文章摘要
龙 禹,张 悦,阮文骏,王蓓蓓.基于内盒近似模型的有序用电调度策略研究[J].电力需求侧管理,2022,24(5):84-89
基于内盒近似模型的有序用电调度策略研究
Ordered electricity consumption dispatching strategy based on inner box approximation model
投稿时间:2022-07-10  修订日期:2022-08-03
DOI:10. 3969 / j. issn. 1009-1831. 2022. 05. 014
中文关键词: 有序用电  多目标优化调度  内盒近似模型  闵可沃夫斯基求和
英文关键词: orderly electricity consumption  multi-objective optimal scheduling  inner box approximation model  Minkowski sum
基金项目:国家电网有限公司科技项目(5108-202218280A-2-0-XG)
作者单位
龙 禹 国网江苏省电力有限公司南京 210024 
张 悦 东南大学 苏州联合研究生院江苏 苏州215000 
阮文骏 国网江苏省电力有限公司南京 210024 
王蓓蓓 东南大学 电气工程学院南京 210096 
摘要点击次数: 873
全文下载次数: 330
中文摘要:
      随着我国电力需求总量的日趋激增以及双碳目标的实施,电力供需矛盾日益加剧,有序用电是缓解供电系统高峰时段供需矛盾的重要手段。为充分挖掘用户的有序用电潜力,首先,提出一种基于内盒近似模型,建立用户各类设备的可限负荷模型,并通过闵可沃夫斯基求和得到用户的聚合模型,有效简化了大规模用户制定计划时的计算复杂度的同时降低用户用电信息暴露的风险。其次,电力公司在执行有序用电计划时兼顾用户的紧急错避峰价值、公平性以及对社会影响程度建立多目标优化调度模型,最大程度地降低缺电对社会经济以及居民生活的影响。最后基于仿真验证了所提出模型的有效性,并结合算例分析了其在运算效率与隐私安全方面的优越性。
英文摘要:
      With the rapid increase of China’s total power demand and the implementation of the dual carbon target, the contradiction between power supply and demand is becoming more and more serious. Orderly use of electricity is an important mean to alleviate the contradiction between supply and demand in peak hours of power supply system. In order to fully tap the user’s ordered power consumption potential, a limitable load model based on the inner box approximation model is proposed. The user aggregation model is obtained by Minkowski Sum, which effectively simplifies the computational complexity of large-scale user planning and reduces the risk of user electricity information exposure. Furthermore, the power company establishes a multi-objective optimal scheduling model considering the value of emergency error peak avoidance, fairness and social impact of users when implementing orderly power consumption plan, in order to minimize the impact of lack of electricity on social economy and residents’lives. Finally, the effectiveness of the proposed model is verified by simulation, and its advantages in computing efficiency and privacy security are analyzed with an example.
查看全文   查看/发表评论  下载PDF阅读器
关闭