Fast model generating and solving method for security-constrained power system operation simulation

Information

  • Patent Grant
  • 10289765
  • Patent Number
    10,289,765
  • Date Filed
    Friday, August 26, 2016
    8 years ago
  • Date Issued
    Tuesday, May 14, 2019
    5 years ago
Abstract
The present disclosure provides a fast model generating and solving method for security-constrained power system operation simulation, which includes: obtaining information of all branches and nodes which are involved during operation simulation time period, calculating original-node impedance matrix, load shifting distribution factor original matrix and generator shifting distribution factor original matrix of all involved branches; correcting the load shifting distribution factor original matrix and the generator shifting distribution factor original matrix according to the on-off state of branches; obtaining output of each generator unit at each time period according to no-security-constraint unit commitment model, and determining overload of each branch again; solving iteratively until no branch is overloaded, and obtaining output of each generator unit at each time period under security constraint of operation simulation for the current simulation day, performing operating simulation for the rest simulation days to obtain security-constraint operation simulation result for the whole year.
Description
CROSS-REFERENCE TO RELATED APPLICATION

This application claims priority to and benefits of Chinese Patent Application Serial No. 201510611268.3, filed with the State Intellectual Property Office of P. R. China on Sep. 24, 2015, the entire contents of which are incorporated herein by reference.


FIELD

The present disclosure relates to power-system analyzing field, and more particular, to a fast model generating and solving method for security-constrained power system operation simulation.


BACKGROUND

In recent years, with the increasing scale of power system, the operation complexity of power grid has been greatly increased as a result of many factors including the addition of intermittent energy resources, such as wind energy and solar energy, the construction of large-scale multi-level inter-basin hydropower plants, the integration of various-type powers, such as nuclear power, pumped storage power, and gas-turbine power, and the structure of power grid with AC-DC hybrid transmission over long distance. In the conventional power-system planning, in order to evaluate the adaptability and economy of future electricity planning, operating position of every generator unit on the load curve is arranged through production simulation technology. However, with the increasing variety of power supply structure and complexity of power grid structure, the power system operation is involved with many various constraints, such as peak load regulation, generator on-off constraints and securities of branch and interface power flow. The conventional production simulation technology is often difficult to consider all these operational constraints during practical operations. Therefore, a new technology called power system operation simulation appears. That is, for a given power planning scheme, the unit commitment model is used to consider all the operational constraints in the long-time operations of power system. This can refine the evaluation indexes for the current power planning program from many aspects, such as adaptability, economy and environmental protection in the future operation.


Currently, power system operation simulation technology without consideration of system security constraints is relatively mature, and some software products have appeared in abroad. Riso laboratory in Denmark has developed an operation simulation software for the power system, named Wilmar (WEBER Christoph, MEIBOM Peter. BARTH Rudiger, et al. WILMAR: A Stochastic Programming Tool to Analyze the Large-Scale Integration of Wind Energy. In: KALLRATH Josef. PARDALOS Panos M. REBENNACK Steffen, et al., Optimization in the Energy Industry, Energy Systems: Springer Berlin Heidelberg, 2009. p 437-458). This software evaluates system operation cost by hourly simulating the operation and is applied in the wind power integration planning and pumped storage planning. However, this software can only consider simulation of power source and does not model the power grid. Therefore, it cannot consider operation security constraints, such as securities of branch and interface power flow of the power system. GE Company has developed a software named MAPS which is able to achieve the chronological operation simulation of multi-area connected power systems considering the power delivery security constraints between different areas (http://www.geenergyconsulting.com/practice-area/software-products/maps). Oxford University has developed a software named Switch which can achieve similar functions (FRIPP Matthias. Switch: A Planning Tool for Power Systems with Large Shares of Intermittent Renewable Energy. Environmental Science & Technology, 2014, 46(11): 6371-6378.). Although branch power flow limits in the multi-area power system are considered in MAPS and Switch, MAPS and Switch can only divide the power system into several areas or tens of areas. Establishing network-flow model for power delivery between different areas cannot describe the detailed power flow of the power-grid. The simulation results can only analyze the rationality and economy of power supply structure and configuration in each area, and cannot analyze the security, rationality and economy of the power grid planning.


Considering system security constraints in the power system operation simulation brings great challenge to calculation and modeling. It is because that when the scale of the power grid is larger, node and branch of the power system that needs to be considered in the security-constraint power system are increasing. For example, generally, the power system for a middle-scale provincial network includes 100˜200 power generator units, and 1000˜2000 nodes, and 2000˜5000 branches. The amount of decision variables for daily unit commitment model in the operation simulation without considering security constraints will be more than ten thousand, and the number of constraints will be more than twenty thousand. When security constraints are included, the number of constraints will further increase to more than one-hundred thousand. It will cost great calculation and storage resources for such large-scale optimization model. Therefore, the calculation and storage resources become the bottleneck for practical use of the security-constrained power system operation simulation in the large-scale power system.


