Method and system for calculating dynamic wind power penetration power limit

A technology that penetrates power and calculation methods, and is applied to wind power generation, electrical components, circuit devices, etc., and can solve problems such as the inability to determine reliable wind power access capacity

Active Publication Date: 2018-06-29
NORTH CHINA ELECTRIC POWER UNIV (BAODING)
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the purpose of the present invention is to provide a dynamic wind power breakthrough power limit calculation method and system to solve the technical problem that the existing technology cannot determine the reliable wind power access capacity so that wind power can safely participate in system recovery

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for calculating dynamic wind power penetration power limit
  • Method and system for calculating dynamic wind power penetration power limit
  • Method and system for calculating dynamic wind power penetration power limit

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] figure 1 A flow chart of a method for calculating a dynamic wind power breakthrough power limit provided by an embodiment of the present invention is shown.

[0061] Such as figure 1 As shown, a method for calculating a dynamic wind power breakthrough power limit provided by this embodiment includes the following steps:

[0062] Step S101, expressing the transient security constraints of the power system in the form of a binary table to obtain a binary table of transient security constraints, wherein the binary table includes thresholds and time limits;

[0063] The binary table of transient security constraints is a unified expression form of power system transient security constraints. First, the power system transient security is divided into transient voltage security, transient power angle security and transient frequency security, and the transient voltage (frequency) security is further divided into transient voltage (frequency) Stability and acceptability of ...

Embodiment 2

[0096] Figure 4 A schematic diagram of a system for calculating a dynamic wind power breakthrough power limit provided by an embodiment of the present invention is shown.

[0097] Such as Figure 4 As shown, a dynamic wind power breakthrough power limit calculation system provided in this embodiment includes a binary table generation module 10, an acquisition module 20, and a calculation module 30;

[0098]The binary table generation module 10 is used to express the transient security constraints of the power system in the form of a binary table to obtain a binary table of transient security constraints, wherein the binary table includes a threshold and a time limit;

[0099] An acquisition module 20, configured to acquire predicted wind power output data, and obtain the worst wind power output scenario according to the predicted wind power output data;

[0100] The calculation module 30 is used to calculate the dynamic wind power penetration power limit of the power system...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a system for calculating dynamic wind power penetration power limit, and relates to the technical field of security defense and restoration control of a power system. The method comprises the following steps of expressing the transient security constraints of the power system in a binary table way, so as to obtain a binary table of transient security constraints, wherein the binary table comprises threshold values and time limits; acquiring the predicted wind power output data, and obtaining the most adverse wind power output scene according to the predictedwind power output data; under the most adverse wind power output scene, calculating the dynamic wind power penetration power limit of the power system according to the vector of number of wind poweraccessing sets and the binary table of transient security constraints; fully considering the change of the restoration scene of the large-power failure system, and accounting the transient security constraints of the system, so as to determine the reliable wind power accessing capacity, thereby enabling the wind power to safely participate in system restoration.

Description

technical field [0001] The invention relates to the technical field of power system security defense and recovery control, in particular to a method and system for calculating dynamic wind power penetration power limit. Background technique [0002] The increasing wind power penetration rate has brought serious challenges to the safe and stable operation of the power system. Different from traditional water and thermal power units, the speed of variable-speed wind turbines is decoupled from the frequency of the power system, and does not have inertial response and auxiliary frequency modulation capabilities. Substituting large-scale wind power for some traditional power sources will reduce the inertia of the power system and weaken its frequency regulation capabilities ; Moreover, wind power has the characteristics of discontinuity and volatility, and severe wind power climbing events may cause the system to become unstable due to power shortage, and then cause a major black...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H02J3/38
CPCH02J3/386H02J2203/20Y02E10/76
Inventor 刘艳叶茂
Owner NORTH CHINA ELECTRIC POWER UNIV (BAODING)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products