Two-stage monthly transaction security check method based on extreme scene

A security check and scene technology, applied in data processing applications, system integration technology, finance, etc., can solve problems such as changes in pre-clearing results, impact of monthly transaction check results, fairness doubts, etc.

Active Publication Date: 2020-11-13
GUIZHOU POWER GRID CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the one hand, due to the high proportion of new energy installed capacity, when its output fluctuates, it may have a greater impact on the monthly transaction verification results, and the adoption of the post-transaction verification mode may have a greater change in the pre-clearing results, causing market members The fairness of the verification process is questioned; on the other hand, since the dispatching organization needs to ensure the execution of transaction results, it must pay more attention to the transaction verification results in extreme scenarios, and consider the volatility of marginal data such as new energy and electricity consumption needs to be more fully

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-stage monthly transaction security check method based on extreme scene
  • Two-stage monthly transaction security check method based on extreme scene
  • Two-stage monthly transaction security check method based on extreme scene

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] Hereinafter, preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings. It should be understood that the preferred embodiments are only for illustrating the present invention, but not for limiting the protection scope of the present invention.

[0074] like figure 1 As shown, a two-stage monthly transaction security verification method based on extreme scenarios of the present invention includes the following steps:

[0075] Step S1: Define the extreme forecast scenario: the extreme forecast scenario in the present invention refers to the combination of scenarios that have the greatest impact on the power plant's transaction volume in the multi-scenario forecast of new energy and load. The impact mechanism of new energy power generation and load power consumption on the power generation capacity of power plants is different. The increase in new energy power generation will occupy a larger market share of powe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a two-stage monthly transaction security check method based on an extreme scene. According to the method, the maximum power generation capacity of each power plant is checked and quantitatively calculated based on an extreme prediction scene before clearing and serves as the boundary of market transaction of the power plants, and it is guaranteed that a transaction result does not exceed the range of the extreme prediction scene, and after clearing, power plant transaction electric quantity execution conditions in different scenes are checked based on the multiple prediction scenes, and a check result is quantized through expected execution electric quantity deviation and execution electric quantity standard exceeding scenes. According to the method, the control capability of uncertainty of new energy and load prediction can be improved, and a transaction result is prevented from exceeding an actual execution capability range.

Description

technical field [0001] The invention relates to the technical field of power system scheduling operation, in particular to a two-stage monthly transaction security check method based on extreme scenarios. Background technique [0002] Monthly transaction security check is an important dispatching operation technical issue in the current power market operation. Its content is to check the feasibility of monthly transaction electricity of power generation enterprises in accordance with the relevant requirements of clean energy consumption and safe and stable operation of the power grid to ensure the feasibility of transaction results. sex. [0003] The traditional monthly transaction security check often adopts the post-transaction check mode, that is, the dispatching agency checks the pre-cleared electricity of each power generation company according to the clearing results of market transactions, and returns the check results. In the selection of the calibration method, the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q10/06G06Q40/04G06Q50/06
CPCG06Q10/0635G06Q50/06G06Q40/04Y02E40/70
Inventor 赵翔宇王宁王永刚赵倩苏华英
Owner GUIZHOU POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products