Mixed integer programming method considering N-1 security constraints for bottom-preserving net rack
A mixed integer programming, security constraint technology, applied in the direction of AC network voltage adjustment, AC network with the same frequency with different sources, complex mathematical operations, etc. , the effect of strong robustness and high computational efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0069] In this embodiment, a mixed integer programming method considering the N-1 safety constraints of the bottom-guaranteed grid, such as figure 1 shown, including the following steps:
[0070] S1: Collect grid data and build a complete grid model based on the grid data.
[0071] In this embodiment, as figure 2 The IEEE5 node system is shown as an example.
[0072] S11: Distinguish the grid area to be searched from other grid areas, and reorder the nodes and lines.
[0073] S12: Collect data, including line data, substation data, transformer data, power plant data, tie line data, line reinforcement cost data, substation maintenance cost data and power plant operating cost data.
[0074] S13: data sorting, sorting the data collected in step S12 into the data of node load power, power plant output power, line capacity, generator capacity, node load of the required bottom-guaranteed grid, important lines and important power plants.
[0075] If there is switching power in ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


