Unlock instant, AI-driven research and patent intelligence for your innovation.

Energy storage device deployment method based on regional vulnerability analysis of energy internet

An energy internet, vulnerability technology, applied in data exchange network, climate sustainability, AC network load balancing, etc., can solve problems such as the deployment of distributed energy storage devices

Active Publication Date: 2020-10-27
SICHUAN HUATAI ELECTRIC
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, one of the purposes of the present invention is to solve the problem of deploying distributed energy storage devices for the Energy Internet, so as to improve the rationality of the deployment locations of distributed energy storage devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Energy storage device deployment method based on regional vulnerability analysis of energy internet
  • Energy storage device deployment method based on regional vulnerability analysis of energy internet

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0020] figure 1 A schematic flowchart of an exemplary embodiment of an energy storage device deployment method based on Energy Internet sub-area vulnerability analysis of the present invention is shown.

[0021] In an exemplary embodiment of the present invention, the method for deploying distributed energy storage devices based on the regional vulnerability analysis of Energy Internet can be realized through the following steps:

[0022] Step 1. Collect the data required by the Energy Internet when the distributed energy storage device is deployed. The data includes the power network topology information and power characteristic information of the Energy Internet.

[0023] Specifically, when deploying distributed energy storage devices for Energy Internet objects, various data required for the deployment of distributed energy storage locations can be collected systematically. For example, these data can include power network related topology and power characteristic informat...

Embodiment 2

[0061] In another exemplary embodiment of the present invention, the method for deploying distributed energy storage devices based on energy Internet sub-area vulnerability analysis is carried out using steps similar to those in Embodiment 1 above, except for sub-step 4.9.

[0062] Specifically, for sub-step 4.9, iterating from step 4.2, the selection of energy failure nodes (for example, the selection in sub-step 4.2) to complete node traversal in the energy subnetwork or to achieve enough random sampling method, and record the energy failure nodes that occur each time; after randomly selecting or selecting and traversing a single node as a failure energy node for simulation, continue to select multiple nodes as a group of failure energy nodes for simulation, and each simulation selected The number of faulty energy nodes shall not exceed 3, and the energy faulty nodes that occur each time shall be recorded. Similarly, when multiple energy failure nodes are selected for simula...

Embodiment 3

[0064] In another exemplary embodiment of the present invention, the method for deploying distributed energy storage devices based on the vulnerability analysis of Energy Internet sub-regions is carried out using steps similar to those in the above-mentioned embodiment 1, except that step 4 is carried out through the following sub-steps accomplish:

[0065] Sub-step 4a, obtain the capacity information of all energy links in each energy subnet and each information subnet, the topology information and mapping relationship information of energy nodes and information nodes, and at the same time allocate The energy transmission demand of each energy node of . For example, the allocation of the energy transmission requirements of each energy node in each energy subnet can be obtained through the above formula (1).

[0066] Sub-step 4b, select an energy node randomly or in a predetermined order as an energy failure node, allocate the energy transmission requirements of the energy fa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method for deploying distributed energy storage devices based on regional vulnerability analysis of Energy Internet, which includes: collecting data required for deployment of Energy Internet at the location of distributed energy storage devices, based on power network topology information and The power characteristic information partitions the energy nodes in the Energy Internet to obtain multiple energy subnets, and initially allocates the number of distributed energy devices required for each energy subnet; performs information-based physical fusion in each energy subnet The vulnerability analysis of the simulation selects the key nodes with high vulnerability; and deploys distributed energy storage devices near the key nodes. The invention can improve the safe and stable operation of the energy system in the guarantee area, realize the efficient sharing of energy between areas, and is also beneficial to realize the comprehensive support of the distributed energy storage for the entire network through the coordinated control of the distributed energy storage device, and maximize the profit / investment ratio, providing a solid guarantee for the overall performance improvement of the system.

Description

technical field [0001] The invention belongs to the field of energy production and consumption, and in particular relates to a distributed energy storage device deployment method applied to the energy Internet. Background technique [0002] Usually, in the Energy Internet architecture, energy storage / power consumption buffer is an important component of the Energy Internet architecture to break the synchronization between power supply and electricity consumption. The energy storage device is both a load and a power source. The power supply is intelligent and can predict the power supply status and send relevant information; the load is also intelligent and can adjust its work according to the received power supply information. They must use control algorithms to decide whether to charge for future use or discharge for current use, based on the amount or price of electricity from the grid and distributed generation. Now electricity consumption is equivalent to advancing the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H02J3/28H04L12/24
CPCH02J3/28H04L41/12Y02B70/30Y04S20/20
Inventor 谢伟明阳阳曹军威杨洁郭顺强
Owner SICHUAN HUATAI ELECTRIC