Therefore, it is needed to propose technologies to rapidly generate and calculate the security-constrained unit commitment model, based on current power system operation simulation technology, in order to increase calculating efficiency of the security-constrained power system operation simulation, which makes the security-constrained power system operation simulation able to apply to large-scale real-world power system. The related art of the present disclosure include:


1) Security-constraint power system operation simulation means that, certain scheduling objectives are selected according to power grid planning and power installed capacity planning with system load prediction and boundary conditions of power system operation formed by primary energy; and power system planning or power system operation mode is evaluated according to operation simulation result after a period of operation of the simulation system under generator unit operation constraints, system branch and interface power flow. Core of the power system operation simulation is to solve the unit commitment model daily or week-by-week and is expressed as mixed integer programming model, as following:

min f(X,I)
s.t. CPT+DIT≤b
F≤GGPT−GDLTF
PT≤PTPT


In the above expressions, P and I are decision variables of the above optimal model. P is vector of output of different types of generator unit at each time period, and its elements are continuous variables. I is vector of state variables of generator units, and it elements are 0-or-1 variables. T is superscript denoting transposition of vector or matrix. The objective f(P,I) is the minimization of the total system operating cost, which includes the fuel, on-off, and load shedding costs. The constraint CPT+DIT≤b is the system operating constraint and generator unit operating constraint. The system operating constraint includes load-generation balance constraint and back-up balance constraint. The generator unit operating constraint includes generator unit output constraint, rate of change of output constraint, generator unit on-off constraint, and electric quantity constraint, etc. C is coefficient matrix in front of the decision variable P corresponding to generator unit output in the above constraints. D is coefficient matrix in front of the decision variable I corresponding to generator unit state in the above constraints, and b is right constant term vector in each above constraint. The constraint F≤GGPT+GDLTF is security constraints of branch and transformer power flow. GG is generator shifting distribution factor. L is vector of node loads. F and F are the upper and lower limits of branch power flow, respectively. The constraint PT≤PTPT is the upper and lower limit constraints of P. T is transposition symbol. The detailed model of the power system operation simulation can be referred to the paper (Ning Zhang, Chongqing Kang, Daniel S. Kirschen, Qing Xia, Weimin Xi, Junhui Huang, Qian Zhang: Planning pumped storage capacity for wind power integration. IEEE Transactions on Sustainable Energy, 2013, 4(2): 393-401).


2) Generator shifting distribution factor matrix and load shifting distribution factor matrix:


The generator shifting distribution factor matrix means sensitivity of the generator output to the branch power flow. The load shifting distribution factor matrix means sensitivity of the node load to the branch power flow. If there are K branches, N nodes and M generator units in the power system, the generator shifting distribution factor GG and the load shifting distribution factor GD can be expressed as following:








G
G

=

[




g
11




g
12







g

1

M







g
21




g
22







g

2

M





















g

K





1





g

K





2








g
KM




]


,


G
D

=


[




g
11




g
12







g

1

N







g
21




g
22







g

2

N





















g

K





1





g

K





2








g
KN




]

.






There are K rows and M columns in matrix GG. glm is sensitivity of generator unit m to branch l. There are K rows and N columns in matrix GD. gln is sensitivity of node n to branch l. If output vector X of all generator units and load L of all nodes are known, then branch power flow can be obtained by the matrix GG and GD, as following:

F=GGPT−GDLT.


In the above expression, F is vector of branch power flow.


3) Mixed integer programming optimal solving algorithm: this algorithm can give optimal solution of the model using computer to solve the mixed integer programming optimal problem.


SUMMARY

Embodiments of the present disclosure provides a fast model generating and solving method for security-constrained power system operation simulation, to solve a problem of low calculating efficiency caused by a larger-scale optimal model in the security-constrained power system operation simulation. Firstly, the method generates a load shifting distribution factor matrix and a generator shifting distribution factor matrix corresponding to full power system topology, and then corrects the load shifting distribution factor matrix and the generator shifting distribution factor matrix according to on-off state of branches in each day. The method can avoid recalculation for each day to improve modeling efficiency of the unit commitment model. Meanwhile, when solving the unit commitment model, the method uses useful security-constraints recognition technology to only introduce the useful security constraints to the unit commitment model. This improves solving efficiency of the unit commitment model.


In our implementation, the fast model generating and solving method for security-constrained power system operation simulation includes following steps: 1) obtaining information of all branches and nodes which are involved during operation simulation time period, calculating original-node impedance matrix, load shifting distribution factor original matrix and generator shifting distribution factor original matrix of all involved branches according to connections between the branches and the nodes and reactance of each branch;


2) starting operation simulation calculation day-by-day to obtain on-off state of branches in a current simulation day, correcting the load shifting distribution factor original matrix and the generator shifting distribution factor original matrix according to the on-off state of branches to obtain load shifting distribution factor matrix and generator shifting distribution factor matrix in the current simulation day after considering the on-off state of branches;


3) obtaining output of each generator unit at each time period using a mixed integer programming algorithm according to no-security-constraint unit commitment model, for each time period, calculating each branch power flow according to the output of each generator unit at each time period and node loads, determining overload of each branch according to the branch power flow and branch power flow limits; generating security constraint in the unit commitment model according to rows of the load shifting distribution factor matrix and the generator shifting distribution factor matrix corresponding for the overloaded branches, obtaining the output of each generator unit at each time period using the mixed integer programming algorithm according to the no-security-constraint unit commitment model again, and then, determining overload of each branch again; solving iteratively until no branch is overloaded, and obtaining output of each generator unit at each time period under security constraint for completion of operation simulation for the current simulation day, performing operating simulation for the rest simulation days to obtain security-constraint operation simulation result for the whole year.


Advantages of the fast model generating and solving method for security-constrained power system operation simulation in the embodiments of the present disclosure follows:


The fast model generating and solving method for security-constrained power system operation simulation is based on the conventional power system operation simulation. The method can calculate the load shifting distribution factor matrix and the generator shifting distribution factor matrix fast in each simulation day and solve the security-constrained unit commitment model fast. Calculations of the security-constrained power system operation simulation can be applied to the large-scale real-world power system by implementing the method in the embodiments of the present disclosure. Indexes, such as adaptability, economy, environmental protection, etc. can be evaluated more accurately in the future implementation of the power system planning. This improves fineness of the power system planning. Therefore, the method in the embodiments of the present disclosure is a promising technique for practical power systems.





