constructing system security domain to the stability of static system voltage, phase angle, oscillation frequency and N-1 criterion to the stability analysis of power flow equation, for obtaining discrete security domain expression formula, N number of load of system can be transformed to by given power generation dispatching criterion M the different sets that load direction forms, N is load quantity in system, given system has fixing load quantity, generates following critical load matrix and carries out approximate processing to security domain:
Second step: build dynamic security constrained optimum tide model as follows:
Objective function:
Constraint condition: F
pF(δ, V, Q
g, P
s, P
d)=0(3)
i, j be more than or equal to 1 natural number (6)
V
min≤V≤V
max(8)
Wherein, C
sand C
dbe the bid of electric power supply and demand respectively, unit is $/MWh; System supply and demand power is respectively P
sand P
d, unit is MW; F
pF() is system load flow equation; V and δ is node voltage respectively and intersects; I
ijthe electric current by transmission line of electricity ij, this constraint definition thermally-stabilised limit of system; Q
gfor generator reactive power; f
nR() for representing security of system territory,
for the critical value that it is suitable.
3rd step: set up Adaptive Neuro-fuzzy Inference.
4th step: train adaptive nuero-fuzzy inference system system and set up optimal load flow model, security domain constrained optimum tide model is:
Objective function:
Constraint condition: F
pF(δ, V, Q
g, P
s, P
d, Q
d)=0 (11)
0≤P
s≤P
smax(12)
Q
smin≤Q
s≤Q
smax(13)
V
min≤V≤V
max(14)
Δ P
di≤ 0j be more than or equal to 1 natural number (16)
j be more than or equal to 1 natural number (17)
j be more than or equal to 1 natural number (18)
0≤d
j≤ 1j be more than or equal to 1 natural number (19)
α≥0(21)
Wherein, Δ P
dfor changing load amount; M is m security of system territory of all G scheduling scheme.Constraint condition (11) makes Δ P by force
dbe 0 or negative.If Δ P
dbe 0, then optimal load flow model has solution; Otherwise, if Δ P
dfor negative, then represent that optimal load flow model is without solution.Therefore, this optimal load flow model illustrates the operation criterion of current electric power system dispatching well,
be merit angle, active power, reactive power and applied power composition right-angle triangle, applied power is hypotenuse, and the angle between meritorious and applied power is at merit angle, and generally represent power factor with its cosine value, G is an imaginary number, and m is the number in 1 ~ G.
The concrete steps of the described first step are:
(1) setting up electric system can micro-algebraic equation be:
Wherein, x is system state variables, and common have generator speed and corner; Y represents algebraic variable, as load side voltage etc.; ρ represents system controllable variable, as generator voltage grade; λ is one group of uncontrollable parameter, and common have load to gain merit and reactive power.
(2) load direction d is determined
i=[d
i1d
i2... d
iN]
twhen load increases along a certain specific direction, electric system will reach operational limit, by carrying out constructing system security domain to the stability analysis of power flow equation, namely run criterion carry out constructing system security domain, if λ according to carrying out stability and N-1 to static system voltage, phase angle, oscillation frequency
i=[λ
i1λ
i2... λ
iN]
tfor the rate of growth of i-th load in N number of load, i be more than or equal to 1 natural number, λ is expressed as
λ
i1=αd
i1
λ
i2=αd
i2(23)
λ
i=αd
iN
Wherein, scalar ce>=0 represents loading coefficient, d
ijrepresent the load growth direction of load j under i-th load growth rate, i and j is the natural number being more than or equal to 1, and load direction meets following condition:
(3) system can be made to reach safety and stability border gradually by increasing loading coefficient α, and then determine stability boundaris ultimate value
n number of load of system can be transformed to by given power generation dispatching criterion M the different sets that load direction forms, and generates following critical load matrix and is similar to security domain:
In described 3rd step, Adaptive Neuro-fuzzy Inference is divided into six layers: X
1, X
2be the input of system, y inference system exports; Each node of network same layer has similar function, uses O
1irepresent that i-th node exports, i be more than or equal to 1 natural number;
Ground floor: input data are carried out Fuzzy Processing:
O
1i=μ
ai(x
1), O
2i=μ
bi(x
2), i=1,2(25) wherein, A
ior B
iit is fuzzy set; μ
ai(x
1) be the membership function of fuzzy set.
