CN107579843A - A kind of method for the security domain models for building flexible power distribution network - Google Patents

A kind of method for the security domain models for building flexible power distribution network Download PDF

Info

Publication number
CN107579843A
CN107579843A CN201710657597.0A CN201710657597A CN107579843A CN 107579843 A CN107579843 A CN 107579843A CN 201710657597 A CN201710657597 A CN 201710657597A CN 107579843 A CN107579843 A CN 107579843A
Authority
CN
China
Prior art keywords
mrow
msub
fss
munder
feeder line
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710657597.0A
Other languages
Chinese (zh)
Inventor
肖峻
伊丽达
刚发运
王莹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin University
Original Assignee
Tianjin University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin University filed Critical Tianjin University
Priority to CN201710657597.0A priority Critical patent/CN107579843A/en
Publication of CN107579843A publication Critical patent/CN107579843A/en
Pending legal-status Critical Current

Links

Landscapes

  • Supply And Distribution Of Alternating Current (AREA)

Abstract

The invention discloses a kind of method for the security domain models for building flexible power distribution network, the described method comprises the following steps:1) the whole network feeder line section capacity-constrained, main transformer capacity constraint and the port regulated quantity constraint of flexible Switching Station of the flexible power distribution network under the security constraints of N 0 are obtained;2) the whole network feeder line section capacity-constrained, main transformer capacity constraint and the port regulated quantity constraint of flexible Switching Station of the flexible power distribution network under the security constraints of N 1 are obtained;3) security domain models are obtained according to step 1) and step 2), takes equal sign to draw the effective and safe absorbing boundary equation of flexible power distribution network the operative constraint in security domain models.The present invention provides the security domain models of flexible power distribution network by above-mentioned steps, and is contrasted with conventional electrical distribution net, and the development for later flexible power distribution network provides technological guidance.

