CN111144623B - Fixed value tuning method based on self-adaptive learning factor particle swarm - Google Patents

Fixed value tuning method based on self-adaptive learning factor particle swarm Download PDF

Info

Publication number
CN111144623B
CN111144623B CN201911252950.2A CN201911252950A CN111144623B CN 111144623 B CN111144623 B CN 111144623B CN 201911252950 A CN201911252950 A CN 201911252950A CN 111144623 B CN111144623 B CN 111144623B
Authority
CN
China
Prior art keywords
constraint
protection
weight
sensitivity
subjective
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911252950.2A
Other languages
Chinese (zh)
Other versions
CN111144623A (en
Inventor
龚永智
陶晔
李周龙
许传敏
罗正娅
杨忠艳
沈亚当
张泽渠
李春美
张继军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lincang Power Supply Bureau of Yunnan Power Grid Co Ltd
Original Assignee
Lincang Power Supply Bureau of Yunnan Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lincang Power Supply Bureau of Yunnan Power Grid Co Ltd filed Critical Lincang Power Supply Bureau of Yunnan Power Grid Co Ltd
Priority to CN201911252950.2A priority Critical patent/CN111144623B/en
Publication of CN111144623A publication Critical patent/CN111144623A/en
Application granted granted Critical
Publication of CN111144623B publication Critical patent/CN111144623B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/04Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/004Artificial life, i.e. computing arrangements simulating life
    • G06N3/006Artificial life, i.e. computing arrangements simulating life based on simulated virtual individual or collective life forms, e.g. social simulations or particle swarm optimisation [PSO]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/06Electricity, gas or water supply
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S10/00Systems supporting electrical power generation, transmission or distribution
    • Y04S10/50Systems or methods supporting the power network operation or management, involving a certain degree of interaction with the load-side end user applications

Abstract

The invention relates to a fixed value tuning method based on a self-adaptive learning factor particle swarm, which comprises the following steps of: establishing a mathematical model of timing time delay protection, and performing weighting and model solving on constraint conditions in the model through subjective weighting and objective weighting. The invention overcomes the defect of a single weighting method, ensures that the determination of the weight is more reasonable, and ensures the objectivity and scientificity of the scheme. The final protection scheme can be closer to the solution required by the practical problem, the particle swarm optimization enhances global search in the early stage by improving the learning factor, so that the particle swarm optimization is not easy to fall into local optimum, and the local search capability is enhanced in the later stage, so that a more accurate global optimum solution can be quickly obtained.

