Security monitoring, early warning and alarm Method based on security boundary for regional integrated energy system

被引:1
作者
Xiao, Jun [1 ]
Sun, Gang [1 ]
Song, Chenhui [1 ,2 ]
Wang, Dan [1 ]
Lin, Xiqiao [3 ]
机构
[1] Tianjin Univ, Key Lab Smart Grid, Minist Educ, Tianjin 300072, Peoples R China
[2] Changsha Univ Sci Technol, Sch Elect & Informat Engn, Changsha 410114, Peoples R China
[3] Guangxi Power Grid Co Ltd, Nanning 530000, Peoples R China
关键词
Security monitoring; Early warning; Alarm; Security boundary; POWER;
D O I
10.1016/j.apenergy.2024.124709
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
Effective security early warning and alarm technology can provide comprehensive information such as the security levels, violation components, and the security trend of the system before a fault occurs. The core early warning and alarm information provided by existing methods is insufficient. To fill these gaps, this paper proposes an early warning and alarm method to monitor the security state of regional integrated energy system (RIES). Firstly, the security boundary and fuzzy theory are introduced. Secondly, the assessment methods of geometric security distance, overload and node parameter violation are further given, respectively. Thirdly, a two-stage early warning and alarm method is proposed, which can analyze the system operating state and determine the security level. The first stage can preliminarily classify the operating state of RIES through AC security boundary, including normal state, alert state and emergency state, and then send out signals correspondingly. The second stage can calculate the final security levels based on fuzzy inference and fuzzy comprehensive evaluation. For interconnected RIES, the security levels include I, IIa IId and IIIa IIId. For radial RIES, the security levels include I and IIIa IIId. Fourthly, the comprehensive and detailed early warning and alarm information is given. The overload components and N -1 components are located by DC security boundary analysis; the violation degree and parameters violation locations are further given based on energy flow calculation; the security trend is also predicted by the average value of the geometric security distance of the time series operating points. Finally, the correctness and effectiveness of proposed method are tested on typical cases. The results show that there are indeed five security levels: III, IIc, Ia, Ic and Id, the violation components and corresponding violation degrees can be obtained accurately, and the downward trend of N-0 and N - 1 security for RIES can be predicted further. Compared with existing methods, this paper provides more complete early warning and alarm information such as detailed security levels, violation components, violation degree and security trend. The time complexity of online early warning and alarm is only O(rt), and the online computational time is reduced by 2 orders of magnitude compared with the existing method. The detailed information provided by the proposed mothed can help RIES dispatchers assess security levels and make decisions timely.
引用
收藏
页数:37
相关论文
共 50 条
[31]   Developing an early warning system for a very slow landslide based on displacement monitoring [J].
Renato Macciotta ;
Michael Hendry ;
C. Derek Martin .
Natural Hazards, 2016, 81 :887-907
[32]   Developing an early warning system for a very slow landslide based on displacement monitoring [J].
Macciotta, Renato ;
Hendry, Michael ;
Martin, C. Derek .
NATURAL HAZARDS, 2016, 81 (02) :887-907
[33]   Research on Early Warning of Food Security Using a System Dynamics Model: Evidence from Jiangsu Province in China [J].
Xu, Jianling ;
Ding, Yi .
JOURNAL OF FOOD SCIENCE, 2015, 80 (01) :R1-R9
[34]   The Research of Coal Mine Security Monitoring System Based on Wireless Sensors Network [J].
Chen Yan ;
Song Nan-nan .
2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
[35]   A Random Forest-Based Approach for Voltage Security Monitoring in a Power System [J].
Negnevitsky, Michael ;
Tomin, Nikita ;
Kurbatsky, Victor ;
Panasetsky, Daniil ;
Zhukov, Alexey ;
Rehtanz, Christian .
2015 IEEE EINDHOVEN POWERTECH, 2015,
[36]   Design of Neural Network-Based Smart City Security Monitoring System [J].
Yao, Yao .
PROCEEDINGS OF 2024 INTERNATIONAL CONFERENCE ON COMPUTER AND MULTIMEDIA TECHNOLOGY, ICCMT 2024, 2024, :275-279
[37]   A Hybrid Early Warning Method for the Landslide Acceleration Process Based on Automated Monitoring Data [J].
Bai, Dongxin ;
Lu, Guangyin ;
Zhu, Ziqiang ;
Zhu, Xudong ;
Tao, Chuanyi ;
Fang, Ji .
APPLIED SCIENCES-BASEL, 2022, 12 (13)
[38]   Catastrophe progression method - path (CPM-PATH) early warning analysis of Chinese rare earths industry security [J].
Zuo, Zhili ;
Cheng, Jinhua ;
Guo, Haixiang ;
McLellan, Benjamin Craig .
RESOURCES POLICY, 2021, 73 (73)
[39]   Security monitoring method for ICS based on information gain ratio and maximum entropy model [J].
Li, Shenggang ;
Shang, Wenli ;
Chen, Chunyu ;
Lu, Yan ;
Dong, Zhiwei ;
Xu, Ye .
2020 CHINESE AUTOMATION CONGRESS (CAC 2020), 2020, :2272-2277
[40]   Research on internal network data security monitoring method based on NB-IoT [J].
Li, Yuanyuan ;
Sha, Jidong ;
Geng, Rongna .
WEB INTELLIGENCE, 2021, 19 (03) :191-202