Centralized security analysis method, device and system for multi-power plants and multi-component electricity decentralized transactions

A security analysis and multi-component technology, applied in data processing applications, forecasting, instruments, etc., can solve problems that are difficult to meet the operation mode of the power grid, affect the production plan of market members, and market fairness issues, so as to avoid disorderly development and guarantee The effect of reliable power supply and enhanced guarantee capability

Active Publication Date: 2021-07-13
NARI TECH CO LTD +2
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, security check is a post-event adjustment link for decentralized transaction results to ensure the security of the power grid. The adjustment of transaction power will affect the production plans of market members, and frequent transaction adjustments will cause market fairness.
At the same time, the mid- and long-term power calibration is mainly based on the experience of operators, and the feasibility of transactions is judged by estimating the limit value of cross-section transmission power. This method has been difficult to meet the increasingly complex power grid operation mode.
Furthermore, the completion progress requirements of each component of the power plant trading power are different. When the trading power cannot meet the security constraints of the power grid, the power adjustment of the power plant needs to consider the coordination between multi-component trading power, and there is currently a lack of corresponding supporting technologies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Centralized security analysis method, device and system for multi-power plants and multi-component electricity decentralized transactions
  • Centralized security analysis method, device and system for multi-power plants and multi-component electricity decentralized transactions
  • Centralized security analysis method, device and system for multi-power plants and multi-component electricity decentralized transactions

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0078] In the embodiment of the present invention, a centralized security analysis method for the decentralized transaction of multi-power plants and multi-component electricity is provided, which is aimed at the provincial power grid; Medium and long-term electricity trading, providing security analysis services before the transaction, judging whether the transaction electricity can be executed, locating the cause after the electricity exceeds the limit, and how to reasonably adjust the electricity transaction after the limit is exceeded.

[0079] In the embodiment of the present invention, the centralized security analysis method for multi-power plants and multi-component electricity decentralized transactions is mainly based on the annual electricity monthly arrangement plan data and monthly electricity market transaction plan data and monthly electricity market transaction plan data reported by power plants in rolling reports, and based on system load forecasting , maintena...

Embodiment 2

[0120] Based on the same inventive concept as in Embodiment 1, the embodiment of the present invention provides a centralized security analysis device for multi-power plant multi-component electricity decentralized transactions, including:

[0121] The first acquisition module is used to obtain the annual power monthly arrangement plan data reported by the power plant, the monthly power market transaction plan data and the multi-component power contracts;

[0122] The second acquisition module is used to obtain a multi-power plant centralized power security analysis and optimization model. The constraints of the multi-power plant centralized power security analysis and optimization model include: system operation constraints, power grid security constraints, and unit operation constraints; the optimization objective is: Minimize the sum of positive power deviation and negative power deviation between the total power generation of the power plant and the total planned power;

...

Embodiment 3

[0129]Based on the same inventive concept as that of Embodiment 1, the embodiment of the present invention provides a centralized security analysis system for multi-power plants and multi-component electricity decentralized transactions, including:

[0130] a processor adapted to implement the instructions; and

[0131] The storage device is adapted to store a plurality of instructions, and the instructions are adapted to be loaded by the processor and execute the steps described in any one of Embodiment 1.

[0132] The system of the present invention includes annual, monthly, day-ahead, intra-day, real-time, and multiple cycle power grid security analysis functions. The long-term power trading is carried out, and the calculation boundary of the system is provided for the security analysis of the day. Mid-to-long-term security analysis is that the power dispatching agency conducts security analysis and calculations in subsequent months based on grid operation information and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a centralized safety analysis method, device and system for multi-power plants and multi-component power decentralized transactions, including: power plants rollingly report annual power monthly arrangement plan data and monthly power market transaction plan data; establish a multi-power plant centralized Electricity security analysis and optimization model; based on the data reported by the power plant, the power plant’s multi-component power balance constraint and component power adjustment range constraint model are established; in the objective function, different adjustment costs are set for the power plant’s multi-component power plan; The start-stop status of the time period and the deviation of the multi-component power plan of the power plant; the conclusion of the mid- and long-term power safety analysis is released to the power plant. The present invention provides security analysis services before transactions for medium and long-term physical transactions of power generation enterprises, provides security analysis conclusions and adjustment suggestions for decentralized transactions of multi-component electricity in multiple power plants, provides market transaction references, and guides market members to continuously revise medium and long-term physical transactions. Guarantee the enforceability of various power transactions.

Description

technical field [0001] The invention belongs to the technical field of electric power system dispatching automation, and in particular relates to a centralized security analysis method, device and system for distributed transactions of multi-component electric power of multi-power plants. Background technique [0002] The new round of power system reform has clarified the goal of my country's power market construction: to gradually establish a power market that avoids risks through medium and long-term transactions, discovers prices through the spot market, and has a complete range of transactions and complete functions. At the current stage where the electricity spot market has not yet been established, the main form of electricity trading is medium and long-term electricity trading. The types of transactions in the medium and long-term market have been continuously enriched, and such types as direct electricity transactions and contracted electricity transfer transactions ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q10/04G06Q10/06G06Q50/06
CPCG06Q10/04G06Q10/06312G06Q50/06
Inventor 李利利涂孟夫王岗汪志成丁恰昌力陈文浩周文俊胡勇吴海伟
Owner NARI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products