BRIEF DESCRIPTION OF THE DRAWINGS

These and other aspects and advantages of embodiments of the present disclosure will become apparent and more readily appreciated from the following descriptions made with reference to the accompanying drawing, in which:


The FIGURE is a flow chart of a fast model generating and solving method for security-constrained power system operation simulation, according to an embodiment of the present disclosure.





DETAILED DESCRIPTION

Reference will be made in detail to embodiments of the present disclosure. The embodiments described herein with reference to drawings are explanatory, illustrative, and used to generally understand the present disclosure. The embodiments shall not be construed to limit the present disclosure. The same or similar elements and the elements having same or similar functions are denoted by like reference numerals throughout the descriptions.


Following are detailed descriptions for a fast model generating and solving method for security-constrained power system operation simulation.


In the fast model generating and solving method, a branch is defined by including transmission lines, cables, transformers and power transmission equipments connected to two buses, and the node is defined by one bus in the security-constrained power system. Number of the branch is K, number of the node is N and number of generator unit is M in the security-constrained power system.


The flow chart of the fast model generating and solving method is shown in the FIGURE. The fast model generating and solving method includes following steps.


Step 1), information of all branches and nodes which are involved during operation simulation time period is obtained, and original-node impedance matrices, load shifting distribution factor original matrices and generator shifting distribution factor original matrices of all involved branches are calculated according to connections between the branches and the nodes and the reactance of each branch.


The step 1) includes following steps:


Step 1.1), generating branch admittance matrix according to the reactance of each branch, as the following expression (1):










y
=

[




1

x
1






























































1

x
l






























































1

x
K





]


;




(
1
)







where y is the branch admittance matrix, xl is reactance of branch l, and l=1, 2, . . . , K, and K is number of the branches:


Step 1.2), generating node-branch incidence matrix and generator-node incidence matrix according to the connections between the branches and the nodes; firstly, generating branch-node incidence matrix Hl for each branch, as the following expression (2), where Hl has N elements. For the l-th branch, the element in Hl corresponding to beginning node i is set to 1 and the element in Hl corresponding to end node j is set to −1:











H
l

=


[


0
1

,





,

1
i

,





,


-
1

j

,





,

0
N


]

T


;




(
2
)







T is superscript denoting transposition of vector or matrix.


generating the node-branch incidence matrix using the branch-node incidence matrix, as the following expression (3):

A=[HlH2 . . . HK]  (3):


setting the node connected to the generator unit with maximum capacity as a relaxation node, deleting the row corresponding to the relaxation node to obtain reduced-order node-branch incidence matrix Ã:


establishing generator-node incidence matrix Rm for each generator, as the following expression (4), where Rm has N elements, for the m-th generator unit, m=1, 2, . . . , M, and, assuming that the m-th generator unit is connected to node i, and the i-th element in Rm is set to 1:











R
m

=


[


0
1

,





,

1
i

,





,

0
N


]

T


;




(
4
)







generating the generator-node incidence matrix using the generator-node incidence matrix, as the following expression (5):

AG=[R1R2 . . . RM]  (5):


deleting the row corresponding to the relaxation node to obtain reduced-order generator-node incidence matrix ÃG;


Step 1.3), obtaining the generator shifting distribution factor original matrix and the load shifting distribution factor original matrix according to the branch admittance matrix, the node-branch incidence matrix and the reduced-order generator-node incidence matrix; calculating the original-node impedance matrix X, load shifting distribution factor original reduced-order matrix {tilde over (G)}D and generator shifting distribution factor original reduced-order matrix {tilde over (G)}G, as the following expressions (6), (7), and (8):

X=(ÃyÃT)−1  (6):
GD=yÃTX  (7);
{tilde over (G)}G={tilde over (G)}DÃG;  (8):


for the relaxation node î, inserting vector whose elements are all equal to zero into columns corresponding to {tilde over (G)}G and {tilde over (G)}D, respectively to obtain the load shifting distribution factor original matrix GD and the generator shifting distribution factor original matrix GG.


Step 2), operation simulation calculation is started day-by-day to obtain on-off state of branches in a current simulation day, and the load shifting distribution factor original matrix and the generator shifting distribution factor original matrix are corrected according to the on-off state of branches to obtain load shifting distribution factor matrix and generator shifting distribution factor matrix in the current simulation day after considering the on-off state of branches.


The step 2) includes following steps:


Step 2.1), defining Ω:{b1, b2 . . . bB} as set of disconnected branches in the current simulation day, and b1 as a current disconnected branch in the power system, and xb1 as impedance of b1, and i as a beginning node of b1, and j as an end node of b1;


Step 2.2), calculating an intermediate variable xb1′ of b1, as the following expression (9):

xb1′=−xb1+Xii+Xjj−Xij−Xji  (9);


where, in the above expression, Xii, Xjj, Xij, and Xji are elements corresponding to the original-node impedance matrix X:


Step 2.3), calculating a correction matrix X′ of node impedance matrix considering the disconnected branch b1, and calculating a node impedance matrix Xb1 considering the disconnected branch b1 according to the correction matrix X′ and the original-node impedance matrix X, as the following expressions (10) and (11):











X


=


1

x

b
1








[





(


X

1

i


-

X

1

j



)



(


X

i





1


-

X

j





1



)






(


X

1

i


-

X

1

j



)