Description

Fixed value tuning method based on self-adaptive learning factor particle swarm
Technical Field
The invention relates to a tuning method, in particular to a constant value tuning method based on self-adaptive learning factor particle swarm.
Background
At present, with the electric power system becoming more and more extensive and complicated, the importance of safe and stable operation of the electric power system is promoted. In order to obtain a set of fixed values which can meet the expectations of most users in a power grid and have the optimal protection effect of the whole power grid, the current mainstream research method is to transform a complex and continuous setting calculation problem into a multivariable, multi-target and multi-constraint simple and discrete global optimization problem and solve a model by combining an intelligent algorithm.
Generally, the quality of a protection scheme is judged in terms of the protection effect of the solution on the entire power system. Therefore, most of research on optimization of relay protection setting values focuses on global optimization of power system relay protection setting values. At present, a mainstream research algorithm is based on a genetic algorithm or a particle swarm algorithm, a mathematical model is established according to four basic requirements of relay protection of a power system, and intelligent tuning is performed by combining constraint conditions in the relay protection field such as power flow constraint, selective constraint, sensitivity constraint and level difference constraint. Such methods of tuning the fixed value suffer from the following problems:
1. in the process of setting the constraint conditions by establishing the mathematical model, the selection of the weight of the constraint conditions can directly influence the tuning result of the tuning algorithm on the relay protection type of the power system. The vulnerability of the grid and the user expectations vary in different areas, resulting in different primary emphasis on relay protection.
2. In the iterative process of intelligent tuning, the problems of local optimization, low convergence speed and the like inevitably occur in standard intelligent optimization algorithms such as heredity, particle swarm and the like.
Disclosure of Invention
In order to solve the technical problem, in the process of designing a model, the shortest time of all protection setting actions is taken as an objective function, and the constraint conditions such as sensitivity, selectivity and the like are expressed in the form of a penalty function. And in view of different requirements of different protections on the constraint conditions, weighting the constraint conditions by a method of combining subjective and objective weights. Meanwhile, aiming at the problems of local optimization, low convergence speed and the like which inevitably occur in the solving process, a particle swarm algorithm of a self-adaptive learning factor is designed, wherein the learning factor c 1 、c 2 Mainly influences the consciousness and individual behavior of particle swarm in the particle swarm algorithm, and is aligned to c at different stages 1 And c 2 And correcting to ensure that the optimization iteration process is not easy to fall into local optimization, thereby obtaining a more accurate global optimal solution and achieving the purpose of accelerating convergence.
The technical scheme of the invention is as follows:
a constant value tuning method based on adaptive learning factor particle swarm comprises the following steps:
step (1) establishing a mathematical model for timing time-delay protection
And (3) establishing a mathematical model of the timing time-limited delay protection by taking the shortest setting time of the protection delay period in the whole system as a target function:
Figure BDA0002309553130000021
in the formula, M is the setting time of the protection delay period; t is t ij To protect the jth delay action time; alpha, beta, chi and delta are respectively the weight of the level difference constraint, the sensitivity constraint, the selectivity constraint and the load constraint; f. of int (t)、f sen (t)、f sel (t)、f load (t) penalty functions of level difference constraint, sensitivity constraint, selectivity constraint and load constraint with respect to time are respectively provided, and k is a constant;
step (2) weighting constraint conditions in the model through subjective weighting and objective weighting
2.1, objective empowerment
For a strongly-connected power grid structure, when a protection scheme is prepared, the priority of the sensitivity is greater than the selectivity; in the weakly-connected power grid structure, the priority of selectivity is greater than the sensitivity; for being at n i Protection i in a simple loop, the line to which the bus to which it is connected has l i The grid vulnerability factors are as follows:
η i =1/(n i ×l i ) (2)
