Energy storage device deployment method based on regional vulnerability analysis of energy internet
An energy internet, vulnerability technology, applied in data exchange network, climate sustainability, AC network load balancing, etc., can solve problems such as the deployment of distributed energy storage devices
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0020] figure 1 A schematic flowchart of an exemplary embodiment of an energy storage device deployment method based on Energy Internet sub-area vulnerability analysis of the present invention is shown.
[0021] In an exemplary embodiment of the present invention, the method for deploying distributed energy storage devices based on the regional vulnerability analysis of Energy Internet can be realized through the following steps:
[0022] Step 1. Collect the data required by the Energy Internet when the distributed energy storage device is deployed. The data includes the power network topology information and power characteristic information of the Energy Internet.
[0023] Specifically, when deploying distributed energy storage devices for Energy Internet objects, various data required for the deployment of distributed energy storage locations can be collected systematically. For example, these data can include power network related topology and power characteristic informat...
Embodiment 2
[0061] In another exemplary embodiment of the present invention, the method for deploying distributed energy storage devices based on energy Internet sub-area vulnerability analysis is carried out using steps similar to those in Embodiment 1 above, except for sub-step 4.9.
[0062] Specifically, for sub-step 4.9, iterating from step 4.2, the selection of energy failure nodes (for example, the selection in sub-step 4.2) to complete node traversal in the energy subnetwork or to achieve enough random sampling method, and record the energy failure nodes that occur each time; after randomly selecting or selecting and traversing a single node as a failure energy node for simulation, continue to select multiple nodes as a group of failure energy nodes for simulation, and each simulation selected The number of faulty energy nodes shall not exceed 3, and the energy faulty nodes that occur each time shall be recorded. Similarly, when multiple energy failure nodes are selected for simula...
Embodiment 3
[0064] In another exemplary embodiment of the present invention, the method for deploying distributed energy storage devices based on the vulnerability analysis of Energy Internet sub-regions is carried out using steps similar to those in the above-mentioned embodiment 1, except that step 4 is carried out through the following sub-steps accomplish:
[0065] Sub-step 4a, obtain the capacity information of all energy links in each energy subnet and each information subnet, the topology information and mapping relationship information of energy nodes and information nodes, and at the same time allocate The energy transmission demand of each energy node of . For example, the allocation of the energy transmission requirements of each energy node in each energy subnet can be obtained through the above formula (1).
[0066] Sub-step 4b, select an energy node randomly or in a predetermined order as an energy failure node, allocate the energy transmission requirements of the energy fa...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