(


X

i





2


-

X

j





2



)









(


X

1

i


-

X

1

j



)



(


X

i





N


-

X

j





N



)








(


X

2

i


-

X

2

j



)



(


X

i





1


-

X

j





1



)






(


X

2

i


-

X

2

j



)



(


X

i





2


-

X

j





2



)









(


X

2

i


-

X

2

j



)



(


X

i





N


-

X

j





N



)






















(


X
Ni

-

X
Nj


)



(


X

i





1


-

X

j





1



)






(


X
Ni

-

X
Nj


)



(


X

i





2


-

X

j





2



)









(


X
Ni

-

X
Nj


)



(


X

i





N


-

X

j





N



)





]


;




(
10
)








X

b
1


=

X
-

X




;




(
11
)







where, subscripts of X are row number and column number of the element of X in the original-node impedance matrix X, and Xi1 is the element at the i-th row and the first column in the original-node impedance matrix X, Xj1 is the element at the j-th row and the first column in X, Xi2 is the element at the i-th row and the second column in X, Xj2 is the element at the j-th row j and the second column in X, XiN is the element at the i-th row and the N-th column in X, XiN is the element at the i-th row and the N-th column in X, X1i is the element at the first row and the i-th column in X, X1j is the element at the first row and the j-th column in X, X2i is the element at the second row and the i-th column in X, X2j is the element at the second row and the j-th column in X, Xni is the element at the N-th row and the i-th column in X, XNj is the element at the N-th row and the j-th column in X;


Step 2.4), calculating correction matrix {tilde over (G)}D′ of load shifting distribution factor considering the disconnected branch b1 according to the load shifting distribution factor original reduced-order matrix {acute over (G)}D and the original-node impedance matrix X, and calculating load shifting distribution factor reduced-order matrix {tilde over (G)}D′ considering the disconnected branch b1 according to the correction matrix {tilde over (G)}D′ and the load shifting distribution factor original reduced-order matrix {tilde over (G)}D, as the following expressions (12) and (13):












G
~

D


=


1

x

b
1








[





(


g

1

i


-

g

1

j



)



(


X

i





1


-

X

j





1



)






(


g

1

i


-

g

1

j



)



(


X

i





2


-

X

j





2



)









(


g

1

i


-

g

1

j



)



(


X

i





N


-

X

j





N



)








(


g

2

i


-

g

2

j



)



(


X

i





1


-

X

j





1



)






(


g

2

i


-

g

2

j



)



(


X

i





2


-

X

j





2



)









(


g

2

i


-

g

2

j



)



(


X

i





N


-

X

j





N



)






















(


g
Ki

-

g
Kj


)



(


X

i





1


-

X

j





1



)






(


g
Ki

-

g
Kj


)



(


X

i





2


-

X

j





2



)









(


g
Ki

-

g
Kj


)



(


X

i





N


-

X

j





N



)





]


;




(
12
)









G
~


D
,

b
1




=



G
~

D

-


G
~

D




;




(
13
)







where, g1i is the element at the first row and the i-th column in the load shifting distribution factor original reduced-order matrix {tilde over (G)}D, g1j is the element at the first row and the j-th column in {tilde over (G)}D, g2i is the element at the second row and the i-th column in {tilde over (G)}D, g2j is the element at the second row and the j-th column in {tilde over (G)}D, gKi is the element at the K-th row and the i-th column in {tilde over (G)}D, gKj is the element at the K-th row and the j-th column in {tilde over (G)}D;


Step 2.5), calculating generator shifting distribution factor reduced-order matrix {tilde over (G)}G,b1′ considering the disconnected branch bi according to the load shifting distribution factor reduced-order matrix {tilde over (G)}D,b1′, as the following expression (14):

{tilde over (G)}G,b1′={tilde over (G)}G−{tilde over (G)}D,b1′ÃG  (14):


Step 2.6), for the relaxation node î, inserting vector whose elements are all equal to zero into columns of {tilde over (G)}G,b1′ and {acute over (G)}D,b1′, respectively to obtain the load shifting distribution factor matrix GD,b1, and the generator shifting distribution factor matrix GG,b1;


Step 2.7), regarding Xb1, {tilde over (G)}G,b1′ and {tilde over (G)}D,b1′ as new original-node impedance matrix, new load shifting distribution factor original reduced-order matrix and new generator shifting distribution factor original reduced-order matrix, and calculating the node impedance matrix, the load shifting distribution factor reduced-order matrix and the generator shifting distribution factor reduced-order matrix and continuing the steps 2.2) to 2.7) until the disconnect branches in the d-th day are processed, and obtaining the generator shifting distribution factor matrix GG,bB, and the load shifting distribution factor matrix GD,bB for the d-th day, and generating security constraint of the unit commitment model for the d-th day, as the following expression (15):

F≤GG,bBPT−GD,bBLTF  (15):


where P is vector of output of different types of generator unit at each time period and is decision variable of the unit commitment optimal model, F and F are the upper and lower limits of branch power flow, respectively L is vector of the node loads.


Step 3), output of each generator unit at each time period is obtained using a mixed integer programming algorithm according to no-security-constraint unit commitment model, and for each time period, each branch power flow is calculated according to the output of each generator unit at each time period and node loads, and overload of each branch is determined according to the branch power flow and branch power flow limits; and security constraint in the unit commitment model is generated according to rows of the load shifting distribution factor matrix and the generator shifting distribution factor matrix corresponding for the overloaded branches; and the output of each generator unit at each time period is obtained using the mixed integer programming algorithm according to the no-security-constraint unit commitment model again, and then, overload of each branch is determined again; and solving iteratively until no branch is overloaded, and output of each generator unit at each time period is obtained under security constraint for completion of operation simulation for the current simulation day, and operating simulation for the rest simulation days is performed to obtain security-constraint operation simulation result for the whole year.