The second layer: be multiplied by each input data membership function, as this layer of regular relevance grade w
i:
w
i=μ
Ai(x
1)μ
Bi(x
2),i=1,2(26)
Third layer: the w calculating the i-th rule
iand all relevance grade sum w
1+ w
2, and the normalization of each rule relevance grade is completed by both ratios:
4th layer: for calculating the output of each rule:
Wherein, f
ifor the consequent conclusion output function of fuzzy system, p
i, q
ibe the system weighting coefficient under the i-th rule, r
ibe the constant under the i-th rules and regulations, when this output function is linear function, be called " first-order system "; If constant, be called " zero order system ".
Layer 5: the total output for computing system:
Layer 6, carries out defuzzification process by method of weighted mean by this Output rusults, and makes the error between constrained input minimum by back propagation and least square method.
Concrete steps in described 4th step are:
(1) adaptive nuero-fuzzy inference system system is trained; Make M ultimate value of N-1 load
the border formed, as the input of adaptive nuero-fuzzy inference system system, defines the safe edge dividing value of i-th load bus
be expressed as:
The mapping function being obtained load growth rate by formula (9) and formula (25) is:
(2) formula (26) is about intrafascicular for the security domain of optimal load flow equation, forming security domain constrained optimum tide model is:
Objective function:
Constraint condition: F
pF(δ, V, Q
g, P
s, P
d, Q
d)=0 (11)
0≤P
s≤P
smax(12)
Q
smin≤Q
s≤Q
smax(13)
V
min≤V≤V
max(14)
α≥0 (21)
Utilize PST, PSAT and UWPFLOW software emulates system.PSAT for calculating electric system conventional Load Flow parameter, and using the input of this flow data as UWPFLOW and PST, obtains voltage stability boundary and the concussion stability boundaris of system respectively; Again by the Output rusults of PST and UWPFLOW gained as the input in PSAT, calculate remaining voltage-regulation coefficient with this, thus determine whole system safety and stability territory.Generate closed differentiable function by adaptive nuero-fuzzy inference system system software by gained safety and stability territory, and by this function embedded system optimal load flow model, calculate optimal load flow model respectively by Newton method and interior point method.
Select IEEE 118 node standard test system to verify put forward the practicality of optimal load flow model, to simplify the analysis and do not lose ubiquity, optimal load flow model safety territory is by typical deployments pattern acquiring, such as, in formula 31 G=1, IEEE 118 node standard test system is made up of 53 generators and 91 loads, and table 1 is genset bid data.
Table 1 genset bid data
By layering and zoning principle and electricity market related notion, this test macro is divided into three and four operation areas respectively, namely corresponding security domain represents the restriction of each interregional power delivery, using 631 different load flows obtaining to as adaptive nuero-fuzzy inference system systematic training data.
Embodiment one:
As shown in Figure 2, former 118 node standard test system are divided into three pieces of regions, and wherein region 1 and region 2 respectively comprise 31 loads, and region 3 comprises 29 loads.To a station symbol semicomputer (Duo 2 double-core 2.2Ghz processor, 2G internal memory), within remaining on 10-5 for making the error between constrained input, within 156 seconds consuming time, obtain security of system territory altogether.
Put forward by test the validity of optimal load flow model, select P by table 2
dA1, P
dA2and P
dA3force system running state to jump out security domain, mark three in Fig. 2 respectively and jump out a little, wherein suppose that the bid of changing load amount is C
dA1=200 $/MWh, C
dA2=400 $/MWh and C
dA3=600 $/MWh, corresponding optimal load flow solution to model is as shown in table 3; Analyze known, in the ordinary course of things, bid the highest load P
dA1reduction Δ Pd
a1minimum, get back in security domain to make system running state.
