Unlock instant, AI-driven research and patent intelligence for your innovation.

Evaluation Method and System for Power System Vulnerabilities Based on Tight Constraint Identification

A power system and evaluation method technology, applied in electrical components, circuit devices, AC network circuits, etc., can solve the problems of cumbersome calculation process, calculation error, unable to give the functional relationship between component failure rate, repair rate and its capacity, etc. , to achieve the effect of improving computing efficiency and ensuring accuracy

Active Publication Date: 2020-04-14
SHANDONG UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] (1) For the formula and At present, it is still impossible to give the functional relationship between the failure rate, repair rate and capacity of the component. It can only be obtained through statistical data interpolation fitting, and then its partial derivative, which will inevitably bring calculation errors and consume calculations. resource
[0010] (2) For the formula term, the solution method is given by calculating the Lagrange multipliers of each equality constraint and inequality constraint in the optimal load shedding model based on DC power flow to obtain The calculation process is cumbersome and will inevitably take up a lot of computing resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Evaluation Method and System for Power System Vulnerabilities Based on Tight Constraint Identification
  • Evaluation Method and System for Power System Vulnerabilities Based on Tight Constraint Identification
  • Evaluation Method and System for Power System Vulnerabilities Based on Tight Constraint Identification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0039] It should be pointed out that the following detailed description is exemplary and intended to provide further explanation to the present application. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs.

[0040] It should be noted that the terminology used here is only for describing specific implementations, and is not intended to limit the exemplary implementations according to the present application. As used herein, unless the context clearly dictates otherwise, the singular is intended to include the plural, and it should also be understood that when the terms "comprising" and / or "comprising" are used in this specification, they mean There are features, steps, operations, means, components and / or combinatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a power system vulnerability evaluation method and system based on tight constraint identification, comprising the following steps: according to an optimal load reduction modelbased on DC power flow, calculating whether an inequality constraint represented by each element under a specific scene is a tight constraint, and calculating a tight constraint index of each elementaccording to the inequality constraint; and calculating the tight constraint index of each component in the power system evaluated in a generalized sense, and ranking, then determine the components which influence the reliability of the power system more than the set value from the capacity point of view, and then evaluating the vulnerable nodes in the power system from the capacity point of view. The large power system vulnerability point evaluation model based on the tight constraint identification method provided by the invention has certain guiding significance for the planning, operationand transformation of the power system.

Description

technical field [0001] The invention relates to a method and system for evaluating vulnerable points of a power system based on tight constraint identification. Background technique [0002] Vulnerable points in the power system refer to the nodes that play a greater role in the failure of the power system. One of the functions of power system reliability assessment is to locate the vulnerable nodes of the power system. However, traditional reliability assessment methods can only obtain the overall reliability index of the power system, and it is difficult to identify the vulnerable nodes that clamp the reliability bottleneck of the system. After the vulnerable nodes of the power system are effectively identified: in the planning of the power system, priority can be given to increasing the backup of vulnerable points; when the maintenance resources are limited, further priority should be given to the maintenance strategy for the vulnerable links of the power system to maximi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H02J3/00G06F30/20G06F111/10
CPCG06F30/20H02J3/00H02J2203/20
Inventor 王勇周颖健王博仑
Owner SHANDONG UNIV