The step 3) includes following steps:


Step 3.1), defining security constraint set Θ of the power system as being equal to Ø, Ø is null set and defining calculation loop variable s as being equal to zero, and calculating the no-security-constraint unit commitment model F≤GGPT−GDLTF to obtain output X(0) of each generator unit, calculating the branch power flow according to X(0) and L, as the following expression (16):

F(0)=GG,bBP(0)T−GD,bBLT  (16):


determining overload of each branch according to F(0), F, and F, and recording set of overloaded branches as Θ(1), if Θ(1) is null set, going to step 3.3), and if Θ(1) is not null set, updating the security constraint set Θ=Θ(1), and defining gG,bB,l, as the elements at l-th row in GG,bB and defining gD,bB,l as the elements at the l-th row in GD,bB, and defining fl as the l-th elements of F, and defining fl as the l-th elements of F, and calculating security-constrained unit commitment model for the d-th day, as the following expression (17):

flgG,bB,lP(0)T−gD,bB,lLTfl, l∈Θ  (17);


solving the unit commitment model considering Θ to obtain optimal solution P(1) of the unit commitment model considering Θ in the first iteration;


Step 3.2), s=s+1 to enter the next iteration, for the s-th iteration, calculating the branch power flow according to P(s) and L, as following:

F(s)=GG,bBP(s)T−GD,bBLT;


determining overload of each branch according to F(s), F, and F, and recording set of overloaded branches as Θ(x), if Θ(s) is null set, going to the step 3.3), and if Θ(s) is not null set, updating the security constraint set Θ=Θ(s−1)∪Θ(s), and calculating security-constrained unit commitment model for the d-th day, as following:

flgG,bB,lP(s)T−gD,bB,lLTfl, lϵΘ(s);


solving the unit commitment model considering Θ to obtain P(s+1), and repeating the step 3.2);


Step 3.3), considering P(s) as the optimal solution of the security-constrained unit commitment model, and d=d+1 to go to the step 2.1) to calculate the operation simulation for the (d+1)-th day.


Advantages of the fast model generating and solving method for security-constrained power system operation simulation in the embodiments of the present disclosure follows:


The fast model generating and solving method for security-constrained power system operation simulation is based on the conventional power system operation simulation. The method can calculate the load shifting distribution factor matrix and the generator shifting distribution factor matrix fast in each simulation day and solve the security-constrained unit commitment model fast. Calculations of the security-constrained power system operation simulation can be applied to the large-scale real-word power system by implementing the method in the embodiments of the present disclosure. Indexes, such as adaptability, economy, environmental protection, etc. can be evaluated more scientifically in the future implementation of the power system planning. This improves quality of the power system planning. Therefore, the method in the embodiments of the present disclosure is a promising technique for power systems.


In the following, a non-transitory computer-readable storage medium according to embodiments of the present disclosure will be described in detail.


In some embodiments, the non-transitory computer-readable storage medium having stored therein instructions that, when executed by a processor of a device, causes the device to perform a fast model generating and solving method for security-constrained power system operation simulation. The fast model generating and solving method includes following steps:


1) obtaining information of all branches and nodes which are involved during operation simulation time period, calculating original-node impedance matrix, load shifting distribution factor original matrix and generator shifting distribution factor original matrix of all involved branches according to connections between the branches and the nodes and reactance of each branch:


2) starting operation simulation calculation day-by-day to obtain on-off state of branches in a current simulation day, correcting the load shifting distribution factor original matrix and the generator shifting distribution factor original matrix according to the on-off state of branches to obtain load shifting distribution factor matrix and generator shifting distribution factor matrix in the current simulation day after considering the on-off state of branches;


3) obtaining output of each generator unit at each time period using a mixed integer programming algorithm according to no-security-constraint unit commitment model, for each time period, calculating each branch power flow according to the output of each generator unit at each time period and node loads, determining overload of each branch according to the branch power flow and branch power flow limits; generating security constraint in the unit commitment model according to rows of the load shifting distribution factor matrix and the generator shifting distribution factor matrix corresponding for the overloaded branches; obtaining the output of each generator unit at each time period using the mixed integer programming algorithm according to the no-security-constraint unit commitment model again, and then, determining overload of each branch again; solving iteratively until no branch is overloaded, and obtaining output of each generator unit at each time period under security constraint for completion of operation simulation for the current simulation day, performing operating simulation for the rest simulation days to obtain security-constraint operation simulation result for the whole year.


Any process or method described in the flowing diagram or other means may be understood as a module, segment or portion including one or more executable instruction codes of the procedures configured to achieve a certain logic function or process, and the preferred embodiments of the present disclosure include other performances, in which the performance may be achieved in other orders instead of the order shown or discussed, such as in an almost simultaneous way or in an opposite order, which should be appreciated by those having ordinary skills in the art to which embodiments of the present disclosure belong.