Table 2 system testing scheme
Table 3 system loading knots modification
Embodiment two:
Former 118 node standard test system are divided into four pieces of regions, and wherein region 1, region 2 respectively comprise 22 loads with region 3, and region 4 comprises 25 loads.10 are remained on for making the error between constrained input
-5within, within 225 seconds consuming time, obtain security of system territory altogether.Known to three region sample calculation analysis, selected P
dA1, P
dA2, P
dA3and P
dA4system running state is forced to jump out security domain, as table 4; Suppose that the bid of changing load amount is C
dA1=800 $/MWh, C
dA2=100 $/MWh, C
dA3=300 $/MWh and C
dA4=600 $/MWh;
Table 5-4 system testing scheme
Table 5-5 system loading knots modification
Corresponding optimal load flow solution to model is as shown in table 5; In four region examples, bid the highest load P
dA1the load P relatively low with bid
dA2and P
dA3reduction is all close to 0, and the region four load reduction Δ Pd larger on security of system impact
a4maximum, analyze known, in the ordinary course of things, measure valency compared to changing load, security of system is larger on the impact of load reduction.
By reference to the accompanying drawings the specific embodiment of the present invention is described although above-mentioned; but not limiting the scope of the invention; one of ordinary skill in the art should be understood that; on the basis of technical scheme of the present invention, those skilled in the art do not need to pay various amendment or distortion that creative work can make still within protection scope of the present invention.
Claims (1)
1. a modeling method for receiving end grid security domain optimal load flow model, is characterized in that, concrete steps are:
The first step: by namely carrying out constructing system security domain to the stability of static system voltage, phase angle, oscillation frequency and N-1 criterion to the stability analysis of power flow equation, for obtaining discrete security domain expression formula, N number of load of system is transformed to by given power generation dispatching criterion M the different sets that load direction forms, N, M be more than or equal to 1 natural number, N is load quantity in system, given system has fixing load quantity, generates critical load matrix and carries out approximate processing to security domain;
Second step: build dynamic security constrained optimum tide model;
3rd step: set up Adaptive Neuro-fuzzy Inference;
4th step: train adaptive nuero-fuzzy inference system system and set up optimal load flow model;
The concrete steps of the described first step are:
(1) setting up electric system can micro-algebraic equation be:
Wherein, x is system state variables, and y represents algebraic variable, and ρ represents system controllable variable; λ is one group of uncontrollable parameter;
(2) load direction d is determined
i=[d
i1d
i2... d
iN]
twhen load increases along a certain specific direction, electric system will reach operational limit, by carrying out constructing system security domain to the stability analysis of power flow equation, namely run criterion carry out constructing system security domain according to carrying out stability and N-1 to static system voltage, phase angle, oscillation frequency
merit angle, active power, reactive power and applied power composition right-angle triangle, applied power is hypotenuse, and the angle between meritorious and applied power is at merit angle, and generally represent power factor with its cosine value, G is an imaginary number, and m is the number in 1 ~ G;
If λ
i=[λ
i1λ
i2... λ
iN]
tfor the rate of growth of i-th load in N number of load, i be more than or equal to 1 natural number, λ is expressed as:
Wherein, scalar ce>=0 represents loading coefficient, d
ijrepresent the load growth direction of load j under i-th load growth rate, i and j is the natural number being more than or equal to 1, and load direction meets following condition:
(3) system can be made to reach safety and stability border gradually by increasing loading coefficient α, and then determine stability boundaris ultimate value
n number of load of system can be transformed to by given power generation dispatching criterion M the different sets that load direction forms, and generates following critical load matrix and is similar to security domain:
The optimal load flow model of described second step is as follows:
Objective function:
Constraint condition: F
pF(δ, V, Q
g, P
s, P
d)=0 (3)
Q
gmin≤Q
g≤Q
gmax(7)
V
min≤V≤V
max(8)
f
NR0-f
NR(V,δ)≤0 (9)
Wherein, C
sand C
