袁泉, 孙宇军, 张蔷, 王子强, 李鹏, 赖晓文. 考虑安全约束耦合辨识的日前发电计划求解[J]. 电力系统自动化, 2022, 46(21): 143-151.
引用本文: 袁泉, 孙宇军, 张蔷, 王子强, 李鹏, 赖晓文. 考虑安全约束耦合辨识的日前发电计划求解[J]. 电力系统自动化, 2022, 46(21): 143-151.
YUAN Quan, SUN Yujun, ZHANG Qiang, WANG Ziqiang, LI Peng, LAI Xiaowen. Day-ahead Generation Schedule Solving Considering Identification of Security Constraint Coupling[J]. Automation of Electric Power Systems, 2022, 46(21): 143-151.
Citation: YUAN Quan, SUN Yujun, ZHANG Qiang, WANG Ziqiang, LI Peng, LAI Xiaowen. Day-ahead Generation Schedule Solving Considering Identification of Security Constraint Coupling[J]. Automation of Electric Power Systems, 2022, 46(21): 143-151.

考虑安全约束耦合辨识的日前发电计划求解

Day-ahead Generation Schedule Solving Considering Identification of Security Constraint Coupling

  • 摘要: 日前发电计划的求解通常是先不考虑安全约束获得一个初始解,然后再将越限的安全约束添加至发电计划模型中进行迭代计算。如果仅考虑越限约束进行求解,则可能引起新的约束越限,由此导致迭代计算次数增加。为改进安全约束反馈机制,提出了一种约束耦合关系辨识的方法,并将其用于辅助发电计划的求解。首先,基于安全域对现货市场背景下日前发电计划的闭环求解过程进行解析;然后,提出了安全约束耦合距离的概念,量化表达了越限的安全约束与其他未越限的安全约束之间的耦合关系,并且设计了耦合距离的适应性解法;最后,将安全约束耦合关系的辨识纳入日前发电计划闭环求解框架,进而利用迭代的过程信息来发现潜在的安全越限约束,辅助分析电网运行中不同约束的耦合程度。基于IEEE 118节点系统和IEEE 300节点系统的算例分析,验证了所提方法的有效性和适用性。

     

    Abstract: The solving of the day-ahead generation schedule is generally to obtain an initial solution without consideration of the security constraints, and then the security-violated constraints are included in the generation scheduling model for iterative calculation. If only the security-violated constraints are considered in the solution, the new security-violated constraints will be generated with the increase of iterative calculation numbers. To improve the security constraint feedback mechanism, an identification method of the constraint coupling relation is proposed and applied the background of spot market schedule solving.Firstly, the closed-loop solving procedure of day-ahead generation schedules in the background of spot market is analyzed based on the security region. Secondly, the concept of coupling distance of security constraints is proposed, quantitatively depicting the coupling relations between the security-violated constraints and non-security-violated constraints. Besides, the adaptive solving method for coupling distance is designed. Finally, the identification of security constraint coupling relationship is included in the closed-loop solving framework of day-ahead generation schedules, and then the iterative process information is used to find the potential security-violated constraints, assisting the analysis of the coupling degree of different constraints in power system operation. Case studies of the IEEE 118-bus and IEEE 300-bus systems verify the effectiveness and applicability of the proposed method.

     

/

返回文章
返回