Description

A kind of method for the security domain models for building flexible power distribution network
Technical field
The present invention relates to intelligent distribution network planning field, more particularly to a kind of security domain models for building flexible power distribution network Method, the present invention are used to study the security of distribution network of Power Electronic Technique transformation and upgrade.
Background technology
FUTURE ENVIRONMENT pollutes and energy problem is that the mankind pay close attention to, and how to make good use of regenerative resource (such as water energy, wind Energy, solar energy, ocean energy etc.) it is the key factor for solving energy problem and environmental pollution.Be cleaning by renewable energy conversion, It is mostly important to transmit convenient electric energy, but power network is for receiving regenerative resource to be also faced with many problems at present, mainly Because regenerative resource has the features such as randomness, intermittence, fluctuation in itself[1-2]
But it is an important trend of following power network development by power electronics flexibility with the development of power electronics, Advanced Power Electronic Technique can build flexible, reliable, efficient power distribution network[3-4], reliability, the electric energy of power network can be lifted Quality and operational efficiency, moreover it is possible to successfully manage the relevant issues that power network receives regenerative resource to occur[5-6], improve to renewable energy Source and the digestion capability of wavy load[7-10]
Bibliography [11-12] proposes the general of flexible power distribution network (flexible distribution network, FDN) Read, after having inquired into future electrical energy electronics large-scale application power distribution network, FDN networking form, the method for operation, transition method, N-1 peaces Whole school tests and net capability (total supply capability, TSC) etc..In order that following FDN is preferably planned With development, the receiving of extensive regenerative resource is promoted, for the present invention on the basis of existing literature, research discusses FDN security, It is proposed FDN security domain models.
Bibliography:
[1] understanding and prospect [J] Automation of Electric Systems of Yao Jianguo, Gao Zhiyuan, Yang Sheng the spring energy internet, 2015,39 (23):9-14.
[2] Liu Zhen Asias global energies internet [M] China Electric Power Publishing House, 2015:1-20.
[3] Zhang Wenliang, Tang Guangfu, roc is looked into, waits application [J] China of the advanced Power Electronic Technique of in intelligent grid Electrical engineering journal, 2010,30 (4):1-7.
[4] Tang Guangfu, He Zhiyuan, Pang Hui flexible DC power transmissions engineering and technological research, application and development [J] power systems Automation, 2013,37 (15):3-14.
[5] AQ Huang, ML Crow, GT Heydt, et al.The Future Renewable Electric Energy Delivery and Management(FREEDM)System.The Energy Internet[J] .Proceedings of the IEEE, 2011,99 (1) 133-148.
[6] Rueda-Medina AC, Padilha-Feltrin A.Distributed generators as providers of reactive power support—a market approach[J].IEEE Transactions On Power Systems, 2013,28 (1):490-502.
[7] Chaudhary S K, Demirok E, Teodorescu R.Distribution system augmented by DC links for increasing the hosting capacity of PV generation[C]//IEEE International Conference on Power Electronics.Bengaluru, India:IEEE, 2012:1-6.
[8] Bloemink J M, Green T C.Increasing distributed generation penetration using soft normally-open points[C]//IEEE Power and Energy Society General Meeting.Minneapolis, MN, USA:IEEE, 2010:1-9.
[9] Bloemink J M, Green T C.Increasing photovoltaic penetration with local energy storage and soft normally-open points[C]//IEEE Power and Energy Society General Meeting.Detroit, USA:IEEE, 2011:1-9.
[10] Romero-Ramos E,A, Marano-Marcolini A, et al.Assessing the loadability of active distribution networks in the presence of DC Controllable links [J] .IET Generation Transmission&Distribution, 2011,5 (11): 1105-1113.
[11] Xiao Jun, just shipping, Huang Renle, wait net capability model [J] the power systems of flexibility power distribution networks certainly Dynamicization, 2017,41 (5):30-38.
[12] Xiao Jun, just shipping, Jiang Xun, waits flexibility power distribution networks:Definition, networking form and the method for operation [J] power network skills Art, 2017,41 (5):1435-1442.
The content of the invention
The invention provides a kind of method for the security domain models for building flexible power distribution network, transformed for Power Electronic Technique Power distribution network, the present invention provides FDN security domain models, and with conventional electrical distribution net (traditional distribution Network, TDN) contrasted, technological guidance is provided for later FDN development, it is described below:
A kind of method for the security domain models for building flexible power distribution network, the described method comprises the following steps:
1) obtain the whole network feeder line section capacity-constrained under N-0 security constraints of flexible power distribution network, main transformer capacity constraint and The port regulated quantity constraint of flexible Switching Station;
2) obtain the whole network feeder line section capacity-constrained under N-1 security constraints of flexible power distribution network, main transformer capacity constraint and The port regulated quantity constraint of flexible Switching Station;
3) security domain models are obtained according to step 1) and step 2), the operative constraint in security domain models is taken into equal sign Draw the effective and safe absorbing boundary equation of flexible power distribution network.
The port regulated quantity of flexible Switching Station of the flexible power distribution network under N-0 security constraints, which constrains, is specially:
Wherein, LFiFor port regulated quantity;FSS is flexible Switching Station;CFSSnFor the feeder line section capacity being connected with n-th of FSS; FSSnFor n-th of FSS;FSS gathers for the whole network FSS;The formula integrally represents to flow into the absolute value of FSS power no more than phase therewith Feeder line section capacity even.
The port regulated quantity of flexible Switching Station of the flexible power distribution network under N-1 security constraints, which constrains, is specially:
Wherein, L 'FiAfter N-1 failures occur for element ψ, FSS power is flowed into;CFSSnFor the feeder line being connected with n-th of FSS Duan Rongliang;FSSnFor n-th of FSS;FSS gathers for the whole network FSS;FSS is flexible Switching Station;PkFor node k power;The formula is whole After body surface shows that fault element ψ is out of service, the absolute value for flowing into FSS power is no more than the feeder line section capacity being attached thereto.
The security domain models are specially:
Wherein, PkFor node k power, Pk,maxAllow peak power for node;Ω(Bi,j) it is feeder line section Bi,jDownstream All node sets;FSSnFor n-th of FSS;Fi∈FSSnFor feeder line FiWith FSSnThere is contact;LFiFor port regulated quantity;CFSSnFor The feeder line section capacity being connected with n-th of FSS;CBi,jFor feeder line section Bi,jCapacity;CTiFor TiCapacity;PBi,jTo flow through feeder line FiFeedback Line segment Bi,jPower;LFiAfter N-1 failures occur for element ψ, FSS power is flowed into;B is the whole network feeder line section set;T is the whole network master Become set;Ω (ψ) is the set of all node powers in fault feeder section downstream.
The beneficial effect of technical scheme provided by the invention is:The present invention gives FDN security domain models, specific bag Include:N-0 power flow equations, N-0 constraints, N-1 power flow equations, N-1 constraint and secure border equation.The present invention has important reason Value and practical application value, certain technological guidance is provided for later FDN planning.
Brief description of the drawings
Fig. 1 is a kind of flow chart of the method for the security domain models for building flexible power distribution network;
Fig. 2 is TDN and the schematic diagram of FDN simply connected network structures;
Fig. 3 is the schematic diagram in the N-0 domains of simply connected network example;
Fig. 4 is the schematic diagram in the N-1 domains of simply connected network example;
Fig. 5 is that TDN and FDN gets in touch with structural representation more;
Fig. 6 is the N-0 domains (L of more contact examples3=8.92MVA) schematic diagram;
Fig. 7 is the N-0 domains (L of more contact examples3=5.946MVA) schematic diagram;
Fig. 8 is more contact example N-1 domain (L3=5.946MVA) schematic diagram.
Embodiment
To make the object, technical solutions and advantages of the present invention clearer, embodiment of the present invention is made below further It is described in detail on ground.
Embodiment 1
The embodiments of the invention provide a kind of method for the security domain models for building flexible power distribution network, referring to Fig. 1, this method Comprise the following steps:
101:Obtain the whole network feeder line section capacity-constrained of the flexible power distribution network under N-0 security constraints, main transformer capacity constraint with And the port regulated quantity constraint of flexible Switching Station;
102:Obtain the whole network feeder line section capacity-constrained of the flexible power distribution network under N-1 security constraints, main transformer capacity constraint with And the port regulated quantity constraint of flexible Switching Station;
103:Security domain models are obtained according to step 101 and step 102, the operative constraint in security domain models is taken into equal sign FDN security domain effective and safe absorbing boundary equations can be drawn.
In summary, the embodiment of the present invention provides FDN security domain models by above-mentioned steps 101- steps 103, and with Traditional TDN is contrasted, and the development for later FDN provides technological guidance.
Embodiment 2
The scheme in embodiment 1 is further introduced with reference to specific calculation formula, example, it is as detailed below Description:
201:Preparation work;
In FDN, the node load that this method is chosen in feeder line goes out as state variable, rather than the feeder line that TDN chooses Mouth load.Reason is as follows:TDN closed loop design open loop operations, single load power supply only are from a power supply, feeder line outlet power etc. Network loss is added in load, is approximately equal to load.To be consistent with electric distribution network data collection actual conditions and dispatcher's custom, because And in research TSC, power distribution network security domain (distribution system security region, DSSR) and N-1 safety Property when, typically all choose the power of feeder line outlet (more contact part is feeder line section) as state variable.And FDN flexibilities closed loop is transported OK, the load of a node may be simultaneously from multidirectional feeder line power supply, and typical case is that one end exports from feeder line, another Hold and come from flexible Switching Station (flexible switching station, FSS), it is negative to be likely larger than feeder line outlet for load in feeder line Lotus, now feeder load can not represent all loads in the feeder line, it is necessary to using the load in feeder line as state variable.
Identical with current TSC and DSSR most of document, this method also uses DC power flow, not meter and voltage drop in detail And network loss.This is due to that urban distribution network circuit is not grown, and voltage drop is little and can be adjusted by pressure regulation and reactive apparatus, now With using DSSR the and TSC resultant errors that accurate AC Ioad flow model obtains little.
To be corresponding with N-1, the situation for taking no account of N-1 is referred to as N-0 (normal operation) by this method, and power network is maximum during N-0 supplies Electric energy power is referred to as TSC0.
202:N-0 security constraints;
1) power flow equation
Define feeder line FiThe power for flowing into FSS is LFi, flow through feeder line FiFeeder line section Bi,jPower is all node work(in downstream Rate and LFiSum, i.e.,:
In formula (1)-(2):PBi,jTo flow through feeder line FiFeeder line section Bi,jPower;PkFor node k power, and 0≤Pk≤ Pk,max(Pk,maxAllow peak power for node);Ω(Bi,j) it is feeder line section Bi,jAll node sets in downstream;FSSnFor n-th FSS;Fi∈FSSnFor feeder line FiWith FSSnThere is contact.
Formula (1) represents to flow through Bi,jPower is all node powers downstream with flowing into FSSnPower LFiSum;
Formula (2) represents to flow into FSSnPower is 0, in accordance with the conservation of energy.
On the basis of above-mentioned feeder line section power flow equation, main transformer TiPower can represent:Affiliated TiFeeder line outlet power it With that is,:
In formula (3):PTiFor main transformer TiPower;Ω (Ti) is affiliated main transformer TiFeeder line set;Bi,1For affiliated main transformer Fi Outlet feeder line section;K is load bus;Ω(Bi,1) it is BI, 1All node sets in downstream.
N-0 power flow equations compared to TDN, FDN maximum features are to be in flexible closed loop fortune with the feeder line that FSS phases are got in touch with OK, it is interconnected between feeder line, N-0 has port regulated quantity L when runningFi;And when N-0 is run in disconnection between TDN feeder lines State, i.e., there is no L in power flow equation described aboveFiThis.
If it may be noted that FiWith FSSnWithout contact, then LFiFor 0, i.e. inactivity injection FSSn
2) security constraint
In the case where ignoring voltage drop and idle constraint, FDN N-0 security constraints mainly consider that the whole network feeder line section is held The constraint such as amount, main transformer capacity and FSS ports regulated quantity, N-0 security constraints can be obtained by N-0 power flow equations:
In formula (4)-(6):CBi,jFor feeder line section Bi,jCapacity;CTiFor TiCapacity;CFSSnFor the feeder line being connected with n-th of FSS Duan Rongliang;B is the whole network feeder line section set;T is the whole network main transformer set;FSS gathers for the whole network FSS.
Formula (4) is feeder line section capacity-constrained, represents that the power for flowing through feeder line section is not more than the capacity of the feeder line section;Formula (5) Constrained for main transformer capacity, T belonging to expressioniFeeder line outlet power sum be not more than the main transformer capacity;Formula (6) is adjusted for FSS ports Section amount constrains, and represents to flow into the feeder line section capacity that the absolute value of FSS power is no more than attached thereto, because FSS ports are adjusted Measure LFiDesirable " ± ", therefore, regulated quantity constraint in FSS ports needs plus absolute value.
It may be noted that the constraint of FSS port capacities is ignored in above-mentioned constraint, this is due under normal circumstances, in order to play FSS most Big advantage, its port capacity are generally higher than the feeder line section capacity being attached thereto.
203:N-1 security constraints;
1) power flow equation
After N-1 failures, FDN and TDN power flow equation can all change.N-1 occurs for TDN elements ψ (feeder line/main transformer) After failure, to recover the power supply of non-faulting area, the load of faulty section is turned to lead out by TDN by switching manipulation, will after switching manipulation New topological structure is formed, therefore, flows through B after TDN N-1 failuresi,jTrend and TiPower will change;And in FDN by Flexible operation with closed ring state is in power network, after N-1 failures occur for certain element ψ, related FSS ports are promptly propped up power is carried out Help, therefore, after FDN N-1 failures, the power of non-faulting element will also change, but the power flow changing in FDN be not as in TDN by In caused by switching manipulation.
Similarly, after N-1 failures occur for certain element ψ, it is L ' that definition, which flows into FSS power,Fi, therefore, flow through FiFeeder line section Bi,j Power is:Bi,jAll node powers in downstream and L 'FiSum, i.e.,:
Formula (7) represents to flow through non-faulting element Bi,jPower is all node powers downstream with flowing into FSSnPower sum; Formula (8) flows into FSS after representing failurenPower is 0, in accordance with the conservation of energy.
If failure occurs that in feeder line section, the FSS ports being connected with fault element emergency DC power support will be carried out, its port is defeated Go out power, watt level is equal to the total load in fault feeder section downstream, remaining port absorbed power.According to inflow FSSnPower is 0, formula (8) is rewritten as:
In formula (9):Ω (ψ) is the set of all node powers in fault feeder section downstream.
Formula (9) represents FiThere are contact and affiliated F with FSSiOn feeder line section when breaking down, formula (9) result takes Conversely, non-belonging FiOn feeder line section when breaking down, formula (9) result takes 0.
When N-1 failures occur for main transformer, in the case where not considering to turn band in station, failure main transformer institute on-load usually requires Turn to lead out by interconnection tie, therefore, can equally be reduced to more feedback lines of affiliated failure main transformer while feeder line occurs go out Mouth failure, the feeder line being equally connected with FSS (affiliated failure main transformer) port will carry out power Emergency Assistance.According to TiPower is institute Belong to TiFeeder line outlet power sum, i.e.,:
2) security constraint
FDN N-1 security constraints equally mainly consider the whole network feeder line section capacity, main transformer capacity and FSS ports regulated quantity Deng constraint, N-1 security constraints can be obtained by N-1 power flow equations:
Formula (11) is feeder line section capacity-constrained, after representing that fault element ψ is out of service, flows through feeder line section power no more than this Feeder line section capacity;Formula (12) constrains for main transformer capacity, after representing that fault element ψ is out of service, affiliated TiFeeder line outlet power Sum is not more than the main transformer capacity;Formula (13) constrains for FSS ports regulated quantity, after representing that fault element ψ is out of service, flows into The absolute value of FSS power is no more than the feeder line section capacity being attached thereto.
If the vector that FDN operating points W is made up of all non-equilibrium node powers, i.e.,:
W=[P1,...,Pk,...,Pn] (14)
Therefore, it is defined under fault set Ψ, if rightThere is a kind of turn with strategy in FSS so that operating point W meets Formula (11)-(13), then operating point W is claimed to meet N-1 safety criterions.
204:Security domain models;
Operating point W needs to meet that the constraint after N-0 constraints and element ψ generations N-1 (meets that N-1 pacifies in FDN security domains Full criterion).
In any operating point W=[P1,...,Pk,...,Pn] and system failure collection Ψ under, FDN security domain models can be obtained It is as follows:
In formula (15), minor 1 (being respectively minor 1-9 from top to bottom) constrains for node power;Minor 2-3 transports for N-0 Feeder line section constrains with main transformer capacity during row;Minor 4-5 is regulated quantity constraint in FSS ports when N-0 is run;Minor 6-7 runs for N-1 When feeder line section and main transformer capacity constrain;Minor 8-9 is regulated quantity constraint in FSS ports when N-1 is run.
In TDN DSSR, in the absence of the port regulated quantity (i.e. minor 4-5, minor 8-9) in formula (15), FDN DSSR Then include port regulated quantity.
205:Secure border equation.
When the operative constraint in FDN security domain models takes equal sign, you can draw FDN security domain effective and safes border side Journey.
FDN N-0 effective and safe absorbing boundary equations are as follows:
FDN N-1 effective and safe absorbing boundary equations are as follows:
The secure border in N-0/N-1 domains can be drawn by N-0/N-1 effective and safes absorbing boundary equation.
In summary, the embodiment of the present invention provides FDN security domain models by above-mentioned steps 201- steps 204, and with Traditional TDN is contrasted, and the development for later FDN provides technological guidance.
Embodiment 3
Feasibility checking is carried out to the scheme in Examples 1 and 2 with reference to specific example, Fig. 2-Fig. 8, it is as detailed below Description:
First, example basic condition
In Fig. 2,5:LiRepresent equivalent load;LFiTo inject FSS power, LFiRepresent power from F to be positiveiSide flows into FSS, Otherwise outflow.Fig. 2,5 example basic parameters are as shown in table 1.
The single multi- of table 1 gets in touch with example basic parameter
2nd, implementation steps of the present invention
(1) simply connected network example
1) effective and safe constrains
Simply connected network example N-0 and N-1 security constraint obtain effective and safe constraint after rejecting inactivce constraints, as shown in table 2.
The simply connected network N-0 of table 2 constrains with N-1 effective and safes
2) N-0 security domains contrast
N-0 domains are drawn according to N-0 operative constraints, as shown in Figure 3.
N-0 domains comparing result is as shown in table 3.
The simply connected network N-0 domains of table 3 contrast
1. domain contrasts
FDN domains area improves 100% compared to TDN, i.e. normal operation operating point is more 1 times compared to TDN.
2. TSC0 is contrasted
TSC0 is 17.84MVA, but TDN is only a point:B (8.92,8.92), and FDN is line segment EF, i.e. TSC0 works It is more many compared to TDN to make point.
3. single feedback line peak load contrast
TDN is 8.92MVA, FDN 17.84MVA.
TDN open loop operations, it is not more than feeder line capacity from the upper feeder line institute on-load of design;And FDN then breaks through this limitation, bear Lotus can exceed feeder line capacity, because operation with closed ring enables some load by different directions power supply while powered.Need Point out, it is theoretical maximum to expand as 2 times of feeder line capacity, for that can be equivalent to one with infinite busbar connection between multiple loads The situation of load;When feeder line is concatenated under the actual conditions of multiple loads, extensive magnitude is less than 2 times of feeder line capacity.
3) N-1 security domains contrast
N-1 security domains will meet N-0 and N-1 constraints simultaneously, draw N-1 domains, as shown in Figure 4.
N-1 domains comparing result is as shown in table 4.
The simply connected network N-1 domains of table 4 contrast
It can be seen that, simply connected network is considered under N-1 safety, both security domains, TSC and TSC operating points all same.Reason is After generation N-1 failures, an only power supply, FDN FSS can not play the effect of load continuous dispensing, only be to turn on, equivalent to The effect of interconnection switch, is not different with TDN.
To sum up, simply connected network N-0 uses FDN positive effects, and its operational envelope can double.But after considering N-1, from Security and power supply capacity angle see, simply connected network FDN transformations do not act on, subsequently need to also be from avoiding having a power failure in short-term and network loss etc. Aspect is analyzed.It may be noted that after main transformer capacity constraint is considered, TDN is compared in simply connected network part in larger FDN examples, in domain There to be some superiority on area, TSC and TSC operating points.
(2) get in touch with example more
1) effective and safe constrains
More contact example N-0 and N-1 security constraints obtain effective and safe constraint after rejecting inactivce constraints, as shown in table 5.
Table more than 5 is got in touch with N-0 and constrained with N-1 effective and safes
2) N-0 security domains contrast
Situation 1:L3All take balanced operation point under TSC0
L3Take 8.92MVA, L1With L2N-0 domains it is as shown in Figure 6.N-0 domains comparing result is as shown in table 6.
Table more than 6 gets in touch with N-0 domains contrast (L3=8.92MVA)
Fig. 6 (getting in touch with N-0 more) is identical with Fig. 2 (simply connected network N-0), because L3When taking 8.92MVA, feeder line F3It is fully loaded, actually may be used It is F using capacity1With F2Residual capacity, equivalent to simply connected network structure.To study FDN and TDN difference, then research conditions 2.
Situation 2:L3Take less than balanced operation point under TSC0
Such as L3Take 5.946MVA, two dimension view is as shown in Figure 7.N-0 domains comparing result is as shown in table 7.
Table more than 7 gets in touch with N-0 domains contrast (L3=5.946MVA)
From Fig. 6 and table 7:
1. domain contrasts
A. L is worked as3When taking the value smaller than TSC0 operating point, the FDN opposite upper right translation in oblique line border, two change in coordinate axis direction positions Shifting amount is 2.974MVA, equal to (8.92-5.946) MVA.FDN domains area is further improved, and 161.13% is improved than TDN. Work as L3When taking 0, N-0 borders are B ' C ', and translational movement reaches maximum 8.92MVA, and domain area improves 250% compared to TDN.
Respectively there is the breach (HBJ, CIK) of two small triangles in the B.FDN N-0 domains upper left corner and the lower right corner, analyze reason It is as follows:Border HB and CI be due in the case of N-0, single feedback specific electric load no more than operation with closed ring simultaneously supply power for 2 Feedback line capacity sum 17.84MVA is formed.
2. TSC0 is contrasted
TSC0 is 26.76MVA, and TDN TSC0 is only a point F (8.92,8.92), and FDN TSC0 is line segment BC.
In a word, in the case of N-0, the FDN that get in touch with expand more more than simply connected network N-0 domains, and this is due to that multiterminal FSS compares both ends FSS (SNOP) takes full advantage of the service channel and capacity between more feedback lines.
3) N-1 security domains contrast
N-1 domains will meet N-0 and N-1 constraints simultaneously.L3Take balanced operation point 5.946MVAs, L of the FDN under TSC1With L2 N-1 domains two dimension view it is as shown in Figure 8.N-1 domains are more as shown in table 8 than result.
Table more than 8 gets in touch with N-1 domains contrast (L3=5.946MVA)
From Fig. 8 and table 8:
1. domain contrasts
A.TDN N-1 domains are obviously reduced because there are tangent line WM cuttings, and reason is as follows:The example grid structure has not been It is holosymmetric, work as F3After generation N-1, L3It can only turn to bring F1, it is necessary to meet L3+L1≤ 8.92MVA, therefore L1Scope must be small In equal to F1Capacity and L3Difference.FDN usually not this problem.
It may be noted that TDN realizes that full symmetric structure can not also be fully solved above mentioned problem even if using more Multi- Switch.One Kind of conventional symmetrical structure be two for one for wiring, but siding also connects load.If a certain loop line has load, other twice must Must be once as band circuit be turned, its security domain can also be cut.Another symmetrical structure is that two segmentations two are got in touch with, can be certain Degree avoids the problem, but condition is to need transfer load to be divided into two parts by interconnector allowance just to be transferred to two feedbacks Line, it can not many times accomplish, switching manipulation also dramatically increases, thus usually also only turns to take a feedback line in practice.
B.FDN N-1 oblique lines border translates than TDN border to upper right, displacement 2.974MVA, equal to (8.92-5.946) MVA.FDN domains area improves 180% compared to TDN.
Work as L3When taking 0, TDN domain changes to maximum, is triangle OGE;FDN hypotenuses circle are changed into point F from line segment LM, to upper right Translational movement is maximum 8.92MVA, and domain area still can improve 100% with respect to TDN.Work as L3When taking 8.92MVA, FDN N-1 domains For triangle OGE, and TDN N-1 domains then deteriorate to line segment OG, and FDN domains area is far longer than TDN.
Respectively there is the breach (JLG, MEK) of two small triangles in the C.FDN N-1 domains upper left corner and the lower right corner, analyze reason It is as follows:Border LG and ME are due in the case of N-1, and single feedback specific electric load is formed no more than feeder line capacity 8.92MVA.
2. TSC is contrasted
TSC is 17.84MVA.TDN is only point G (0,8.92), and this is due to that TSC points only have (0,8.92,8.92), i.e., Two is standby for one;It is more more than TDN and FDN TSC operating points are line segment LM, i.e., it is easier to realize TSC in practice.
It may be noted that contrast of the embodiment of the present invention to FDN and TDN is to choose common contact structure (single multi- contact), The conclusion drawn is:FDN is compared to TDN, and in domain, area, TSC0/TSC, TSC0/TSC operating point and single feedback line institute can bands Peak load on, better than TDN, after main transformer capacity effect of constraint value is considered, conclusion is similar.
It will be appreciated by those skilled in the art that accompanying drawing is the schematic diagram of a preferred embodiment, the embodiments of the present invention Sequence number is for illustration only, does not represent the quality of embodiment.
The foregoing is only presently preferred embodiments of the present invention, be not intended to limit the invention, it is all the present invention spirit and Within principle, any modification, equivalent substitution and improvements made etc., it should be included in the scope of the protection.

Claims (4)

  1. A kind of 1. method for the security domain models for building flexible power distribution network, it is characterised in that the described method comprises the following steps:
    1) the whole network feeder line section capacity-constrained, main transformer capacity constraint and flexibility of the flexible power distribution network under N-0 security constraints are obtained The port regulated quantity constraint of Switching Station;
    2) the whole network feeder line section capacity-constrained, main transformer capacity constraint and flexibility of the flexible power distribution network under N-1 security constraints are obtained The port regulated quantity constraint of Switching Station;
    3) security domain models are obtained according to step 1) and step 2), takes equal sign to draw the operative constraint in security domain models The effective and safe absorbing boundary equation of flexible power distribution network.
  2. 2. the method for a kind of security domain models for building flexible power distribution network according to claim 1, it is characterised in that described The port regulated quantity of flexible Switching Station of the flexible power distribution network under N-0 security constraints, which constrains, is specially:
    <mrow> <mo>|</mo> <msub> <mi>L</mi> <mrow> <mi>F</mi> <mi>i</mi> </mrow> </msub> <mo>|</mo> <mo>&amp;le;</mo> <msub> <mi>C</mi> <mrow> <mi>F</mi> <mi>S</mi> <mi>S</mi> <mi>n</mi> </mrow> </msub> <mo>,</mo> <mo>&amp;ForAll;</mo> <msub> <mi>FSS</mi> <mi>n</mi> </msub> <mo>&amp;Element;</mo> <mi>F</mi> <mi>S</mi> <mi>S</mi> </mrow>
    <mrow> <munder> <mo>&amp;Sigma;</mo> <mrow> <mi>F</mi> <mi>i</mi> <mo>&amp;Element;</mo> <msub> <mi>FSS</mi> <mi>n</mi> </msub> </mrow> </munder> <msub> <mi>L</mi> <mrow> <mi>F</mi> <mi>i</mi> </mrow> </msub> <mo>=</mo> <mn>0</mn> </mrow>
    Wherein, LFiFor port regulated quantity;FSS is flexible Switching Station;CFSSnFor the feeder line section capacity being connected with n-th of FSS;FSSn For n-th of FSS;FSS gathers for the whole network FSS;The formula integrally represents what the absolute value for flowing into FSS power was no more than attached thereto Feeder line section capacity.
  3. 3. the method for a kind of security domain models for building flexible power distribution network according to claim 1, it is characterised in that described The port regulated quantity of flexible Switching Station of the flexible power distribution network under N-1 security constraints, which constrains, is specially:
    <mrow> <mo>|</mo> <msubsup> <mi>L</mi> <mrow> <mi>F</mi> <mi>i</mi> </mrow> <mo>&amp;prime;</mo> </msubsup> <mo>|</mo> <mo>&amp;le;</mo> <msub> <mi>C</mi> <mrow> <mi>F</mi> <mi>S</mi> <mi>S</mi> <mi>n</mi> </mrow> </msub> <mo>,</mo> <mo>&amp;ForAll;</mo> <msub> <mi>FSS</mi> <mi>n</mi> </msub> <mo>&amp;Element;</mo> <mi>F</mi> <mi>S</mi> <mi>S</mi> </mrow>
    <mrow> <munder> <mo>&amp;Sigma;</mo> <mrow> <mi>F</mi> <mi>i</mi> <mo>&amp;Element;</mo> <msub> <mi>FSS</mi> <mi>n</mi> </msub> </mrow> </munder> <msubsup> <mi>L</mi> <mrow> <mi>F</mi> <mi>i</mi> </mrow> <mo>&amp;prime;</mo> </msubsup> <mo>=</mo> <mrow> <mo>(</mo> <munder> <mo>&amp;Sigma;</mo> <mrow> <mi>k</mi> <mo>&amp;Element;</mo> <mi>&amp;Omega;</mi> <mrow> <mo>(</mo> <mi>&amp;psi;</mi> <mo>)</mo> </mrow> </mrow> </munder> <msub> <mi>P</mi> <mi>k</mi> </msub> <mo>,</mo> <mn>0</mn> <mo>)</mo> </mrow> </mrow>
    Wherein, L 'FiAfter N-1 failures occur for element ψ, FSS power is flowed into;CFSSnFeeder line section to be connected with n-th of FSS is held Amount;FSSnFor n-th of FSS;FSS gathers for the whole network FSS;FSS is flexible Switching Station;PkFor node k power;The formula entirety table After showing that fault element ψ is out of service, the absolute value for flowing into FSS power is no more than the feeder line section capacity being attached thereto.
  4. 4. the method for a kind of security domain models for building flexible power distribution network according to claim 1, it is characterised in that described Security domain models are specially:
    <mfenced open = "{" close = ""> <mtable> <mtr> <mtd> <mrow> <mn>0</mn> <mo>&amp;le;</mo> <msub> <mi>P</mi> <mi>k</mi> </msub> <mo>&amp;le;</mo> <msub> <mi>P</mi> <mrow> <mi>k</mi> <mo>,</mo> <mi>max</mi> </mrow> </msub> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <msub> <mi>P</mi> <mrow> <mi>B</mi> <mi>i</mi> <mo>,</mo> <mi>j</mi> </mrow> </msub> <mo>=</mo> <munder> <mo>&amp;Sigma;</mo> <mrow> <mi>k</mi> <mo>&amp;Element;</mo> <mi>&amp;Omega;</mi> <mrow> <mo>(</mo> <mi>B</mi> <mi>i</mi> <mo>,</mo> <mi>j</mi> <mo>)</mo> </mrow> </mrow> </munder> <msub> <mi>P</mi> <mi>k</mi> </msub> <mo>+</mo> <msub> <mi>L</mi> <mrow> <mi>F</mi> <mi>i</mi> </mrow> </msub> <mo>&amp;le;</mo> <msub> <mi>C</mi> <mrow> <mi>B</mi> <mi>i</mi> <mo>,</mo> <mi>j</mi> </mrow> </msub> <mo>,</mo> <mo>&amp;ForAll;</mo> <msub> <mi>B</mi> <mrow> <mi>i</mi> <mo>,</mo> <mi>j</mi> </mrow> </msub> <mo>&amp;Element;</mo> <mi>B</mi> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <msub> <mi>P</mi> <mrow> <mi>T</mi> <mi>i</mi> </mrow> </msub> <mo>=</mo> <munder> <mo>&amp;Sigma;</mo> <mrow> <mi>F</mi> <mi>i</mi> <mo>&amp;Element;</mo> <mi>&amp;Omega;</mi> <mrow> <mo>(</mo> <mi>T</mi> <mi>i</mi> <mo>)</mo> </mrow> </mrow> </munder> <mrow> <mo>(</mo> <munder> <mo>&amp;Sigma;</mo> <mrow> <mi>k</mi> <mo>&amp;Element;</mo> <mi>&amp;Omega;</mi> <mrow> <mo>(</mo> <mi>B</mi> <mi>i</mi> <mo>,</mo> <mn>1</mn> <mo>)</mo> </mrow> </mrow> </munder> <msub> <mi>P</mi> <mi>k</mi> </msub> <mo>+</mo> <msub> <mi>L</mi> <mrow> <mi>F</mi> <mi>i</mi> </mrow> </msub> <mo>)</mo> </mrow> <mo>&amp;le;</mo> <msub> <mi>C</mi> <mrow> <mi>T</mi> <mi>i</mi> </mrow> </msub> <mo>,</mo> <mo>&amp;ForAll;</mo> <msub> <mi>T</mi> <mi>i</mi> </msub> <mo>&amp;Element;</mo> <mi>T</mi> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <mo>|</mo> <msub> <mi>L</mi> <mrow> <mi>F</mi> <mi>i</mi> </mrow> </msub> <mo>|</mo> <mo>&amp;le;</mo> <msub> <mi>C</mi> <mrow> <mi>F</mi> <mi>S</mi> <mi>S</mi> <mi>n</mi> </mrow> </msub> <mo>,</mo> <mo>&amp;ForAll;</mo> <msub> <mi>FSS</mi> <mi>n</mi> </msub> <mo>&amp;Element;</mo> <mi>F</mi> <mi>S</mi> <mi>S</mi> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <munder> <mo>&amp;Sigma;</mo> <mrow> <mi>F</mi> <mi>i</mi> <mo>&amp;Element;</mo> <msub> <mi>FSS</mi> <mi>n</mi> </msub> </mrow> </munder> <msub> <mi>L</mi> <mrow> <mi>F</mi> <mi>i</mi> </mrow> </msub> <mo>=</mo> <mn>0</mn> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <msub> <mi>P</mi> <mrow> <mi>B</mi> <mi>i</mi> <mo>,</mo> <mi>j</mi> </mrow> </msub> <mo>=</mo> <munder> <mo>&amp;Sigma;</mo> <mrow> <mi>k</mi> <mo>&amp;Element;</mo> <mi>&amp;Omega;</mi> <mrow> <mo>(</mo> <mi>B</mi> <mi>i</mi> <mo>,</mo> <mi>j</mi> <mo>)</mo> </mrow> </mrow> </munder> <msub> <mi>P</mi> <mi>k</mi> </msub> <mo>+</mo> <msubsup> <mi>L</mi> <mrow> <mi>F</mi> <mi>i</mi> </mrow> <mo>&amp;prime;</mo> </msubsup> <mo>&amp;le;</mo> <msub> <mi>C</mi> <mrow> <mi>B</mi> <mi>i</mi> <mo>,</mo> <mi>j</mi> </mrow> </msub> <mo>,</mo> <mo>&amp;ForAll;</mo> <mi>&amp;psi;</mi> <mo>&amp;NotElement;</mo> <mi>B</mi> <mo>,</mo> <mo>&amp;ForAll;</mo> <msub> <mi>B</mi> <mrow> <mi>i</mi> <mo>,</mo> <mi>j</mi> </mrow> </msub> <mo>&amp;Element;</mo> <mi>B</mi> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <msub> <mi>P</mi> <mrow> <mi>T</mi> <mi>i</mi> </mrow> </msub> <mo>=</mo> <munder> <mo>&amp;Sigma;</mo> <mrow> <mi>F</mi> <mi>i</mi> <mo>&amp;Element;</mo> <mi>&amp;Omega;</mi> <mrow> <mo>(</mo> <mi>T</mi> <mi>i</mi> <mo>)</mo> </mrow> </mrow> </munder> <mrow> <mo>(</mo> <munder> <mo>&amp;Sigma;</mo> <mrow> <mi>k</mi> <mo>&amp;Element;</mo> <mi>&amp;Omega;</mi> <mrow> <mo>(</mo> <mi>B</mi> <mi>i</mi> <mo>,</mo> <mn>1</mn> <mo>)</mo> </mrow> </mrow> </munder> <msub> <mi>P</mi> <mi>k</mi> </msub> <mo>+</mo> <msubsup> <mi>L</mi> <mrow> <mi>F</mi> <mi>i</mi> </mrow> <mo>&amp;prime;</mo> </msubsup> <mo>)</mo> </mrow> <mo>&amp;le;</mo> <msub> <mi>C</mi> <mrow> <mi>T</mi> <mi>i</mi> </mrow> </msub> <mo>,</mo> <mo>&amp;ForAll;</mo> <mi>&amp;psi;</mi> <mo>&amp;NotElement;</mo> <mi>T</mi> <mo>,</mo> <mo>&amp;ForAll;</mo> <msub> <mi>T</mi> <mi>i</mi> </msub> <mo>&amp;Element;</mo> <mi>T</mi> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <mo>|</mo> <msubsup> <mi>L</mi> <mrow> <mi>F</mi> <mi>i</mi> </mrow> <mo>&amp;prime;</mo> </msubsup> <mo>|</mo> <mo>&amp;le;</mo> <msub> <mi>C</mi> <mrow> <mi>F</mi> <mi>S</mi> <mi>S</mi> <mi>n</mi> </mrow> </msub> <mo>,</mo> <mo>&amp;ForAll;</mo> <msub> <mi>FSS</mi> <mi>n</mi> </msub> <mo>&amp;Element;</mo> <mi>F</mi> <mi>S</mi> <mi>S</mi> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <munder> <mo>&amp;Sigma;</mo> <mrow> <mi>F</mi> <mi>i</mi> <mo>&amp;Element;</mo> <msub> <mi>FSS</mi> <mi>n</mi> </msub> </mrow> </munder> <msubsup> <mi>L</mi> <mrow> <mi>F</mi> <mi>i</mi> </mrow> <mo>&amp;prime;</mo> </msubsup> <mo>=</mo> <mrow> <mo>(</mo> <munder> <mo>&amp;Sigma;</mo> <mrow> <mi>k</mi> <mo>&amp;Element;</mo> <mi>&amp;Omega;</mi> <mrow> <mo>(</mo> <mi>&amp;psi;</mi> <mo>)</mo> </mrow> </mrow> </munder> <msub> <mi>P</mi> <mi>k</mi> </msub> <mo>,</mo> <mn>0</mn> <mo>)</mo> </mrow> </mrow> </mtd> </mtr> </mtable> </mfenced>
    Wherein, PkFor node k power, Pk,maxAllow peak power for node;Ω(Bi,j) it is feeder line section Bi,jDownstream owns Node set;FSSnFor n-th of FSS;Fi∈FSSnFor feeder line FiWith FSSnThere is contact;LFiFor port regulated quantity;CFSSnFor with n-th Feeder line section capacity connected individual FSS;CBi,jFor feeder line section Bi,jCapacity;CTiFor TiCapacity;PBi,jTo flow through feeder line FiFeeder line section Bi,jPower;L′FiAfter N-1 failures occur for element ψ, FSS power is flowed into;B is the whole network feeder line section set;T is the whole network main transformer collection Close;Ω (ψ) is the set of all node powers in fault feeder section downstream.
CN201710657597.0A 2017-08-03 2017-08-03 A kind of method for the security domain models for building flexible power distribution network Pending CN107579843A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710657597.0A CN107579843A (en) 2017-08-03 2017-08-03 A kind of method for the security domain models for building flexible power distribution network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710657597.0A CN107579843A (en) 2017-08-03 2017-08-03 A kind of method for the security domain models for building flexible power distribution network