Figure BDA0002309553130000022
wherein eta is the grid vulnerability coefficient, and the objective weights of the sensitivity and the selectivity constraint are as follows:
Figure BDA0002309553130000023
Figure BDA0002309553130000024
wherein c and d are constants, v βij 、v χij Respectively representing the sensitivity of the ith protection time period and the weight of the selective constraint;
2.2 subjective empowerment
Grading all constraint conditions of different protections, and carrying out subjective empowerment on the constraint conditions in the model by considering the subjective intention of a user; establishing an AHP judgment matrix R = [ R ] mn ]Wherein r is mn The importance of the principle m is equal to that of the principle n, the greater the value is, the greater the importance of the principle m is, the weight value of each index is calculated according to the matrix R, and the following steps are carried out:
Figure BDA0002309553130000031
wherein: omega m When m =1, the weight is a sensitivity constraint weight; when m =2, the value is a selective constraint weight value; k is the number of the setting principles of protection;
2.3 subjective and objective combination empowerment
Combining the objective weight and the subjective weight obtained in the step 2.1 and the step 2.2, combining the objective weight and the subjective weight through the following formula to obtain a final weight:
Figure BDA0002309553130000032
wherein, ω is l Subjective weights obtained for the ith constraint, i.e., the results of equations (4) and (5); v. of l The objective weight obtained for the ith constraint, i.e., the result of equation (6); a is l The final weight obtained for the ith constraint;
step (3) model solving
And (3) taking the formula (1) as an objective function, and solving the model by adopting a particle swarm optimization method of the self-adaptive learning factor.
Further, in the step (3), a concrete process of model solution is as follows:
and (3) taking the setting scheme of the protection as a particle to carry out cyclic solution, wherein the particle speed is represented as the following formula:
Figure BDA0002309553130000033
wherein the learning factor c 1 、c 2 Influence independent awareness and population awareness of particles; making c earlier in the iteration 1 The size is relatively larger, the independence of the particles is enhanced, and therefore the global search capability is enhanced; iterative late stage of c 2 Relatively larger, enhances the group consciousness of particles, strengthens the capability of local search, improves the convergence rate of the algorithm and learns the factor c 1 、c 2 Is determined by the following formula:
c 1 =a+b cos(kπ/itermax) (9)
c 2 =c-d cos(kπ/itermax) (10)
wherein k is the current iteration number, itermax is the maximum iteration number, and a, b, c, d are constants.
Further, in the step (3), firstly, a binary character string coding method is adopted to re-read the matching mode between each two adjacent line protection, and the method can be divided into three modes according to different actual sizes, wherein the three modes comprise matching with a first section of adjacent line distance protection, matching with a second section of adjacent line distance protection and sensitivity setting related to the line fault;
judging whether the position of the setting result meets the selective constraint or the sensitivity constraint; when the setting result does not satisfy the selectivity constraint or the sensitivity constraint, the penalty function f (t) = Δ t of the selectivity constraint or the sensitivity constraint in the equation (1), otherwise f (t) =0.
Further, in formula (1), α =0 and δ =0. For timing margin backup protection, the step difference constraint is subject to the selectivity constraint, so α is taken to be 0 here, and the load constraint is generally satisfied for setting calculation, so δ is 0 here.
Compared with the traditional method, the method has the following advantages:
1. the invention utilizes a mathematical method to combine subjective weighting and objective weighting to weight the constraint conditions in the model, overcomes the defect of a single weighting method, ensures more reasonable weight determination and ensures the objectivity and scientificity of the scheme. The final protection scheme can be closer to the solution needed by the practical problem
2. According to the invention, through improvement of the learning factor, the particle swarm optimization enhances global search in the early stage, so that the particle swarm optimization is not easy to fall into local optimum, and enhances the local search capability in the later stage, so that a more accurate global optimum solution can be rapidly obtained.
Drawings
FIG. 1 is a flow chart of weight assignment to constraint conditions using a combination of objective and subjective weights method of the present invention;