The logic and/or procedures indicated in the flowing diagram or described in other means herein, such as a constant sequence table of the executable code for performing a logical function, may be implemented in any computer readable storage medium so as to be adopted by the code execution system, the device or the equipment (such a system based on the computer, a system including a processor or other systems fetching codes from the code execution system, the device and the equipment, and executing the codes) or to be combined with the code execution system, the device or the equipment to be used. With respect to the description of the present invention, “the computer readable storage medium” may include any device including, storing, communicating, propagating or transmitting program so as to be used by the code execution system, the device and the equipment or to be combined with the code execution system, the device or the equipment to be used. The computer readable medium includes specific examples (a non-exhaustive list): the connecting portion (electronic device) having one or more arrangements of wire, the portable computer disc cartridge (a magnetic device), the random access memory (RAM), the read only memory (ROM), the electrically programmable read only memory (EPROMM or the flash memory), the optical fiber device and the compact disk read only memory (CDROM). In addition, the computer readable storage medium even may be papers or other proper medium printed with program, as the papers or the proper medium may be optically scanned, then edited, interpreted or treated in other ways if necessary to obtain the program electronically which may be stored in the computer memory.


It should be understood that, each part of the present disclosure may be implemented by the hardware, software, firmware or the combination thereof. In the above embodiments of the present invention, the plurality of procedures or methods may be implemented by the software or hardware stored in the computer memory and executed by the proper code execution system. For example, if the plurality of procedures or methods is to be implemented by the hardware, like in another embodiment of the present invention, any one of the following known technologies or the combination thereof may be used, such as discrete logic circuits having logic gates for implementing various logic functions upon an application of one or more data signals, application specific integrated circuits having appropriate logic gates, programmable gate arrays (PGA), field programmable gate arrays (FPGA).


It can be understood by those having the ordinary skills in the related art that all or part of the steps in the method of the above embodiments can be implemented by instructing related hardware via programs, the program may be stored in a computer readable storage medium, and the program includes one step or combinations of the steps of the method when the program is executed.


In addition, each functional unit in the present disclosure may be integrated in one progressing module, or each functional unit exists as an independent unit, or two or more functional units may be integrated in one module. The integrated module can be embodied in hardware, or software. If the integrated module is embodied in software and sold or used as an independent product, it can be stored in the computer readable storage medium.


The non-transitory computer-readable storage medium may be, but is not limited to, read-only memories, magnetic disks, or optical disks.


Reference throughout this specification to “an embodiment,” “some embodiments.” “one embodiment”, “another example,” “an example,” “a specific example,” or “some examples,” means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present disclosure. Thus, the appearances of the phrases such as “in some embodiments,” “in one embodiment”, “in an embodiment”, “in another example,” “in an example,” “in a specific example,” or “in some examples,” in various places throughout this specification are not necessarily referring to the same embodiment or example of the present disclosure. Furthermore, the particular features, structures, materials, or characteristics may be combined in any suitable manner in one or more embodiments or examples.


Although explanatory embodiments have been shown and described, it would be appreciated by those skilled in the art that the above embodiments cannot be construed to limit the present disclosure, and changes, alternatives, and modifications can be made in the embodiments without departing from spirit, principles and scope of the present disclosure.

Claims
  • 1. A method for a security-constrained power system operation simulation of a security-constrained power system comprising a plurality of generator units, branches, and nodes, the method comprising the following steps: 1) receiving information from the branches and the nodes during an operation simulation time period, storing the information on a non-transitory computer-readable storage medium, and calculating, with one or more processors, an original-node impedance matrix, load shifting distribution factor original matrix, and generator shifting distribution factor original matrix of the branches according to connections between the branches and the nodes and the reactance of each branch;2) starting, with the one or more processors, a day-by-day operation simulation calculation by: obtaining on-off state of branches in a current simulation day; correcting the load shifting distribution factor original matrix and the generator shifting distribution factor original matrix according to the on-off state of branches to obtain load shifting distribution factor matrix and generator shifting distribution factor matrix in the current simulation day after considering the on-off state of branches;3) obtaining, with the one or more processors, an output of each generator unit at each time period by using a mixed integer programming algorithm according to no-security-constraint unit commitment model; calculating, with the one or more processors, each branch power flow for each time period according to the output of each generator unit at each time period and node loads; determining, with the one or more processors, an overload of each branch according to the branch power flow and branch power flow limits; generating, with the one or more processors, a security constraint in the unit commitment model according to rows of the load shifting distribution factor matrix and the generator shifting distribution factor matrix corresponding to the overloaded branches; obtaining, with the one or more processors, the output of each generator unit at each time period by using the mixed integer programming algorithm according to the no-security-constraint unit commitment model again; determining, with the one or more processors, the overload of each branch again; solving, with the one or more processors, the output of each generator unit at each time period iteratively until no branch is overloaded; obtaining, with the one or more processors, the output of each generator unit at each time period under security constraint for completion of operation simulation for the current simulation day; performing, with the one or more processors, an operating simulation for the remaining simulation days to obtain security-constraint operation simulation results for a whole year.
  • 2. The method of claim 1, wherein the step 1) comprises the following steps: 1.1) generating, with the one or more processors, a branch admittance matrix according to the reactance of each branch, as following:
  • 3. The method of claim 2, wherein the step 2) comprises the following steps: defining Ω: {b1, b2, . . . , bB} as a set of disconnected branches in the current simulation day, and b1 as a current disconnected branch in the power system, and xb1 as impedance of b1, and i as a beginning node of b1, and j as an end node of b1;2.2) calculating, with the one or more processors, an intermediate variable xb1′ of b1, as following: xb1′=−xb1+Xii+Xjj−Xij−Xji;
  • 4. The method of claim 3, wherein the step 3) comprises the following steps: 3.1) defining a security constraint set Θ of the power system as being equal to Ø, Ø is null set, and defining a calculation loop variable s as being equal to zero, and calculating, with the one or more processors, the no-security-constraint unit commitment model F≤GGPT−GDLT≤F to obtain output X(0) of each generator unit, and calculating, with the one or more processors, the branch power flow according to X(0) and L, as following: F(0)=GG,bBp(0)T−GD,bBLT;determining, with the one or more processors, an overload of each branch according to F(0), F and F, and recording set of overloaded branches as Θ(1); if Θ(1) is null set, going to step 3.3), and if Θ(1) is not null set, updating the security constraint set Θ=Θ(1); defining gG,bB,l as the elements at l-th row in GG,bB, and defining gD,bB,l as the elements at the l-th row in GD,bB, and defining fl as the l-th elements of F, and defining fl as the l-th elements of F, and calculating, with the one or more processors, a security-constrained unit commitment model for the d-th day, as following: fl≤gG,bB,lP(0)T−gD,bB,lLT≤fl;solving, with the one or more processors, the unit commitment model considering Θ to obtain optimal solution P(1) of the unit commitment model considering Θ in the first iteration;3.2) defining s=s+1 to enter the next iteration; for the s-th iteration, calculating the branch power flow according to P(s) and L, as following: F(s)=GG,bBP(s)T−GD,bBLT;determining, with the one or more processors, the overload of each branch according to F(s), F, and F, and recording the set of overloaded branches as Θ(s); if Θ(s) is null set, going to the step 3.3), and if Θ(s) is not null set, updating the security constraint set Θ=Θ(s−1), and calculating the security-constrained unit commitment model for the d-th day, with the one or more processors, as following: fl≤gG,bB,lP(s)T−gD,bB,lLT≤fl,l∈Θ(s);solving, with the one or more processors, the unit commitment model considering Θ to obtain P(s+1), and repeating the step 3.2);3.3) considering P(s) as the optimal solution of the security-constrained unit commitment model, and defining d=d+1 to go to the step 2.1) to calculate, with the one or more processors, the operation simulation for the (d+1)-th day.
  • 5. The method of claim 1, wherein the branch is defined by transmission lines, cables, transformers, and power transmission equipment connected to two buses, and the node is defined by one bus in the security-constrained power system.
  • 6. A non-transitory computer-readable storage medium, having stored therein instructions that, when executed by a processor of a device, causes the device to perform a fast model generating and solving method for a security-constrained power system operation simulation; the security-constrained power system comprising a plurality of generator units, branches, and nodes; wherein the fast model generating and solving method comprises the following steps: 1) obtaining information of all branches and nodes which are involved during an operation simulation time period, calculating an original-node impedance matrix, load shifting distribution factor original matrix, and generator shifting distribution factor original matrix of all involved branches according to connections between the branches and the nodes and reactance of each branch;2) starting a day-by-day operation simulation calculation by: obtaining an on-off state of branches in a current simulation day, correcting the load shifting distribution factor original matrix and the generator shifting distribution factor original matrix according to the on-off state of branches to obtain load shifting distribution factor matrix and generator shifting distribution factor matrix in the current simulation day after considering the on-off state of branches;3) obtaining an output of each generator unit at each time period by using a mixed integer programming algorithm according to no-security-constraint unit commitment model; for each time period, calculating each branch power flow according to the output of each generator unit at each time period and node loads; determining an overload of each branch according to the branch power flow and branch power flow limits; generating a security constraint in the unit commitment model according to rows of the load shifting distribution factor matrix and the generator shifting distribution factor matrix corresponding to the overloaded branches; obtaining the output of each generator unit at each time period by using the mixed integer programming algorithm according to the no-security-constraint unit commitment model again; and then, determining the overload of each branch again; solving the output of each generator unit at each time period iteratively until no branch is overloaded, and obtaining the output of each generator unit at each time period under security constraint for completion of operation simulation for the current simulation day; performing operating simulation for remaining simulation days to obtain security-constraint operation simulation results for a whole year.