Publications (1)

Publication Number Publication Date
CN107579843A true CN107579843A (en) 2018-01-12

Family

ID=61034505

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710657597.0A Pending CN107579843A (en) 2017-08-03 2017-08-03 A kind of method for the security domain models for building flexible power distribution network

Country Status (1)

Country Link
CN (1) CN107579843A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109919494A (en) * 2019-03-11 2019-06-21 长沙理工大学 A kind of integrated energy system load security domain Characteristics of Evolution generation method based on faults coupling communication process
CN113036798A (en) * 2021-03-11 2021-06-25 天津大学 Flexible direct-current power distribution network N-1 security domain solving method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020024424A1 (en) * 2000-04-10 2002-02-28 Burns T. D. Civil defense alert system and method using power line communication
CN106469914A (en) * 2016-11-04 2017-03-01 天津大学 A kind of net capability computational methods of flexibility power distribution network
CN106877317A (en) * 2017-03-23 2017-06-20 天津大学 The definition of flexible power distribution network, networking form, the method for operation and transition method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020024424A1 (en) * 2000-04-10 2002-02-28 Burns T. D. Civil defense alert system and method using power line communication
CN106469914A (en) * 2016-11-04 2017-03-01 天津大学 A kind of net capability computational methods of flexibility power distribution network
CN106877317A (en) * 2017-03-23 2017-06-20 天津大学 The definition of flexible power distribution network, networking form, the method for operation and transition method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
肖峻等: "柔性配电网:定义、组网形态与运行方式", 《电网技术》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109919494A (en) * 2019-03-11 2019-06-21 长沙理工大学 A kind of integrated energy system load security domain Characteristics of Evolution generation method based on faults coupling communication process
CN113036798A (en) * 2021-03-11 2021-06-25 天津大学 Flexible direct-current power distribution network N-1 security domain solving method
CN113036798B (en) * 2021-03-11 2023-11-07 天津大学 Flexible direct-current power distribution network N-1 safety domain solving method

Similar Documents

Publication Publication Date Title
Rodriguez et al. Multi-terminal DC grids: challenges and prospects
Pan et al. AC grid with embedded VSC-HVDC for secure and efficient power delivery
CN104167756B (en) Power flow determination method of alternating current and direct current system containing multi-terminal high voltage direct current transmission
CN104810853B (en) Digraph-based islanding method of distribution network including distributed generations
CN104009452A (en) Protection scheme for direct current distribution system short-circuit fault
Vrana et al. Technical aspects of the North Sea super grid
CN104318326A (en) Net rack optimizing model for improving renewable energy source acceptance ability
CN108847680A (en) A kind of alternating current-direct current mixing power distribution network hierarchical control method based on flexible looped network device
Xiao et al. Flexible distribution network: definition, configuration, operation, and pilot project
CN206076972U (en) A kind of AC-DC hybrid power grid
CN109066654B (en) Power distribution network maximum power supply capacity evaluation method based on mixed integer linear programming
CN107579843A (en) A kind of method for the security domain models for building flexible power distribution network
Nguyen et al. Power flow solution for multi-frequency AC and multi-terminal HVDC power systems
CN106877317B (en) Definition, networking form, the method for operation and the transition method of flexible power distribution network
CN207320834U (en) A kind of circuit topological structure of alternating current-direct current mixing distribution system
Yang et al. Cooperative repair scheduling and service restoration for distribution systems with soft open points
CN106655234A (en) Method for analyzing influence of line impedance and call wire power on generalized short-circuit ratio
Rezvani et al. A generalized model for unified ac-dc load flow analysis
CN110571799B (en) Distributed power supply key node optimal configuration method for improving elasticity of power distribution network
CN107196307B (en) A kind of method that electric network active trend is quickly estimated after transformer fault
Jiang et al. Locating and sizing of partition flexible interconnection converter station in large urban power grids
Hu et al. Frequency stability control method considering limited EDCPS
CN107769211A (en) A kind of twin voltage grade alternating current-direct current mixes distribution system
Zhao et al. Inverter‐side robust damping controller design of hybrid HVDC with cascaded multi‐infeed MMC converters in asynchronous situation
Huang et al. Composite power system reliability evaluation for systems with SVC and TCPAR

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180112