FIG. 2 is a code pattern of the present invention that matches a segment of protection according to distance from an adjacent line;
FIG. 3 is a code pattern for two-stage protection according to the distance to adjacent lines in accordance with the present invention;
FIG. 4 is a code map of the present invention tuned in accordance with sensitivity associated with a present line fault;
fig. 5 is a flowchart for solving the model by the particle swarm optimization method of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments of the present invention, and it is obvious that the described embodiments are only a part of examples of the present invention, and not all examples. All other embodiments, which can be obtained by a person skilled in the art without inventive effort based on the embodiments of the present invention, are within the scope of the present invention.
The fixed value tuning method based on the adaptive learning factor particle swarm of the embodiment comprises the following steps:
step (1) establishing a mathematical model of timing time-delay protection
And (3) establishing a mathematical model of the timing time-limited delay protection by taking the shortest setting time of the protection delay period in the whole system as a target function:
Figure BDA0002309553130000051
wherein M is a protectionSetting time in a time delay manner; t is t ij The jth delay action time is protected; alpha, beta, chi and delta are respectively the weight of the level difference constraint, the sensitivity constraint, the selectivity constraint and the load constraint; f. of int (t)、f sen (t)、f sel (t)、f load And (t) penalty functions of level difference constraint, sensitivity constraint, selectivity constraint and load constraint with respect to time are respectively set, and k is a constant. For timing margin backup protection, the step difference constraint is subject to the selectivity constraint, so α is taken to be 0 here, and the load constraint is generally satisfied for setting calculation, so δ is 0 here.
Step (2), the constraint conditions in the model are weighted through subjective weighting and objective weighting
2.1 Objective empowerment
In order to reduce the occurrence probability of power grid accidents, different protection schemes are made aiming at the problem of different network vulnerabilities of different structures. For a strongly-connected power grid structure, the priority of the sensitivity is greater than the selectivity when a protection scheme is prepared; in the weakly-connected power grid structure, the priority of selectivity is greater than the sensitivity; for being at n i Protection i in a simple loop, the line to which the bus to which it is connected has l i The grid vulnerability factors are as follows:
η i =1/(n i ×l i ) (2)
Figure BDA0002309553130000052
wherein eta is the grid vulnerability coefficient, and the objective weights of the sensitivity and the selectivity constraint are as follows:
Figure BDA0002309553130000053
Figure BDA0002309553130000054
wherein c and d are constants, v βij 、v χij Respectively representing the sensitivity of the ith protection time period and the weight of the selective constraint;
2.2 subjective empowerment
Grading all constraint conditions of different protections, and carrying out subjective empowerment on the constraint conditions in the model by considering the subjective intention of a user; establishing an AHP judgment matrix R = [ R ] mn ]Wherein r is mn The principle m and n are equal in importance, the greater the numerical value is, the greater the importance of the principle m and n is, the weighted value of each index is calculated according to the matrix R, and the method is carried out according to the following formula:
Figure BDA0002309553130000055
wherein: omega m When m =1, the weight is a sensitivity constraint weight; when m =2, the value is a selective constraint weight value; k is the number of the setting principles of protection;
2.3 subjective and objective combination empowerment
As shown in fig. 1, combining the objective weight and the subjective weight obtained in step 2.1 and step 2.2, the objective weight and the subjective weight are combined by the following formula to obtain a final weight:
Figure BDA0002309553130000061
wherein, ω is l Subjective weights obtained for the ith constraint, i.e., the results of equations (4) and (5); v. of l The objective weight obtained for the ith constraint, i.e., the result of equation (6); a is a l The final weight obtained for the ith constraint;
step (3) model solving
And (3) taking the formula (1) as an objective function, and solving the model by adopting a particle swarm optimization method of the self-adaptive learning factor. The concrete process of model solution is as follows:
firstly, a binary character string coding method is adopted to re-interpret the matching mode between each protection, according to the protection matching principle, Z0 is expressed as matching with a first section of adjacent line distance protection, Z1 is expressed as matching with a second section of adjacent line distance protection, zlm is expressed as setting according to the sensitivity related to the line fault, and the method can be divided into three modes according to different actual sizes, namely, model1, model2 and model3, and the code diagram is shown in FIGS. 2-4.
And if the time constant value is t0 or t1, the setting result is matched with the adjacent protection I section when being positioned on the left side of the matching point (Z0, t 0), and the setting result is matched with the adjacent protection II section when being positioned on the left side of the matching point (Z1, t 1), so that the selective constraint is met. And the sensitivity constraint is met when the setting result is positioned at the right side of the matching points (Zlm, t 0) and (Zlm, t 1). When the setting result does not satisfy the selectivity constraint or the sensitivity constraint, a penalty function f (t) = Δ t of the selectivity constraint or the sensitivity constraint in equation (1), otherwise f (t) =0.
At present, in most studies on constant value tuning, a mainstream study mode is to convert a continuity problem into a discreteness problem, and in this embodiment, the model is solved by using the equation (1) as an objective function and using a particle swarm optimization method of an adaptive learning factor.
And (3) taking the setting scheme of the protection as a particle to carry out cyclic solution, wherein the particle speed is represented as the following formula:
Figure BDA0002309553130000062
the coordinates of the particle in the D-dimensional space may represent one potential solution to the problem, and by tracking the historical optimal and global optimal positions of the particle locations, the optimal position of the particle, i.e., the optimal solution to the problem, may be found. Wherein, the position of the ith particle in the D-dimensional search space (i.e. the coordinates of the D-dimensional space) can be expressed as: x i =(x i1 ,x i2 ...x iD ) (ii) a The optimal point of the history is P i =(p i1 ,p i2 ,...p iD ) (ii) a The velocity of the ith particle is expressed as: v i =(v i1 ,v i2 ...v iD ) (ii) a The historical optimal points of the whole particle swarm are as follows: p g =(p g1 ,p g2 ,...p gD )。
Wherein i =1,2 … n; d =1,2 … D; w is the inertial weight, which acts to balance the global search and the local search; and rand () represents random numbers evenly distributed in [0,1 ].
In the embodiment, the solution is carried out by adopting a particle swarm method of the adaptive learning factor, wherein the learning factor c 1 、c 2 Influence independent awareness and population awareness of particles; making c earlier in the iteration 1 The size is relatively larger, the independence of the particles is enhanced, and therefore the global search capability is enhanced; iterative late stage c 2 Relatively larger, enhances the group consciousness of particles, strengthens the capability of local search, improves the convergence rate of the algorithm and learns the factor c 1 、c 2 Is determined by the following formula:
c 1 =a+bcos(kπ/itermax) (9)
c 2 =c-dcos(kπ/itermax) (10)
wherein k is the current iteration number, itermax is the maximum iteration number, and a, b, c, d are constants.
As shown in fig. 3, the adaptive learning factor particle swarm optimization solving steps of this embodiment are as follows: and (1) representing the matching state of each protection by using binary character strings in combination with a code graph, and connecting the binary character strings of each protection to form a particle, wherein the particle represents a set of possible fixed values of the whole network protection device. And (2) loading initial data, including a network structure, an action fixed value, time and particle swarm algorithm parameters, initializing a particle swarm for protection codes by using a binary string, and endowing an initial position and a speed to each particle.
Step (3) calculating the fitness value of each particle according to the formula (1)
Step (4), updating the position, speed and learning factor of the particle
Compared with the historical optimal particles and the global optimal particles, the particle speed, the position and the learning factor are updated according to the formulas (8), (9) and (10).
Step (5) iteration: and determining whether the iteration is finished according to the constraint conditions, the fitness value, the iteration times and the like. If yes, turning to the step (6); if not, go to step (3).
And (6) stopping iteration and outputting a global optimal fitness value and a protection scheme.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and should not be taken as limiting the scope of the present invention, which is intended to cover any modifications, equivalents, improvements, etc. within the spirit and scope of the present invention.