dbe the bid of electric power supply and demand respectively, unit is $/MWh; System supply and demand power is respectively P
sand P
d, unit is MW; F
pF() is system load flow equation; V and δ is node voltage respectively and intersects; I
ijthe electric current by transmission line of electricity ij, this constraint definition thermally-stabilised limit of system; Q
gfor generator reactive power; f
nR() for representing security of system territory,
for the critical value that it is suitable;
In described 3rd step, Adaptive Neuro-fuzzy Inference is divided into six layers: X
1, X
2be the input of system, y is that inference system exports; Each node of network same layer has similar function, uses O
1irepresent that i-th node exports, i be more than or equal to 1 natural number;
Ground floor: input data are carried out Fuzzy Processing:
O
1i=μ
Ai(x
1),O
2i=μ
Bi(x
2),i=1,2 (25)
Wherein, A
ior B
iit is fuzzy set; μ
ai(x
1) be the membership function of fuzzy set;
The second layer: be multiplied by each input data membership function, as this layer of regular relevance grade w
i:
w
i=μ
Ai(x
1)μ
Bi(x
2),i=1,2 (26)
Third layer: the w calculating the i-th rule
iand all relevance grade sum w
1+ w
2, and the normalization of each rule relevance grade is completed by both ratios:
4th layer: for calculating the output of each rule:
Wherein, f
ifor the consequent conclusion output function of fuzzy system, p
i, q
ibe the system weighting coefficient under the i-th rule, r
ibe the constant under the i-th rules and regulations, when this output function is linear function, be called " first-order system "; If constant, be called " zero order system ";
Layer 5: the total output for computing system:
Layer 6, carries out defuzzification process by method of weighted mean by this Output rusults, and makes the error between constrained input minimum by back propagation and least square method;
Concrete steps in described 4th step are:
(1) adaptive nuero-fuzzy inference system system is trained; Make M ultimate value of N-1 load
the border formed is as the input of adaptive nuero-fuzzy inference system system, and N is load quantity in system, and given system has fixing load quantity, and M is natural number, the safe edge dividing value of definition i-th load bus
be expressed as:
(2) formula (26) is about intrafascicular for the security domain of optimal load flow equation, forming security domain constrained optimum tide model is:
Objective function:
Constraint condition: F
pF(δ, V, Q
g, P
s, P
d, Q
d)=0 (11)
0≤P
s≤P
smax(12)
Q
smin≤Q
s≤Q
smax(13)
V
min≤V≤V
max(14)
α≥0 (21);
Wherein, P
dj0for the initial load of a jth node, P
djfor the load of a jth node, Δ P
dfor changing load amount; M is m security of system territory of all G scheduling scheme, and constraint condition (11) makes Δ P by force
dbe 0 or negative; If Δ P
dbe 0, then optimal load flow model has solution; Otherwise, if Δ P
dfor negative, then represent that optimal load flow model is without solution, therefore, this optimal load flow model illustrates the operation criterion of current electric power system dispatching well,
be merit angle, active power, reactive power and applied power composition right-angle triangle, applied power is hypotenuse, and the angle between meritorious and applied power is at merit angle, and generally represent power factor with its cosine value, G is an imaginary number, and m is the number in 1 ~ G.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210301629.0A CN102841965B (en) | 2012-08-23 | 2012-08-23 | The modeling method of receiving end grid security domain optimal load flow model |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210301629.0A CN102841965B (en) | 2012-08-23 | 2012-08-23 | The modeling method of receiving end grid security domain optimal load flow model |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102841965A CN102841965A (en) | 2012-12-26 |
CN102841965B true CN102841965B (en) | 2015-10-28 |
Family
ID=47369324
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210301629.0A Active CN102841965B (en) | 2012-08-23 | 2012-08-23 | The modeling method of receiving end grid security domain optimal load flow model |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102841965B (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103050970A (en) * | 2013-01-15 | 2013-04-17 | 华北电力大学 | Stability analyzing and optimizing method suitable for layering and zoning of ultra-high voltage electric network |
CN103106338B (en) * | 2013-01-17 | 2016-04-27 | 天津大学 | The border rapid generation of electric system thermal stability security domain on decision space |
CN104680262A (en) * | 2015-03-18 | 2015-06-03 | 国网上海市电力公司 | Receiving-end grid optimal layering and districting scheme obtaining method |
