引用本文:白懿鹏,吕飞鹏,廖小君,李春海.基于多任务异步处理的电网脆弱线路在线辨识[J].电力自动化设备,2017,37(3):
BAI Yipeng,Lü Feipeng,LIAO Xiaojun,LI Chunhai.Online vulnerable line identification based on multi-task asynchronous processing for power grid[J].Electric Power Automation Equipment,2017,37(3):
【打印本页】   【HTML】   【下载PDF全文】   查看/发表评论  【EndNote】   【RefMan】   【BibTex】
←前一篇|后一篇→ 过刊浏览    高级检索
本文已被:浏览 4242次   下载 1561  
基于多任务异步处理的电网脆弱线路在线辨识
白懿鹏1, 吕飞鹏1, 廖小君2, 李春海1
1.四川大学 电气信息学院,四川 成都 610065;2.国网四川省电力公司技能培训中心,四川 成都 610072
摘要:
提出一种利用多任务异步处理模式进行电网脆弱线路快速辨识的方法。综合考虑线路保护配合关联度和综合后果严重度,定义了保护脆弱度;综合考虑电网的拓扑结构和系统运行方式,利用潮流介数对线路结构脆弱性进行评估;由此给出了结合线路保护脆弱度与潮流介数的线路脆弱度指标,并采用多任务异步处理模式将指标计算工作分为多个任务模块并发处理。算例结果表明:所提方法对电网中的脆弱线路有较好的辨识能力及较高的辨识精度,能够有效缩短辨识所需的时间,适合在线应用。
关键词:  电力系统  多任务  异步处理  脆弱线路  脆弱性  在线辨识  保护脆弱度  潮流介数
DOI:10.16081/j.issn.1006-6047.2017.03.017
分类号:
基金项目:
Online vulnerable line identification based on multi-task asynchronous processing for power grid
BAI Yipeng1, Lü Feipeng1, LIAO Xiaojun2, LI Chunhai1
1.School of Electrical Engineering and Information, Sichuan University, Chengdu 610065, China;2.State Grid Sichuan Electric Power Company Skills Training Center, Chengdu 610072, China
Abstract:
A method based on the multi-task asynchronous processing is proposed to quickly and accurately identify the vulnerable lines of power grid. The protection vulnerability is defined with the comprehensive consideration of the cooperative correlation degree and the colligated consequence severity of line protections. The power-flow betweenness with the comprehensive consideration of the topological structure and the operating mode of power system is adopted to estimate the vulnerability of line structure. A line vulnerability index combining the protection vulnerability and the power-flow betweenness is thus given. The multi-task asynchronous processing mode is applied to divide the calculation of index into several task modules to be dealt with concurrently. Results of case calculation show that, with better identification performance and high identification accuracy, the proposed method shortens the required time of vulnerable line identification effectively, suitable for online application.
Key words:  electric power systems  multi-task  asynchronous processing  vulnerable line  vulnerability  online identification  protection vulnerability  power flow betweenness

用微信扫一扫

用微信扫一扫