Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A mid-to-long-term relaxed network security constraint modeling method based on the combination of near and far

A technology of network security and modeling method, which is applied in the field of medium and long-term relaxed network security constraint modeling, which can solve problems such as long solution time, failure to meet production needs, and long optimization cycle, so as to reduce the calculation dimension and shorten the optimization solution time Effect

Active Publication Date: 2020-04-14
STATE GRID CORP OF CHINA +2
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] my country's traditional medium- and long-term unit combinations usually aim at the balance of the three public schedules, considering power, power balance, system backup, and network security constraints. The rigid network security constraints can easily lead to unsolvable optimization, or lead to too long solution time, unable to meet actual production needs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A mid-to-long-term relaxed network security constraint modeling method based on the combination of near and far
  • A mid-to-long-term relaxed network security constraint modeling method based on the combination of near and far
  • A mid-to-long-term relaxed network security constraint modeling method based on the combination of near and far

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] Such as Figure 1-2 As shown, the invention of this example provides an optimization modeling method combining far and near relaxed network security constraints. According to the importance level of the network security section participating in the optimization, different optimization time periods are set respectively, and different time intervals are set according to whether breakthroughs are allowed. The weight coefficient of , avoiding the situation that the optimization time is too long or the optimization has no solution. The method comprises the steps of:

[0037] 1. Establish loose network security constraints

[0038]

[0039]

[0040] where: p i (t) represents the physical output of unit i in time period t;

[0041] tieP(tie,t) represents the transmission power of the tie line tie in the time period t;

[0042] Sens(i,f,t) represents the correlation sensitivity coefficient between the physical output of unit i and the transmission flow of safety secti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a far-near combination type mid-and-long-term relaxation network security constraint modeling method. According to the method, firstly, the network security constraint is relaxed, so that the problem of no optimum solution is avoided. Meanwhile, according to practical production requirements, network security profiles are classified according to the importance level, and a security profile of a higher importance level is optimized during the entire optimization period. At the same time, general security profiles are optimized only during the recent optimization process. In this way, the dimensionality of the optimization calculation is greatly reduced, and the optimization time is shortened. At the same time, in combination with the actual production requirements, network security profiles are classified according to the judgment on whether or not to allow the breakthrough. That means, the network security profiles are classified into two types, wherein the breakthrough is allowed for one type of network security profiles and is not allowed for the other type of network security profiles. Different weight coefficients are arranged for the two types of network security profiles respectively. Therefore, the far-near combination type relaxation network security constraint containing weight coefficients is adopted for optimization calculation. As a result, a unit combination optimization scheme that meets the actual production requirements can be quickly obtained. The conditions of long optimization time and no optimum solution can be avoided.

Description

Technical field: [0001] The invention relates to a modeling method for medium- and long-term relaxed network security constraints, and more particularly relates to a medium- and long-term loose network security constraint modeling method combining far and near. Background technique: [0002] my country's traditional medium- and long-term unit combinations usually aim at the balance of the three public schedules, taking into account power, power balance, system backup, and network security constraints. The rigid network security constraints can easily lead to unsolvable optimization, or lead to too long solution time, unable to meet actual production needs. This application proposes a mid-to-long-term loose network security constraint modeling method combining near and far, which relaxes network security constraints and avoids unsolvable problems in optimization; at the same time, according to actual production needs, network security sections are classified according to impor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q50/06
Inventor 程海花耿建杨争林江长明刘军汪洋苏峰陈之栩胡劲曹帅
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products