CN104809521B (en) * | 2015-05-05 | 2018-01-05 | 国家电网公司 | By electric energy power evaluation method outside a kind of receiving end power network based on dual-layer optimization |
CN105552906B (en) * | 2016-02-14 | 2018-04-13 | 华南理工大学 | A kind of area power grid load nargin analysis method based on prim al- dual interior point m ethod |
CN107341615A (en) * | 2017-07-10 | 2017-11-10 | 上海海能信息科技有限公司 | A kind of local power net dynamic security economic load dispatching management system |
CN109376939B (en) * | 2018-11-01 | 2021-08-10 | 三峡大学 | Power grid stability real-time prediction method based on adaptive neural network |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101247045A (en) * | 2008-03-20 | 2008-08-20 | 天津大学 | Electric voltage safety monitoring method based on voltage stabilization field in partition load space |
CN101281637A (en) * | 2008-05-09 | 2008-10-08 | 天津大学 | Electric power system optimizing swim and real time pricing method based on hyperplane form safety field periphery |
-
2012
- 2012-08-23 CN CN201210301629.0A patent/CN102841965B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101247045A (en) * | 2008-03-20 | 2008-08-20 | 天津大学 | Electric voltage safety monitoring method based on voltage stabilization field in partition load space |
CN101281637A (en) * | 2008-05-09 | 2008-10-08 | 天津大学 | Electric power system optimizing swim and real time pricing method based on hyperplane form safety field periphery |
Also Published As
Publication number | Publication date |
---|---|
CN102841965A (en) | 2012-12-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102841965B (en) | The modeling method of receiving end grid security domain optimal load flow model | |
CN102012956B (en) | A kind of wind energy turbine set equivalence method considering the random fluctuation of wind energy turbine set input wind speed and direction | |
Syahputra et al. | Reconfiguration of distribution network with distributed energy resources integration using PSO algorithm | |
Kouba et al. | LFC enhancement concerning large wind power integration using new optimised PID controller and RFBs | |
Mohammadpour et al. | SSR damping in wind farms using observed-state feedback control of DFIG converters | |
CN102856917B (en) | Reactive power optimization method of power distribution network | |
CN102594244B (en) | Joint control method of primary frequency modulation for doubly-fed wind power generation set | |
Rueda et al. | Impacts of large scale integration of wind power on power system small-signal stability | |
CN103441506B (en) | Method for multi-target coordination reactive power optimization control of distributed wind farm in different time scales | |
CN103050970A (en) | Stability analyzing and optimizing method suitable for layering and zoning of ultra-high voltage electric network | |
Pulgar-Painemal et al. | Towards a wind farm reduced-order model | |
CN103094920B (en) | A kind of equivalence method of direct-drive-type wind turbine generator wind power plant | |
CN106026113A (en) | Micro-grid system monitoring method having reactive automatic compensation function | |
CN102760191A (en) | Double-fed machine set wind power station equivalent modeling system and method based on rotation speed grouping | |
CN103701134A (en) | Grid-connected wind power plant point voltage control method based on MCR (Magnetic Control Reactor) and capacitance mixed compensation | |
Bhukya et al. | Mathematical modelling and stability analysis of PSS for damping LFOs of wind power system | |
Jinxin et al. | Dynamic equivalent model of doubly fed wind farm during electromagnetic transient process | |
CN105678033A (en) | Wind farm equivalent modeling method suitable for electromagnetism transient simulation | |
CN106532758A (en) | DC power re-allocation method during quit running of converter in multi-end DC power transmission system connected with offshore wind power | |
Wu et al. | Development of an equivalent wind farm model for frequency regulation | |
Sanchez et al. | Dynamic model of wind energy conversion systems with variable speed synchronous generator and full-size power converter for large-scale power system stability studies | |
Duppala et al. | The technical impact of increase in penetration level of dg technologies on power system | |
Wang et al. | Modeling and coordinated control for active power regulation of pumped storage‐battery integrated system under small‐disturbances | |
Madadi et al. | Probabilistic small signal stability evaluation of power systems with high penetration of wind farms | |
Gao et al. | Multi-segment droop control and optimal parameter setting strategy of wind turbine for frequency regulation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |