Unlock instant, AI-driven research and patent intelligence for your innovation.

A method for establishing a power line vulnerability identification model considering the connection of wind farms

An identification model and establishment method technology, applied in the field of power line vulnerability identification model establishment, can solve problems such as not being able to express well, ignoring the network connection mode, not being large, etc.

Active Publication Date: 2018-04-17
HUAQIAO UNIVERSITY
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The traditional power flow transfer entropy can identify those vulnerable lines that undertake large power flow transfer, but it does not take into account the ability of the line to withstand the power flow transfer, and because of the fluctuation of wind power, the line's ability to withstand the power flow transfer is constantly happening. Therefore, the traditional power flow entropy cannot better reflect the fragile characteristics of power lines that take into account the access of wind farms
[0007] 3) The change of the grid structure caused by the connection of wind farms cannot be well expressed through the node degree distribution, because the wind farm is connected to the power grid through the collector line, and for the grid-connected point, the degree distribution The change of the network is not big for the overall network, but this collector line is the only channel for the wind farm to send power, and it undertakes a relatively heavy power flow transmission task and a status of network connectivity.
Because the degree distribution focuses on the local information of nodes, but ignores the network connection mode, it is not accurate in the vulnerability identification of power lines considering the access of wind farms

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for establishing a power line vulnerability identification model considering the connection of wind farms
  • A method for establishing a power line vulnerability identification model considering the connection of wind farms
  • A method for establishing a power line vulnerability identification model considering the connection of wind farms

Examples

Experimental program
Comparison scheme
Effect test

specific example

[0105] Taking the power system analysis software package PSASP (power system analysis software package) of China Electric Power Research Institute as the simulation platform, a wind farm model in Gansu was used as an example to build a wind farm model, and the built model was connected to the IEEE39 node system.

[0106] Such as figure 1 , figure 2 , image 3 As shown, it can be seen that the line vulnerability rankings obtained according to different indicators are not the same. Therefore, under different emphases, the lines show different vulnerability levels.

[0107] figure 1 It shows that the 10th, 11th, 13th, 9th, and 16th lines have higher power flow incremental entropy values, which are reflected in the system as 5-8, 6-7, 7-8, 5-6, 10-11, exist Figure 4 Indicated by "○". In recent days, the line has not been subjected to a large power flow transfer when other lines are disconnected. The power flow transfer on line 5-6 is the smallest among all lines in the syst...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a power line vulnerability identification model building method taking wind farm access into consideration, comprising the following steps: disconnecting a line li; getting the power flow increment entropy index H(i) of the disconnected line li according to the power flow increment Delta Lambda ki borne by other lines lk and the power flow increment allowance Omega k which can be borne by the lines lk at the current time; and disconnecting all the lines in sequence to get a vulnerability identification model. The running state and the vulnerability evaluation index of network topology are both considered. In view of the problem that the traditional power flow transfer entropy cannot capture wind power fluctuation and does not take into consideration the ability of lines to bear power flow increment, the invention puts forward an improved method in which power flow increment allowance is added. Compared with the previous models, the improved power flow increment entropy can sensitively identify lines which do not bear a large amount of power flow transfer but have small transfer allowance.

Description

technical field [0001] The invention relates to the technical field of power system security defense, and more specifically, relates to a method for establishing a power line vulnerability identification model considering the access of wind farms. Background technique [0002] In recent years, cascading tripping and off-grid accidents of large-scale wind power systems at home and abroad have occurred frequently, which has aroused people's attention to the transmission mechanism of grid cascading faults and the vulnerability of power systems. As an extension of the concept of power system security, power system vulnerability reflects the ability of power system to withstand disturbance or failure. In the initial stage of cascading faults, a small number of components fail one after another. In the stage of accident expansion, it is closely related to the weak links in the power system. It is particularly important to quickly identify the weak links that restrict the safe oper...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F19/00
CPCG16Z99/00
Inventor 方瑞明王彦东
Owner HUAQIAO UNIVERSITY