Unlock instant, AI-driven research and patent intelligence for your innovation.

Energy storage device laying method based on regional vulnerability analysis of energy internet

An energy Internet and vulnerability technology, applied in the direction of climate sustainability, data exchange network, exchange network load balancing, etc., can solve problems such as the deployment of distributed energy storage devices, achieve efficient sharing, comprehensive support, Improve the effect of safe and smooth operation

Active Publication Date: 2020-08-21
SICHUAN HUATAI ELECTRIC
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, one of the purposes of the present invention is to solve the problem of deploying distributed energy storage devices for the Energy Internet, so as to improve the rationality of the deployment locations of distributed energy storage devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Energy storage device laying method based on regional vulnerability analysis of energy internet
  • Energy storage device laying method based on regional vulnerability analysis of energy internet
  • Energy storage device laying method based on regional vulnerability analysis of energy internet

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0020] figure 1 A schematic flowchart of an exemplary embodiment of an energy storage device deployment method based on Energy Internet sub-area vulnerability analysis of the present invention is shown.

[0021] In an exemplary embodiment of the present invention, the method for deploying distributed energy storage devices based on the regional vulnerability analysis of Energy Internet can be realized through the following steps:

[0022] Step 1. Collect the data required by the Energy Internet when the distributed energy storage device is deployed. The data includes the power network topology information and power characteristic information of the Energy Internet.

[0023] Specifically, when deploying distributed energy storage devices for Energy Internet objects, various data required for the deployment of distributed energy storage locations can be collected systematically. For example, these data can include power network related topology and power characteristic informat...

Embodiment 2

[0061] In another exemplary embodiment of the present invention, the method for deploying distributed energy storage devices based on energy Internet sub-area vulnerability analysis is carried out using steps similar to those in Embodiment 1 above, except for sub-step 4.9.

[0062] Specifically, for sub-step 4.9, iterating from step 4.2, the selection of energy failure nodes (for example, the selection in sub-step 4.2) to complete node traversal in the energy subnetwork or to achieve enough random sampling method, and record the energy failure nodes that occur each time; after randomly selecting or selecting and traversing a single node as a failure energy node for simulation, continue to select multiple nodes as a group of failure energy nodes for simulation, and each simulation selected The number of faulty energy nodes shall not exceed 3, and the energy faulty nodes that occur each time shall be recorded. Similarly, when multiple energy failure nodes are selected for simula...

Embodiment 3

[0064] In another exemplary embodiment of the present invention, the method for deploying distributed energy storage devices based on the vulnerability analysis of Energy Internet sub-regions is carried out using steps similar to those in the above-mentioned embodiment 1, except that step 4 is carried out through the following sub-steps accomplish:

[0065] Sub-step 4a, obtain the capacity information of all energy links in each energy subnet and each information subnet, the topology information and mapping relationship information of energy nodes and information nodes, and at the same time allocate The energy transmission demand of each energy node of . For example, the allocation of the energy transmission requirements of each energy node in each energy subnet can be obtained through the above formula (1).

[0066] Sub-step 4b, select an energy node randomly or in a predetermined order as an energy failure node, allocate the energy transmission requirements of the energy fa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a distributed energy storage device distribution method based on regional vulnerability analysis of the energy internet. The method comprises the following steps: collecting data required by the energy internet when distributed energy storage devices are distributed, partitioning energy nodes in the energy internet based on power network topology information and power characteristic information to obtain a plurality of energy quantum networks, and initially distributing the number of the distributed energy devices required by each energy quantum network; carrying out vulnerability analysis based on information physical fusion simulation on each energy quantum network, and selecting a key node with high vulnerability; and arranging the distributed energy storage device near the key node. According to the invention, safe and stable operation of an energy system in a region can be guaranteed, efficient sharing of energy between regions is realized, comprehensive support of distributed energy storage to the whole network is realized through cooperative control of the distributed energy storage devices, the income / investment ratio is maximized, and a solid guarantee is provided for improvement of the overall performance of the system.

Description

technical field [0001] The invention belongs to the field of energy production and consumption, and in particular relates to a distributed energy storage device deployment method applied to the energy Internet. Background technique [0002] Usually, in the Energy Internet architecture, energy storage / power consumption buffer is an important component of the Energy Internet architecture to break the synchronization between power supply and electricity consumption. The energy storage device is both a load and a power source. The power supply is intelligent and can predict the power supply status and send relevant information; the load is also intelligent and can adjust its work according to the received power supply information. They must use control algorithms to decide whether to charge for future use or discharge for current use, based on the amount or price of electricity from the grid and distributed generation. Now electricity consumption is equivalent to advancing the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H02J3/28H04L12/24
CPCH02J3/28H04L41/12Y02B70/30Y04S20/20
Inventor 谢伟明阳阳曹军威杨洁郭顺强
Owner SICHUAN HUATAI ELECTRIC