  • 7. The non-transitory computer-readable storage medium of claim 6, wherein the step 1) comprises the following steps: 1.1) generating branch admittance matrix y according to the reactance of each branch;1.2) generating node-branch incidence matrix and generator-node incidence matrix according to the connections between the branches and the nodes;wherein the step 1.2) comprises the following step:generating branch-node incidence matrix Hl for each branch;generating the node-branch incidence matrix A by using the branch-node incidence matrix Hl;setting the node connected to the generator unit with maximum capacity as a relaxation node î and obtaining reduced-order node-branch incidence matrix à according to the relaxation node î and the node-branch incidence matrix A;establishing generator-node incidence matrix Rm for each generator and generating the generator-node incidence matrix AG by using the generator-node incidence matrix Rm;obtaining reduced-order generator-node incidence matrix ÃG according to the generator-node incidence matrix AG and the relaxation node î;1.3) obtaining the generator shifting distribution factor original matrix GG and the load shifting distribution factor original matrix GD according to the branch admittance matrix y and the node-branch incidence matrix A;wherein the step 1.3) comprises the following steps:calculating the original-node impedance matrix X, load shifting distribution factor original reduced-order matrix {tilde over (G)}D, and generator shifting distribution factor original reduced-order matrix {tilde over (G)}G;obtaining the load shifting distribution factor original matrix GD according to the load shifting distribution factor original reduced-order matrix {tilde over (G)}D and the relaxation node î and obtaining the generator shifting distribution factor original matrix GG according to the generator shifting distribution factor original reduced-order matrix {tilde over (G)}G and the relaxation node î.
  • 8. The non-transitory computer-readable storage medium of claim 6, wherein the step 2) comprises the following steps: 2.1) defining Ω:{b1, b2, . . . bB} as a set of disconnected branches in the current simulation day, and b1 as a current disconnected branch in the power system, and xb1 as impedance of b1, and i as a beginning node of b1, and j as an end node of b1;2.2) calculating an intermediate variable xb1′ of b1;2.3) calculating a correction matrix X′ of node impedance matrix considering the disconnected branch b1, and calculating a node impedance matrix Xb1 considering the disconnected branch b1 according to the correction matrix X′ and the original-node impedance matrix X;2.4) calculating correction matrix {tilde over (G)}D′ of load shifting distribution factor considering the disconnected branch b1 according to the load shifting distribution factor original reduced-order matrix {tilde over (G)}D and the original-node impedance matrix X, and calculating load shifting distribution factor reduced-order matrix {tilde over (G)}D,b1′ considering the disconnected branch b1 according to the correction matrix {tilde over (G)}D′ and the load shifting distribution factor original reduced-order matrix {tilde over (G)}D;2.5) calculating generator shifting distribution factor reduced-order matrix {tilde over (G)}G,b1′ considering the disconnected branch b1 according to the load shifting distribution factor reduced-order matrix {tilde over (G)}D,b1′;2.6) obtaining the load shifting distribution factor matrix GD,b1 according to the load shifting distribution factor reduced-order matrix {tilde over (G)}D,b1′ and the relaxation node î, and obtaining the generator shifting distribution factor matrix GG,b1 according to the generator shifting distribution factor reduced-order matrix {tilde over (G)}G,b1′ and the relaxation node î;2.7) regarding the node impedance matrix Xb1 considering the disconnected branch b1, the generator shifting distribution factor reduced-order matrix {tilde over (G)}G,b1′, and the load shifting distribution factor reduced-order matrix {tilde over (G)}D,b1′ as new original-node impedance matrix X, new load shifting distribution factor original reduced-order matrix {tilde over (G)}D, and new generator shifting distribution factor original reduced-order matrix {tilde over (G)}G, and calculating the node impedance matrix, the load shifting distribution factor reduced-order matrix, and the generator shifting distribution factor reduced-order matrix and continuing the steps 2.2) to 2.7) until the disconnect branches in the d-th day are processed, and obtaining the generator shifting distribution factor matrix GG,bB and the load shifting distribution factor matrix GD,bB for the d-th day, and generating security constraint of the unit commitment model for the d-th day.
  • 9. The non-transitory computer-readable storage medium of claim 6, wherein the step 3) comprises the following steps: 3.1) defining security constraint set Θ of the power system as being equal to Ø, Ø is null set, and defining calculation loop variable s as being equal to zero, and calculating the no-security-constraint unit commitment model F≤GGPT−GDLT≤F to obtain output X(0) of each generator unit, and calculating the branch power flow F(0) according to output X(0) of each generator unit and the vector of the node loads L;determining overload of each branch according to the branch power flow F(0), upper limits of the branch power F, and lower limits of the branch flow F; recording set of overloaded branches as Θ(1); if Θ(1) is null set, going to step 3.3), and if Θ(1) is not null set, updating the security constraint set Θ=Θ(1);calculating security-constrained unit commitment model for the d-th day according the load shifting distribution factor matrix GD,bB, the generator shifting distribution factor matrix GG,bB, the upper limits of the branch power F, and the lower limits of the branch flow F;solving the unit commitment model considering Θ to obtain optimal solution p(1) of the unit commitment model considering Θ in the first iteration;3.2) defining s=s+1 to enter the next iteration; for the s-th iteration, calculating the branch power flow F(s) according to optimal solution P(s) of the unit commitment model considering Θ in the s-th iteration and the vector of the node loads L;determining the overload of each branch according to the branch power flow F(s), the upper limits of the branch power F, and the lower limits of the branch flow F, and recording the set of overloaded branches as Θ(s); if Θ(s) is null set, going to the step 3.3), and if Θ(s) is not null set, updating the security constraint set Θ=Θ(s−1);calculating the security-constrained unit commitment model for the d-th day;solving the unit commitment model considering Θ to obtain optimal solution P(s+1) of the unit commitment model considering Θ in the (s+1)-th iteration, and repeating the step 3.2);3.3) considering the optimal solution P(s) of the unit commitment model considering Θ in the s-th iteration as the optimal solution of the security-constrained unit commitment model, and defining d=d+1 to go to the step 2.1) to calculate the operation simulation for the (d+1)-th day.
Priority Claims (1)
Number Date Country Kind
2015 1 0611268 Sep 2015 CN national
US Referenced Citations (4)
Number Name Date Kind
20110035071 Sun Feb 2011 A1
20110282508 Goutard Nov 2011 A1
20160099567 Sun Apr 2016 A1
20160273518 Chen Sep 2016 A1
Non-Patent Literature Citations (3)
Entry
Wang et al., “Security-Constrained Unit Commitment With Volatile Wind Power Generation” (Aug. 2008), IEEE Transactions on Power Systems, vol. 23, Issue 3, pp. 1319-1327 [retrieved from https://ieeexplore.ieee.org/abstract/document/4556639].
Fripp, “Switch: A Planning Tool for Power Systems with Large Shares of Intermittent Renewable Energy,” Environmental Science & Technology, American Chemical Society, 2012, vol. 46, pp. 6371-6378.
Weber et al., “WILMAR: A Stochastic Programming Tool to Analyze the Large-Scale Integration of Wind Energy,” Optimization in the Energy Industry, Jan. 2009, pp. 437-458.
Related Publications (1)
Number Date Country
20170083648 A1 Mar 2017 US