Claims (4)

1. A constant value tuning method based on self-adaptive learning factor particle swarm is characterized in that: the method comprises the following steps:
step (1) establishing a mathematical model of timing time-delay protection
And (3) establishing a mathematical model of the timing time-limited delay protection by taking the shortest setting time of the protection delay period in the whole system as a target function:
Figure FDA0003879246950000011
in the formula, M is the setting time of the protection delay period; t is t ij To protect the jth delay action time; alpha, beta, chi and delta are respectively the weight of the level difference constraint, the sensitivity constraint, the selectivity constraint and the load constraint; f. of int (t)、f sen (t)、f sel (t)、f load (t) penalty functions of level difference constraint, sensitivity constraint, selectivity constraint and load constraint with respect to time are respectively set, and k is a constant;
step (2), the constraint conditions in the model are weighted through subjective weighting and objective weighting
2.1 Objective empowerment
For a strongly-connected power grid structure, the priority of the sensitivity is greater than the selectivity when a protection scheme is prepared; in the weakly-connected power grid structure, the priority of selectivity is greater than the sensitivity; for being at n i Protection i in a simple loop, the line to which the bus to which it is connected has l i The grid vulnerability factors are as follows:
η i =1/(n i ×l i ) (2)
Figure FDA0003879246950000012
wherein eta is a power grid vulnerability coefficient, and objective weights of sensitivity and selectivity constraints are as follows:
Figure FDA0003879246950000013
Figure FDA0003879246950000021
wherein c and d are constants, v βij 、v χij Respectively representing the sensitivity of the ith protection time period and the weight of the selective constraint;
2.2 subjective empowerment
Grading all constraint conditions of different protections, and carrying out subjective empowerment on the constraint conditions in the model by considering the subjective intention of a user; establishing an AHP judgment matrix R = [ R ] mn ]Wherein r is mn The principle m and n are equal in importance, the greater the numerical value is, the greater the importance of the principle m and n is, the weighted value of each index is calculated according to the matrix R, and the method is carried out according to the following formula:
Figure FDA0003879246950000022
wherein: omega m When m =1, the weight is a sensitivity constraint weight; when m =2, the value is a selective constraint weight value; k is the number of the setting principles of protection;
2.3 subjective and objective combination empowerment
Combining the objective weight and the subjective weight obtained in the step 2.1 and the step 2.2, and combining the objective weight and the subjective weight through the following formula to obtain a final weight:
Figure FDA0003879246950000023
wherein, ω is l The subjective weight obtained for the ith constraint, i.e., the result of equation (6); v. of l The objective weights obtained for the ith constraint, i.e., the results of equations (4) and (5); a is l The final weight obtained for the ith constraint;
step (3) model solving
And (3) taking the formula (1) as an objective function, and solving the model by adopting a particle swarm optimization method of the self-adaptive learning factor.
2. The adaptive learning factor particle population-based fixed-value tuning method according to claim 1, wherein: in the step (3), the concrete process of model solution is as follows:
and (3) taking the setting scheme of the protection as a particle to carry out cyclic solution, wherein the particle speed is represented as the following formula:
Figure FDA0003879246950000031
wherein the position of the ith particle in the D-dimensional search space is represented as: x i =(x i1 ,x i2 ...x iD ) (ii) a The historical optimum point is P i =(p i1 ,p i2 ,...p iD ) (ii) a The velocity of the ith particle is expressed as: v i =(v i1 ,v i2 ...v iD ) (ii) a The historical optimum points of the whole particle swarm are as follows: p g =(p g1 ,p g2 ,...p gD );
Wherein i =1,2 … n; d =1,2 … D; w is the inertial weight, balancing the global search and the local search; rand () represents random numbers evenly distributed in [0,1 ];
wherein the learning factor c 1 、c 2 Influence independent awareness and population awareness of particles; making c earlier in the iteration 1 The size is relatively larger, the independence of the particles is enhanced, and therefore the global search capability is enhanced; iterative late stage of c 2 Relatively larger, enhances the group consciousness of particles, enhances the local search capability, andhigh convergence rate of algorithm, learning factor c 1 、c 2 Determined by the following formula:
c 1 =a+b cos(kπ/itermax) (9)
c 2 =c-d cos(kπ/itermax) (10)
wherein k is the current iteration number, itermax is the maximum iteration number, and a, b, c, d are constants.
3. The adaptive learning factor particle population-based fixed-value tuning method according to claim 1, wherein: in the step (3), firstly, a binary character string coding method is adopted to re-read the matching mode between each two adjacent line protection, and the matching mode can be divided into three modes according to different actual sizes, wherein the three modes comprise matching with a first section of adjacent line distance protection, matching with a second section of adjacent line distance protection and sensitivity setting related to the line fault;
judging whether the position of the setting result meets the selective constraint or the sensitivity constraint; when the setting result does not satisfy the selectivity constraint or the sensitivity constraint, the penalty function f (t) = Δ t of the selectivity constraint or the sensitivity constraint in the equation (1), otherwise f (t) =0.
4. The adaptive learning factor particle population-based fixed-value tuning method according to claim 1, wherein: in formula (1), α =0 and δ =0.
CN201911252950.2A 2019-12-09 2019-12-09 Fixed value tuning method based on self-adaptive learning factor particle swarm Active CN111144623B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911252950.2A CN111144623B (en) 2019-12-09 2019-12-09 Fixed value tuning method based on self-adaptive learning factor particle swarm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911252950.2A CN111144623B (en) 2019-12-09 2019-12-09 Fixed value tuning method based on self-adaptive learning factor particle swarm

Publications (2)

Publication Number Publication Date
CN111144623A CN111144623A (en) 2020-05-12
CN111144623B true CN111144623B (en) 2023-03-31

Family

ID=70517867

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911252950.2A Active CN111144623B (en) 2019-12-09 2019-12-09 Fixed value tuning method based on self-adaptive learning factor particle swarm

Country Status (1)

Country Link
CN (1) CN111144623B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116205190B (en) * 2023-05-05 2023-08-18 湖南大学 IGBT physical model parameter acquisition method and device

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103683226A (en) * 2013-12-04 2014-03-26 深圳供电局有限公司 Method for shortening phase spacing protection overall actuation time
CN104242260A (en) * 2014-08-11 2014-12-24 深圳供电局有限公司 Constant time-lag constant value optimizing method based on risk indicators
CN104933478A (en) * 2015-06-04 2015-09-23 国网山东省电力公司电力科学研究院 Multi-target optimized rectification method of relay protection
CN107133690A (en) * 2017-04-21 2017-09-05 中国水利水电科学研究院 A kind of lake water systems connects engineering proposal preference ordering method
CN107563680A (en) * 2017-10-20 2018-01-09 广东电网有限责任公司电力科学研究院 A kind of distribution network reliability evaluation method based on AHP and entropy assessment
CN108133258A (en) * 2016-12-01 2018-06-08 南京理工大学 A kind of mixing global optimization method
CN108520330A (en) * 2018-02-13 2018-09-11 三峡大学 A kind of probabilistic power distribution network medium-voltage line differentiation planing method of consideration load prediction error
CN109189030A (en) * 2018-10-22 2019-01-11 国网电力科学研究院(武汉)能效测评有限公司 A kind of accumulation of heat tele-control system towards multipotency source supply system
CN109378819A (en) * 2018-10-25 2019-02-22 国网新疆电力有限公司经济技术研究院 The power system voltage partition method and system verified based on spectral clustering and modularity
CN109447393A (en) * 2018-09-13 2019-03-08 西安理工大学 A kind of modified particle swarm optiziation of Power System Economic Load Dispatch
CN109586256A (en) * 2018-12-05 2019-04-05 燕山大学 A kind of power distribution network overcurrent protection method and setting optimization method, optimization system containing distributed generation resource
CN110222973A (en) * 2019-05-31 2019-09-10 国网安徽省电力有限公司经济技术研究院 A kind of integrated energy system evaluation method and system based on optimal weights combination

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10452354B2 (en) * 2016-07-14 2019-10-22 International Business Machines Corporation Aggregated multi-objective optimization

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103683226A (en) * 2013-12-04 2014-03-26 深圳供电局有限公司 Method for shortening phase spacing protection overall actuation time
CN104242260A (en) * 2014-08-11 2014-12-24 深圳供电局有限公司 Constant time-lag constant value optimizing method based on risk indicators
CN104933478A (en) * 2015-06-04 2015-09-23 国网山东省电力公司电力科学研究院 Multi-target optimized rectification method of relay protection
CN108133258A (en) * 2016-12-01 2018-06-08 南京理工大学 A kind of mixing global optimization method
CN107133690A (en) * 2017-04-21 2017-09-05 中国水利水电科学研究院 A kind of lake water systems connects engineering proposal preference ordering method
CN107563680A (en) * 2017-10-20 2018-01-09 广东电网有限责任公司电力科学研究院 A kind of distribution network reliability evaluation method based on AHP and entropy assessment
CN108520330A (en) * 2018-02-13 2018-09-11 三峡大学 A kind of probabilistic power distribution network medium-voltage line differentiation planing method of consideration load prediction error
CN109447393A (en) * 2018-09-13 2019-03-08 西安理工大学 A kind of modified particle swarm optiziation of Power System Economic Load Dispatch
CN109189030A (en) * 2018-10-22 2019-01-11 国网电力科学研究院(武汉)能效测评有限公司 A kind of accumulation of heat tele-control system towards multipotency source supply system
CN109378819A (en) * 2018-10-25 2019-02-22 国网新疆电力有限公司经济技术研究院 The power system voltage partition method and system verified based on spectral clustering and modularity
CN109586256A (en) * 2018-12-05 2019-04-05 燕山大学 A kind of power distribution network overcurrent protection method and setting optimization method, optimization system containing distributed generation resource
CN110222973A (en) * 2019-05-31 2019-09-10 国网安徽省电力有限公司经济技术研究院 A kind of integrated energy system evaluation method and system based on optimal weights combination

Non-Patent Citations (7)

* Cited by examiner, † Cited by third party
Title
Optimal coordination of directional over-current relays using Teaching Learning-Based Optimization (TLBO) algorithm;Manohar Singh 等;《Electrical Power and Energy Systems》;20130319;第50卷;第33-41页 *
The optimal coordination of over-current relay protection in radial network based on Particle Swarm Optimization;Mostafa Kheshti 等;《2016 IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC)》;20161212;第604-608页 *
反时限过流保护整定优化研究;黄超 等;《电力科学与工程》;20161028;第32卷(第10期);第15-20页 *
发电厂继电保护中 IEC 反时限特性级差配合的整定计算方法;颜全椿 等;《电气技术》;20170515(第5期);第63-67页 *
基于主客观赋权法的多目标多属性决策方法;宋冬梅 等;《山东大学学报(工学版)》;20150514;第45卷(第4期);第1-8页 *
基于改进自适应遗传算法的继电保护定值优化;张震 等;《电力学报》;20190404;第34卷(第2期);第167-174页 *
特大型城市电网智能运行控制关键技术研究;刘育权;《中国博士学位论文全文数据库 工程科技Ⅱ辑》;20160715(第7期);第C042-64页 *

Also Published As

Publication number Publication date
CN111144623A (en) 2020-05-12

Similar Documents

Publication Publication Date Title
Cui et al. A novel artificial bee colony algorithm with an adaptive population size for numerical function optimization
TWI665613B (en) Method and device for training human face recognition, electronic device, computer readable storage medium, and computer program product
US20210365782A1 (en) Method and apparatus for generating neural network model, and computer-readable storage medium
US11062199B2 (en) Fraudulent transaction detection method based on sequence wide and deep learning
CN109345027B (en) Micro-grid short-term load prediction method based on independent component analysis and support vector machine
WO2019005611A1 (en) Selective training for decorrelation of errors
CN111784348A (en) Account risk identification method and device
CN111625816A (en) Intrusion detection method and device
CN105488528A (en) Improved adaptive genetic algorithm based neural network image classification method
CN105260785B (en) Logistics distribution vehicle path optimization method based on improved cuckoo algorithm
CN106610867B (en) On-chip network task scheduling method and device
CN112138403B (en) Interactive behavior recognition method and device, storage medium and electronic equipment
CN111144623B (en) Fixed value tuning method based on self-adaptive learning factor particle swarm
CN113011603A (en) Model parameter updating method, device, equipment, storage medium and program product
CN111881439B (en) Recognition model design method based on antagonism regularization
CN107707553B (en) Weak password scanning method and device and computer storage medium
CN107357776B (en) Related word mining method and device
CN114419884B (en) Self-adaptive signal control method and system based on reinforcement learning and phase competition
CN115829024A (en) Model training method, device, equipment and storage medium
CN111881972A (en) Black product user identification method and device, server and storage medium
CN109492816B (en) Coal and gas outburst dynamic prediction method based on hybrid intelligence
CN108053328B (en) Method for detecting requirements of calling number on screen-breaking insurance service
KR20220170333A (en) Human body and hand association methods, devices, devices and storage media
CN102750490A (en) Virus detection method based on collaborative immune network evolutionary algorithm
CN108133240A (en) A kind of multi-tag sorting technique and system based on fireworks algorithm

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant