Next Article in Journal
Passive Islanding Detection of Inverter-Based Resources in a Noisy Environment
Previous Article in Journal
Analysis of Transient Stability through a Novel Algorithm with Optimization under Contingency Conditions
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Short-Term Optimal Scheduling of Power Grids Containing Pumped-Storage Power Station Based on Security Quantification

1
Electric Power Research Institute, State Grid Shaanxi Electric Power Co., Ltd., Xi’an 710048, China
2
State Grid Shaanxi Electric Power Company, Xi’an 710046, China
3
School of Electrical Engineering, Xi’an University of Technology, Xi’an 710048, China
*
Author to whom correspondence should be addressed.
Submission received: 26 July 2024 / Revised: 19 August 2024 / Accepted: 29 August 2024 / Published: 3 September 2024
(This article belongs to the Section F1: Electrical Power System)

Abstract

:
In order to improve grid security while pursuing a grid operation economy and new energy consumption rates, this paper proposes a short-term optimal scheduling method based on security quantification for the grid containing a pumped-storage power plant. The method first establishes a grid security evaluation model to evaluate grid security from the perspective of grid resilience. Then, a short-term optimal dispatch model of the grid based on security quantification is constructed with the new energy consumption rate and grid loss as the objectives. In addition, an efficient intelligent optimization algorithm, Dung Beetle Optimization, is introduced to solve the scheduling model, dynamically updating the evaluation intervals during the iterative solution process and evaluating the grid security level and selecting the best result after the iterative solution. Finally, the improvement in the term IEEE 30-bus grid connected to a pumped-storage power plant is used as an example to verify the effectiveness of the proposed method and model.

1. Introduction

With the “dual-carbon” goal and the construction of new power systems, China’s installed capacity of new energy has been increasing, and by the end of 2023, China’s cumulative installed new energy capacity will exceed 800 GW, with the installed new energy capacity reaching more than 30% of China’s total installed capacity [1,2,3]. Under the high proportion of new energy access, it brings a great challenge to the stable operation of the power grid [4,5,6], and pumped storage is one of the effective ways to cope with the challenge [7,8]. With the addition of new energy power stations, pumped-storage power stations, and other modules, the grid structure has become more complex; therefore, how to improve the security of the grid while pursuing the new energy consumption rate and economy is the current grid scheduling research question that urgently needs to be addressed [9,10].
Ensuring power system security has long been a critical focus in the planning, design, and operational phases of power grids. As power systems become more complex, traditional security assessment methods face challenges in accurately evaluating grid stability and reliability. Established security indices—such as the frequency safety value [11], voltage margin [12], stability of power supply capacity [13], and failure rate [14]—have been widely used in real-time monitoring. However, these approaches fall short when applied to pre-scheduled evaluations, where predicting grid resilience becomes vital. Recent advancements have attempted to address this issue. For example, research has explored the use of hierarchical analysis and entropy weighting methods to evaluate distributed energy systems [15], while multi-criteria assessment systems have been developed to better quantify security indicators [16]. Additionally, efforts have been made to integrate subjective and objective weighting methods, such as combining hierarchical analysis with the CRITIC method, to improve the accuracy of security assessments [17,18]. Despite these efforts, current evaluation models often rely on extensive data and involve complex calculations, making them less practical for real-time application. These limitations highlight the need for more efficient and effective methods to assess grid security in the context of short-term scheduling, particularly for systems that include pumped-storage power stations. The study addresses these gaps by proposing a novel approach to short-term optimal scheduling that enhances grid security through more streamlined and practical security quantification methods. By building on existing research while introducing new methodologies, this work aims to contribute to more resilient and secure power grid operations.
The above grid security scheduling sets security factors as constraints [19,20], and it is sufficient to satisfy the range of constraints when formulating the scheduling plan, ignoring the resilience of the grid to face uncertainties. Incorporating security into grid scheduling operations has been an important focus in several studies. These studies span various aspects of power system operations, including optimal tidal flow [19,20], economic dispatch [21,22,23], market design [24,25], and electric vehicles [26,27]. For instance, economic dispatch models have been developed to integrate preventive safety constraints with scenario stochasticity [21], while stochastic models have been proposed for coordinating long-term maintenance schedules and short-term security-constrained unit commitments [22]. Additionally, efforts have been made to incorporate frequency stability constraints into economic dispatch models, optimizing the generation costs while ensuring operational and frequency stability [23]. In the realm of market design, approaches have been formulated to improve the transmission grid flexibility by coordinating operators to integrate more wind energy without compromising system security [24]. Similarly, strategies have been developed to enhance the transmission capacity through wind power investments, thereby strengthening the existing transmission network [25]. The rise of electric vehicles and active distribution networks has introduced new uncertainties into the power system. To address these challenges, distributed dispatch co-optimization models have been proposed, leveraging blockchain consensus mechanisms to reduce the generation costs, decrease the daily load variance, and improve system security [26]. Other methodologies have focused on assessing the impact of electric vehicles on transmission grids, such as in the Costa Rican power system [27]. While these studies have successfully incorporated security factors as constraints within their scheduling models [19,20], they often treat security as a static requirement, one that can be satisfied by ensuring the system operates within predefined constraints. However, this approach overlooks the resilience of the grid when faced with uncertainties. As power systems evolve and become more dynamic, there is a growing need for models that not only meet security constraints but also enhance the grid’s ability to withstand and recover from unexpected disruptions. This research aims to address these limitations by proposing a short-term optimal scheduling approach that integrates security quantification with grid resilience, providing a more comprehensive solution to the challenges posed by uncertainties in modern power systems.
The growing share of new energy installations presents significant challenges to the stable operation of power grids. Integrating pumped-storage power plants (PSPPs) offers a promising solution by enhancing grid security and stability. Various studies have explored different aspects of PSPP integration. For example, a day-ahead scheduling model based on price arbitrage has been proposed [28], while another study developed a cost-minimization model that can be solved using a quasi-opposite, fast-converging real-coded genetic algorithm [29]. Research has also focused on optimizing hydrothermal generation scheduling, incorporating both pumped-storage and solar power systems, using a new quasi-contrastive turbulent flow optimization method [30]. Additionally, mixed-integer linear programming has been applied to maximize profits in pumped-storage operations [31]. Further advancements include optimal hourly management models for grid-connected photovoltaic and wind power plants integrated with reversible turbine units [32] and a risk-averse short-term scheduling model that employs a hybrid African vulture optimization algorithm to address multi-layer constraints [33]. Integrated energy systems that combine PSPPs with greenhouse gas emission considerations have also been explored, using meta-heuristic algorithms such as whale optimization to solve both single- and multi-objective functions [34]. Other approaches consider the demand response [35], minimize the supply–demand discrepancies and maintenance costs [36], and model the seasonal dispatch of pumping units [37]. A multi-objective operation model that balances economic, environmental, and stability factors in multi-energy cogeneration systems has also been developed [38]. Despite these efforts, the operation of pumped-storage power plants remains complex, particularly due to the flexibility required for their effective integration into power grids. Current studies have not fully addressed the challenges associated with the frequent switching of operating conditions during PSPP scheduling, which can lead to significant losses in unit efficiency and longevity [37,38]. Therefore, there is an urgent need to explore more efficient and reasonable operation modes for PSPPs to minimize these losses and optimize their contributions to grid stability.
In the field of production scheduling, multiple objectives have to be optimized simultaneously, and the objectives cannot reach the optimal state at the same time, which are collectively known as multi-objective optimization problems [39,40]. The traditional solution method is to convert a complex multi-objective optimization problem into a single-objective problem, and it is difficult to obtain a set of ideal solutions when the problem is complex, high-dimensional, dynamic, multi-modal, or encounters a complex multi-objective problem with constraints [41]. Therefore, it is of great significance to explore new ways and methods to solve high-dimensional and complex optimization problems. Swarm intelligence has also been proposed for solving optimization problems, and the ant colony algorithm inspired by the foraging behavior of ants is the first successful example of swarm intelligence [42,43]. Subsequently, the particle swarm algorithm that evolved from bird foraging was also proposed by researchers [44], which is one of the most popular optimization algorithms nowadays and is able to converge quickly in complex spaces through the exchange of information between individuals. Immediately after, Yan X, She D and Xu Y (2023) [45] used the grey wolf algorithm for selecting optimal wavelet parameters. For model solving, this paper proposes to use the DBO algorithm [46], which takes into account both global exploration and local exploitation and is characterized by a fast convergence speed and high solution accuracy. It is very competitive with state-of-the-art optimization methods in terms of convergence speed, solution accuracy, and stability.
From the analysis of the above literature, it can be seen that there are still deficiencies in the existing literature in the optimal short-term scheduling of power grids. To address the shortcomings, this paper proposes a short-term optimal dispatch method for power grids containing pumped-storage plants based on security quantification, and the main contributions are summarized as follows:
  • The existing grid security evaluation index system is constructed based on instantaneous quantities [11,12,13,14] and evaluates grid security in real time by obtaining the index values through monitoring; it is not applicable to the evaluation of grid security at the stage of prior scheduling plan development. Based on this, this study considers the grid security margin, and we construct a security evaluation index system with a flexibility resource capacity index, flexibility resource response capability index, and branch load balance degree index, which is favorable for the grid security evaluation in the ex ante stage.
  • The existing grid security scheduling sets the security factors as constraints [19,20], and it is sufficient to satisfy the constraint range when formulating the scheduling plan, which ignores the anti-disturbance ability of the grid facing uncertainty. In this paper, the proposed grid security evaluation method is combined with optimal scheduling to establish a short-term optimal scheduling model of the grid based on security quantification, which is conducive to the formulation of reasonable scheduling plans, improving the security margin of the grid and enhancing the anti-interference capability.
  • Existing pumped-storage power plants undergo frequent switching of operating conditions during dispatch [37,38], which causes large losses to the units. This paper explores the differences between the new energy consumption, network loss, and security levels of the power grid under different pumped-storage power plant operation modes, selects the optimal operation mode for pumped-storage power plant scheduling, which is conducive to reducing the switching frequency of the working conditions, and provides a reference for the economic operation of pumped-storage power plants.
The rest of the paper is structured as follows: Section 2 introduces the grid security evaluation model, Section 3 introduces the short-term optimal dispatch model of the grid based on security quantification, Section 4 presents the case study and analyzes the results from multiple perspectives, and Section 5 summarizes the conclusions of the paper.

2. Grid Security Evaluation Model

In order to evaluate the safety of the grid before the stage of scheduling the plan development, this paper constructs a safety evaluation index system with a flexibility resource capacity index, flexibility resource responsiveness index, and branch circuit load balance index from the grid toughness. In view of the fact that conventional evaluation methods are only applicable to evaluating the security status of the grid at a certain moment, the weights of the scheduling time periods are included in the construction of the hierarchical structure to enhance the applicability of the evaluation model to the scheduling program.

2.1. Grid Security Evaluation Index System

Grid security is multi-faceted and complex, and its security level cannot be characterized by a single indicator only; it needs to be described by multiple indexes simultaneously to reflect its overall level in a more comprehensive way. Therefore, this paper constructs a security evaluation index system with a flexibility resource capacity index, flexibility resource response capability index, and branch load balance index to qualitatively and quantitatively reflect the security of the power grid.
(1)
The flexibility resource capacity is calculated as follows:
S M = T S C P i T S C
where S M is the flexibility resource capacity; T S C is the installed capacity of the flexibility resources; and P i is the actual generation power at each node.
(2)
The flexibility resource response capability is calculated as follows:
F R = j = m m S M r j v j j = m m r j = 1
where F R is the flexibility resource response capability; r j is the percentage of different types of flexibility resources remaining; and v j is the speed of response of different types of flexibility resources.
(3)
The branch load balance is calculated as follows:
S U = 1 n i = 1 n f i i = 1 n f i n 2
where S U is the branch load balance; and f i is the branch load ratio (actual branch transmission power/maximum branch transmission power).

2.2. Methodology for Calculating Evaluation Factor Weights

The weight calculation method belongs to the top-priority components in the construction of evaluation models, and the commonly used methods include the entropy weighting method, principal component analysis method, factor analysis method, combination assignment method, hierarchical analysis method, and so on. This paper applies the hierarchical analysis method to decompose the complex problem into several levels and a number of factors and conducts a simple comparison and calculation between the factors to derive the weights of different indexes.
(1)
Constructing a recursive hierarchy:
Applying the hierarchical analysis method to analyze a decision-making problem, it is first necessary to decompose the problem to form a number of levels, according to the inter-relationships between the factors at each level, to form a recursive hierarchical structure that expresses the decision-making problem. The grid security level is located at the target layer, the scheduling time period is located at the guideline layer, and the indexes mentioned in Section 2.1 are located at the indicator layer.
(2)
Creating a judgment matrix:
After establishing the recursive hierarchical structure of the indicator system, starting from the top layer, the judgment matrix is established by comparing the elements in each layer two by two, based on the elements in the previous layer in order from the top to the bottom. The judgment matrix can be described as:
B m × m = B i j
where B i j is the proportional scale of importance of indicator i and indicator j relative to the upper element; m is the total number of indexes for the layer. The judgment matrix B has the following three properties: each element of the matrix is positive; the diagonal elements of the matrix are all 1; and the non-diagonal elements of the matrix are reciprocals of each other.
Regarding the assignment of B i j , the widely used method is the scale method, taking the 1–9 scale method as an example, and the specific meanings are shown in Table 1.
A judgement matrix is formed using a two-by-two comparison between elements.
(3)
Consistency check:
In order to ensure that the application of hierarchical analysis leads to logical conclusions, it is necessary to test the judgment matrix for consistency. The consistency test indicator is described as:
C I = λ max m m 1
where C I is the consistency test index; λ max is the maximum eigenvalue of the judgment matrix; and m is the order of the judgment matrix. The greater the deviation of C I from 0, the worse the consistency of the judgment matrix.
As the order of the judgment matrix increases, it becomes more difficult for the judgment matrix to maintain perfect consistency. In order to measure whether the judgment matrices of different orders are satisfactorily consistent, a stochastic consistency ratio is introduced, described as:
C R = C I R I
where C R is the stochastic consistency ratio; C I is the consistency test index; and R I is the same-order average stochastic consistency ratio in Table A1 in Appendix A. When C R 0.1 , the consistency of the judgment matrix is considered acceptable; when C R > 0.1 , the judgment matrix is considered to need an adjustment.
(4)
Computing the weight vector:
For a general judgment matrix B , there exists B W = λ max W , where λ max is the largest eigenvalue of B , and W is the corresponding eigenvector of λ max . W is normalized and can be approximated as a weight vector for B . The component of W is w i , which is the weight value of element i with respect to the upper element.

2.3. Fuzzy Evaluation Method for Power Grid Security

Using the fuzzy comprehensive evaluation method to evaluate power grid security, first of all, the fuzzy evaluation subset needs to be scaled and defined, and the data set to be evaluated should be divided into a number of grades, and a reasonable grade interval should be constructed. The division of the fuzzy evaluation subset should fully consider the actual situation and the characteristics of the evaluation object, and it cannot be divided simply by equal proportion. Therefore, this paper selects the k-mean clustering algorithm for grade division, and the process is as follows:
4.
Import the sample set D = x 1 , x 2 , , x m , number of clusters clustered K , and maximum iterations N .
5.
Select the initial center of mass: The smallest sample is selected as the first center of mass μ 1 from the data set D . Iterate through all the samples to select the sample with the largest distance d ( x , μ 1 ) from A as the second center of mass μ 1 . Iterate through all the samples again to select the sample with the largest sum of distance d ( x , μ 1 ) from μ 1 and distance d ( x , μ 2 ) from μ 2 as the third center of mass μ 3 and so on; K initial centers of mass μ 1 , μ 2 , , μ K are selected.
6.
Start the n iteration:
① Calculate the distance from the sample point x i to each center of mass μ j ( j = 1 , 2 , , K ) , classifying the sample points x i into clusters corresponding to the minimum distance. Repeat this operation until the division of all sample points is completed, generating the cluster division C 1 n , C 2 n , , C K n for the n iteration.
② Calculate the new center of mass μ j = 1 C j x C j x for the n + 1 iteration based on all the sample points in the j cluster. Repeat this operation until all cluster centers are updated to generate the center of mass μ 1 n + 1 , μ 2 n + 1 , , μ m n + 1 for the n + 1 iteration.
③ If N iterations have been completed or none of the k centers of mass have changed after the update is completed, proceed to step (4); otherwise, go back to step (3) ①, and start the next iteration.
7.
Output the cluster division C = C 1 , C 2 , , C K .
According to the basic theory of the fuzzy comprehensive evaluation method, the evaluation set includes four fuzzy evaluation subsets, namely Distinction, Merit, Intermediate, and Pass, and the set is denoted by v = v 1 , v 2 , v 3 , v 4 = Pass , Intermediate , Merit , Distinction .
For indicator x , its affiliation degree for each fuzzy evaluation subset forms an affiliation vector r = r 1 , r 2 , r 3 , r 4 . Each element r i of r takes values in the range [0,1]. Combine the fuzzy evaluation subset interval division method to obtain five fuzzy evaluation subset interval demarcation points, h 1 , h 2 , h 3 , h 4 , h 5 , and calculate the affiliation degree of x .
(1)
The degree of affiliation to the fuzzy subset v 4 = Distinction is:
r 4 = 1 h 4 x x h 3 h 4 h 3 h 3 < x h 4 0 x < h 3
(2)
The degree of affiliation to the fuzzy subset v 3 = Merit is:
r 3 = 1 h 3 x < h 4 x h 2 h 3 h 2 h 2 x < h 3 h 5 x h 5 h 4 h 4 x < h 5 0 x < h 2 , x h 5
(3)
The degree of affiliation to the fuzzy subset v 2 = Intermediate is:
r 2 = 1 h 2 x < h 3 x h 1 h 2 h 1 h 1 x < h 2 h 4 x h 4 h 3 h 3 x < h 4 0 x < h 1 , x h 4
(4)
The degree of affiliation to the fuzzy subset v 1 = Pass is:
r 1 = 1 x < h 2 h 3 x h 3 h 2 h 2 x < h 3 0 h 3 x
Finally, the affiliation matrix under the indicator system can be formed after the affiliation vector is calculated using the affiliation formulas for all evaluation indexes; according to the weight vector (calculated through the hierarchical analysis in Section 2.2) and affiliation matrix, the fuzzy synthesis operator is used to obtain the fuzzy comprehensive evaluation vector, and the evaluation results of the indicator system as a whole can be determined according to the principle of maximum affiliation.

3. Short-Term Optimal Dispatch Model for Power Grid Based on Security Quantification

A conventional grid security scheduling model ignores the anti-disturbance ability of the grid facing uncertainty. Therefore, this paper constructs a short-term optimal scheduling model based on security quantification for power grids containing pumped-storage plants, combines the security evaluation method with scheduling, and develops a reasonable scheduling plan to improve the security margin of the power grid and enhance the anti-interference capability.

3.1. Objective Function

New energy consumption is an important index to assess the operation of the power grid, and at the same time, it is necessary to coordinate the power generation of new energy, thermal power, and hydropower with the impedance of each branch of the power grid and the conventional power loads at each node as far as possible in the formulation of the scheduling plan to minimize the network loss and improve the operation economy. Therefore, this paper takes the maximum rate of new energy consumption and the minimum network loss as the optimization objectives.
Objective 1: Maximum new energy consumption rate:
max f 1 = 1 T t = 1 T P t w P t w 0.5 + P t p v P t p v 0.5 100 %
Here, P t w is the actual grid-connected power of wind power at t ; P t p v is the actual grid-connected power of photovoltaic power at t ; P t w is the forecasted wind power at t ; and P t p v is the forecasted photovoltaic power at t .
Objective 2: Minimum grid loss:
min f 2 = t = 1 T ( i , k ) n P i , t 2 + Q i , t 2 V i , t 2 R i k
Here, P i , t is the active power of node i at t ; Q i , t is the reactive power of node i at t ; V i , t is the voltage of node i at t ; and R i k is the line resistance between node i and node k .

3.2. Constraint

(1)
New energy power plant output constraints are as follows:
0 P t w P t w 0 P t p v P t p v
where P t w is the actual grid-connected power of wind power at t ; P t p v is the actual grid-connected power of photovoltaic power at t ; P t w is the forecasted wind power at t ; and P t p v is the forecasted photovoltaic power at t .
(2)
Thermal power plant output constraints are as follows:
S t h η P t t h S t h
where P t t h is the actual grid-connected power of thermal power at t ; S t h is installed thermal power capacity; and η is the minimum thermal power output technical indicator.
(3)
Hydroelectric power plant output constraints are as follows:
N t h min N t h N t h max N t h = k Q E t Δ H t Δ H t = Z u p t ¯ Z t a i l t Z u p t = f Z V V t Z t a i l t = f Z Q Q O t
where N t h min , N t h , and N t h max are the lower limit of generating power, generating power, and the upper limit of generating power at t of a hydroelectric power plant; k is the coefficient of power generation in hydroelectric power plants; Q E t is the flow rate quoted for hydroelectric power generation at t ; Δ H t is the water head at t ; Z u p t ¯ is the average pre-dam level at t ; Z u p t and Z t a i l t are the pre-dam level and the post-dam level at t ; f Z V is the water level–capacity relationship of the hydroelectric power plant; f Z Q is the discharge flow–tail water level relationship of a hydroelectric power plant; V t is the reservoir capacity of the hydroelectric power station at t ; and Q O t is the discharge flow from the hydroelectric power plant at t .
(4)
Pumped-storage plant output constraints are as follows:
0 P t g e n S g p 0 P t p u m p S g p P t g e n × P t p u m p = 0
where P t g e n is the power generation from pumped-storage plants at t ; P t p u m p is the pumping power from pumped-storage plants at t ; and S g p is the installed capacity of pumped-storage power plants. At any given moment, the plant cannot have simultaneous pumping and generation, and the generation and pumping states are mutually exclusive.
(5)
Network power balance constraints are as follows:
P j = U j k A ( j ) U k ( G j k cos δ j k + B j k sin δ j k ) Q j = U j k A ( j ) U k ( G j k sin δ j k B j k cos δ j k )
where P j is the active power of node j ; Q j is the reactive power of node j ; δ j k is the voltage phase angle difference; G j k and B j k are electrical conductance and susceptance; and A j is the set of nodes to which node j is connected.
(6)
Branch circuit capacity constraints are as follows:
0 L L ¯
where L ¯ is the branch limit transmission capacity.
(7)
Node voltage constraints are as follows:
U j ¯ U j U j ¯
where U j ¯ and U j ¯ are the node voltage upper and lower limits.

3.3. Solution Algorithm

In this paper, an intelligent optimization algorithm is used to solve the model. The Dung Beetle Optimization (DBO) algorithm is a type of intelligent optimization algorithm that is inspired by the biological behavioral process of dung beetles and has the characteristics of a strong optimization-seeking ability and fast convergence speed. The algorithm simulates the behaviors of dung beetles, such as ball rolling, dancing, foraging, stealing, and reproduction, by designing particles.
(1)
Dung Beetle Roller:
① Accessibility mode:
Dung beetles can use cues from celestial bodies (in particular the sun, moon, and polarized light) to navigate the dung ball along a straight line during rolling; sunlight, for example, affects the trajectory of the movement, which is curved or elliptical; natural factors (e.g., wind and uneven ground) cause the dung beetles to deviate from their original direction. To simulate the rolling behavior, the dung beetle is required to move in a given direction throughout the search space, assuming that only the intensity of the light source affects the dung beetle’s path.
x i ( t + 1 ) = x i ( t ) + a k x i ( t 1 ) + b Δ x Δ x = x i ( t ) X W
Here, t is the number of iterations; x i ( t ) is location information of the i dung beetle at t ; a is the natural coefficient taken as 1 or −1, where −1 means deviation from the original direction, and 1 means no deviation; k 0 , 0.2 is a constant indicating the deflection coefficient; b 0 , 1 is the coefficient of influence of the light intensity change on the position; Δ x is to simulate changes in the light intensity; and X W is the worst position.
② Obstacle mode:
When a dung beetle encounters an obstacle and is unable to move forward, it needs to reorient itself by dancing with the aim of obtaining a new route. To simulate the dancing behavior, the tangent function is used to obtain the new rolling direction:
x i ( t + 1 ) = x i ( t ) + tan θ x i ( t ) x i ( t 1 )
where θ 0 , π is the deflection angle. When θ = 0 , 0.5 π , π , the dung beetle’s location is not updated.
(2)
Dung beetle laying eggs:
In nature, dung balls are rolled by dung beetles to a safe hiding place. The selection of suitable spawning sites is crucial for dung beetles in order to provide a safe environment for their offspring. A regional boundary selection strategy for modeling the spawning of female dung beetles is defined as:
L b = max X × 1 R , L b U b = max X × 1 + R , U b R = 1 t T max
where L b and U b are the lower and upper boundaries of spawning areas; L b and U b are the lower and upper bounds for decision variables; X is the current localized optimal position; and T max is maximum iterations.
Once the spawning region has been determined, female dung beetles select the egg balls in this region to lay their eggs, with each female dung beetle laying only one egg in each iteration. The boundary range of the spawning region is dynamically changing, and the position of the egg ball is also dynamic during the iteration process, denoted as:
B i t + 1 = X + b 1 × B i t L b + b 2 × B i t U b
where B i t is the location information of the i dung beetle’s sperm at t ; and b 1 and b 2 denote two independent random vectors of size 1 D , where D denotes the dimension of the optimization problem, and the positions of the ovoid spheres are strictly limited.
(3)
Baby dung beetle foraging:
Some dung beetles that have grown to adulthood will burrow out of the ground to forage for food, called baby dung beetles. It is also necessary to establish optimal dung beetle areas to guide the dung beetles to forage for food, and the boundaries of the optimal dung beetle areas are defined as follows:
L b b = max X b × 1 R , L b U b b = max X b × 1 + R , U b R = 1 t T max
where L b b and U b b are the lower and upper boundaries of foraging areas; L b and U b are the lower and upper bounds for decision variables; X b is the current best position for foraging in foraging areas; and T max is the maximum iterations.
x i t + 1 = x i t + C 1 × x i t L b b + C 2 × x i t U b b
Here, x i t is the location information of the i baby dung beetle at t ; C 1 is a random number obeying a normal distribution; and C 2 is a random vector belonging to 0 , 1 .
(4)
Dung Beetle Stealing:
There are also dung beetles known as stealing dung beetles that will steal dung balls from other dung beetles, which is a very common phenomenon in nature, and the location update information for the stealing dung beetle is defined as follows:
x i t + 1 = S × g × x i t X + x i t X b + X b
where x i t is the location information of the i stealing dung beetle at t ; g is the independent random vectors of size 1 D , which follows a normal distribution; and S is a constant value.

3.4. Compromise Solution Selection Method

The entropy weight method is used for selecting the compromise solution in the Pareto solution set, and the process is as follows:
(1)
Un-dimensioned process:
① For a positive index, the larger the value of the indicator, the better. The treatment is as follows:
χ i j = x i j m j M j m j
② For a reverse index, the smaller the value of the indicator, the better. The treatment is as follows:
χ i j = M j x i j M j m j
where M j is the maximum value of the target j ; and m j is the minimum value of the target j .
(2)
Target normalization:
p i j = χ i j i = 1 n χ i j
Here, χ i j is the dimensionless target value; and p i j is the normalized target value. n is the number of solutions in the solution set.
(3)
Calculation of the entropy of target j :
e j = 1 ln n i = 1 n p i j ln p i j , 0 e j 1
Here, e j is the entropy value of the target j .
(4)
Calculation of the coefficient of variation:
g j = 1 e j
Here, g j is the coefficient value of the target j .
(5)
Calculation of the weights of target j :
w j = g j j = 1 m g j
Here, w j is the weight of the target j . The optimal solution is selected in the solution set based on the target weights.

3.5. Short-Term Optimal Dispatch Methodology Process for Pumped-Storage-Containing Power Plant Grid Based on Security Quantification

The flowchart of the short-term optimal dispatch method of the power grid containing a pumped-storage power station based on security quantification is shown in Figure 1, and the specific steps are as follows:
(1)
Construct the grid security evaluation index system by taking the grid security level as the target layer, the scheduling time period as the criterion layer, and the flexibility resource capacity index, flexibility resource responsiveness index, and branch load balance degree index as the index layer.
(2)
Obtain typical load curves, build the judgment matrix according to the load size using the scale method, judge whether the matrix meets the consistency, and if it meets it, calculate the weights of each scheduling period, or else reconstruct the judgment matrix.
(3)
According to the evaluation indexes, use the scale method to establish the judgment matrix, determine whether the matrix meets the consistency, and if the conditions are met, calculate the weights of each index; otherwise, reconstruct the judgment matrix.
(4)
Consider the constraints to initialize the decision variables and algorithm parameters, as different kinds of particles are updated according to their respective updating principles; the objective function values are calculated, while the indexes corresponding to the solutions are calculated and retained as the data set.
With the particle update, the particle type is first determined. If it is the Dung Beetle Roller in accessibility mode, update the position according to Equation (20); if it is the Dung Beetle Roller in obstacle mode, update the position according to Equation (21); if it is the dung beetle laying eggs, determine the spawning area according to the local optimal position using Equation (22), and update the position within the area according to Equation (23); if it is baby dung beetle foraging, determine the foraging area according to the global optimal position using Equation (24), and within the area, update the position according to Equation (25); in the case of Dung Beetle Stealing, obtain the global optimal position and local optimal position, and update the position by combining Equation (26).
(5)
After all particles are updated, one iteration is completed. At this point, according to the data set retained from the last iteration and the data set collected in this iteration, divide the fuzzy evaluation subset using mean clustering, select the half of the data set closest to the center of mass in each interval to be retained, erase the rest of the data set, release the memory, and continue to the next iteration.
(6)
At the end of the iteration, output the Pareto solution set, and calculate the index affiliation according to the latest fuzzy evaluation subset interval.
(7)
Combine the weights to evaluate the grid security level of the corresponding solutions, obtain the Pareto solution sets corresponding to different levels, and select the optimal scheduling plan using the entropy weight method.

4. Example Analysis

4.1. Description of Instances

The improvement in the term IEEE 30-bus grid accessed by a pumped-storage power plant is used as an example to verify the effectiveness of the proposed modeling method, and its basic structure is shown in Figure 2. Nodes 1 and 27 are thermal power plant access nodes with capacities of 80 and 55 MW, respectively; node 2 is a hydroelectric power plant access node with a capacity of 80 MW; node 13 is a pumped-storage power plant access node with a capacity of 40 MW; node 22 is a photovoltaic power plant access node with a capacity of 50 MW; and node 23 is a wind power plant access node with a capacity of 30 MW, and the limit of the transmission capacity of the line is shown in Table 2.
Typical daily new energy forecasts and load processes are shown in Figure 3.
Pumped-storage power plants operate flexibly, but the frequent switching of operating conditions will cause large losses to the unit and shorten the service life of the unit. Four pumped-storage power plant operation scenarios are proposed for comparative analysis: operation mode 1: one pumping and one generating, which means that the pumped-storage power plant completes one pumping and one generating in one dispatching cycle; operation mode 2: one pumping and two generating; operation mode 3: two pumping and one generating; operation mode 4: two pumping and two generating. It is assumed that there is at least a 1 h interval between the pumping condition and power generation condition.

4.2. Calculation of Scheduling Time Period Weights and Indicator Weights

Load forecasting, according to the load size of the importance of the time period of two–two comparisons, and establish the judgment matrix. The judgment principle is load peak time importance > load trough time importance, and the judgment matrix of scheduling time is shown in Equation (A1) in Appendix A. The weights of the scheduling periods are shown in Table 3.
For the index in the security evaluation index system, the importance of the flexibility resource capacity indicator > the importance of the branch load balance degree indicator > the importance of the flexibility resource responsiveness indicator, and the judgment matrix of the security index is:
1 0.5 0.33 2 1 0.67 3 1.5 1
The weights of the security index are shown in Table 4.

4.3. Optimized Scheduling Results

The number of populations in the DBO algorithm was set to 200, the number of iterations was set to 200, and both the model and algorithm programs were written in the Matlab platform. The model running environment is set as follows: the CPU is Intel(R)Core(TM)[email protected]; the memory is 16G; the operating system is Windows 10; the software environment is Matlab version 2022a; and the Pareto solution set for solving the optimization model is shown in Figure 4.
As can be seen from Figure 4, there is an obvious competitive relationship between the grid new energy consumption rate and network loss. For the flexibility resource responsiveness index, the flexibility resource response rate is pumped storage > hydropower > thermal power, and the response rate is taken as 3, 2, and 1. K-mean clustering is carried out in the iterative process, and the clustering is completed by setting K = 5. The clusters obtained from clustering are rank ordered from good to bad, i.e., rank one corresponds to good, and rank five corresponds to bad. The ensemble of rank one and rank two is set as excellent in the fuzzy evaluation subset, rank three is set as good in the fuzzy evaluation subset, rank four is set as medium in the fuzzy evaluation subset, and rank five is set as qualified in the fuzzy evaluation subset. The dynamically updated fuzzy evaluation subsets for each scenario are shown in Table 5.
According to the fuzzy evaluation subset of the solutions in the Pareto solution set, to calculate the degree of affiliation, combined with the weight to evaluate the grid security level. According to the grid security level, the solution set is reclassified, and the entropy weight method is used to select the compromise solution; the Pareto solution set under each level is shown in Figure 5, and the range of new energy consumption and the range of network loss of each grid security level under different operation modes are shown in Table 6.
From Figure 5 and Table 6, it can be seen that under the operation mode of one pump and one generator, when the grid security level is in the optimal range, compared with the other levels, the guaranteed rate of new energy consumption is the smallest at 94.76%. When the grid security level is good, the maximum guaranteed rate of new energy consumption is 95.56%. If the decision maker favors the new energy consumption rate, the new energy consumption rate can reach 97.55%, and the grid security level is medium; if the decision maker favors the grid loss, the minimum loss is 53.35 MW, and the grid security level is qualified. When the decision maker favors the grid security level, the new energy consumption decreases by 2.79% at most, and the grid loss increases by 3.37% at most.
Under the operation mode of one pump and two generators, when the grid security level is in the optimal range, compared with the other levels, the guaranteed rate of new energy consumption is at least 95.21%. When the grid security level is good, the maximum guaranteed rate of new energy consumption is 95.93%. If the decision maker prefers the new energy consumption rate, the new energy consumption rate can reach 98.51%, and then the grid security grade is qualified; if the decision maker prefers the grid loss, the minimum loss is 54.25 MW, and then the grid security grade is excellent. When the decision maker favors the grid security level, the new energy consumption decreases by 3.3% at most, and the grid loss increases by 1.9% at most.
Under the operation mode of two pumping and one generating, when the grid security level is within the good range, compared with the other levels, the guaranteed rate of new energy consumption is 92.24% at the minimum. When the grid security level is qualified, the maximum guaranteed rate of new energy consumption is 93.02%. If the decision maker prefers the new energy consumption rate, the new energy consumption rate can reach 97.22%, and the grid security grade is good; if the decision maker prefers the network loss, the minimum network loss is 54.67 MW, and the grid security grade is good. When the decision maker favors the grid security level, the new energy consumption decreases by up to 4.64%, and the grid loss increases by up to 2.74%.
Under the operation mode of two pumps and two generators, when the grid security level is within the qualified range, compared with the other levels, the guaranteed rate of new energy consumption is at least 95.27%. When the grid security level is excellent, the maximum guaranteed rate of new energy consumption is 96.24%. If the decision maker favors the new energy consumption rate, the new energy consumption rate can reach 98.29%, and then the grid security level is qualified; if the decision maker favors the grid loss, the minimum loss is 55.18 MW, and then the grid security level is qualified. When the decision maker favors the grid security level, the new energy consumption decreases by 2.05% at most, and the grid loss increases by 2.81% at most.
Table 7 shows the optimization results of the compromise solution for different operation modes of the pumped-storage power plant, and provides an analysis of the impact of the change of different operation modes in the pumped-storage power plant through a comparison of different objectives.
From the perspective of new energy consumption, comparing the index of the new energy consumption rate, the operation mode of “pumping once and generating twice” for the pumped-storage power station is better than “pumping once and generating once”, better than “pumping twice and generating twice”, and better than “pumping twice and generating once”. From the economic point of view, comparing the system network loss index, the operation mode of “pumping once and generating twice” for the pumped-storage power station is superior to “pumping once and generating once”, “pumping twice and generating twice”, and “pumping twice and generating once”. Through the above comparison, it can be seen that the operation mode of one pump and two generators of the pumped-storage power station is optimal because the typical load curve shows a double hump shape, and there are two peak hours, the afternoon peak and the evening peak. Arranging two times for power generation in a pumped-storage power station can reduce the pressure of the power supply in the load peak, make the grid current reasonable, reduce the network loss, and make the line capacity abundant. Arranging pumping once in the load valley is conducive to the consumption of wind power at night, which improves the rate of new energy consumption.
The results of the optimization of the power output of the grid for each time period and for each scenario are shown in Figure 6.
When the pumped-storage power station is set in the operation state of “one pumping and one generating”, it is in the pumping condition during the low load period from 1 to 6 h and in the generating condition during the evening peak from 17 to 22 h, during which the load is larger and the photovoltaic power generation capacity is weaker, and the reasonable arrangement of the pumped-storage power station at this time is conducive to reducing the pressure of the power supply. When the pumped-storage power station is set in the “one pumping and two generating” operation state, it is in the pumping condition during the hours 1–6 in the load valley and is in the generating condition during the hours 12–14 in the afternoon peak and 19–22 in the evening peak; compared with “one pumping and one generating”, this kind of operation can take care of two load peak hours at the same time, which is beneficial to the power supply pressure. Compared with “one pumping and one generating”, this operation can simultaneously take care of two load peak hours, which is conducive to the reasonable distribution of the grid current and reduction in network loss. When the pumped-storage power station sets the “two pumping and one generating” operation state, it is in the pumping operation at 1–4 and 7–9 h and is in the generating operation at 17–22 h; this operation mode has a big difference in the load curve, so it divides the load valley time into two parts to meet the conditions; the primary power generation does not take into account the afternoon peak time, so this operation mode is not ideal. However, due to the water balance constraint, the pumped-storage power generation capacity is strong in the evening peak hours compared with the other operation methods. When the pumped-storage power station is set to the “two pumping and two generating” operation, it is in pumping condition from 1 to 4 and 7 to 9 h and is in the generating condition in the afternoon peak from 12 to 14 h and the evening peak from 19 to 22 h, which can better deal with the peak load hours, and the two pumping are slightly redundant.
In order to verify the validity of the proposed model, the model with the objectives of maximum new energy consumption and minimum grid loss of the system is used as a comparison model, which is called the “traditional model”. The operation mode of the pumped-storage plant is selected as “pumping once and generating once”, and the optimization results of the two models are shown in Table 8 to evaluate the effectiveness of the proposed model through the comparison of different objectives.
In the dry water period, compared with the traditional model, the new energy consumption rate of the proposed model is increased by 0.13%, the grid loss is increased by 0.16%, and the security level is improved. The above analysis shows that although the grid loss in the proposed model is large, the optimization target value of the proposed model incorporates the grid security level, which improves the ability of the optimization results to cope with accidents and makes the grid operation state more secure. In the flood season, compared with the traditional model, the new energy consumption rate of the proposed model is reduced by 2.1%, the grid loss is reduced by 1.3%, and the grid security level is improved. The above analysis shows that the proposed model has a slight loss in the new energy consumption rate and grid loss indicators compared with the traditional model, but the ability to cope with accidents is greatly improved. From the perspective of different periods, during the flood season, the upstream water increases, and the proportion of hydropower generation increases, resulting in a decrease in the new energy consumption rate.
Table 9 shows the results of the calculation time of the two models in different periods. The solution time of the proposed model is slightly larger than that of the traditional model, but both models can complete the solution within a few minutes, which meets the time-sensitive requirements of power generation programming in actual power dispatch.

4.4. Sensitivity Analysis of the Increase in the Installed Capacity of New Energy Sources

A wind and light new energy power station is in the stage of vigorous development, and the future installed new energy capacity is expected to account for 40% of the total installed capacity of the system; at present, the improvement in the term IEEE 30-bus grid in the installed new energy capacity accounted for 24% only. Under the prospect of growing the installed new energy capacity, the large-scale integration of new energy into the grid will inevitably change the operation mode of the existing power structure. The growth rate of the installed new energy capacity is analyzed in different typical periods, taking into account the different operation modes of pumped-storage power plants.
Figure 7 analyzes the sensitivity of the grid’s new energy consumption rate to the growth rate of the installed wind and PV capacities under the existing channel capacity.
As the installed capacities of wind power and photovoltaic (PV) power increase, the grid’s new energy consumption stays the same at first, and then gradually decreases. This is because at the beginning, the installed wind power and photovoltaic capacities accounted for a small proportion of the installed capacity of the grid; the system flexibility resources are sufficient, so the new energy sources can be fully absorbed. When the proportion of the installed capacity of new energy reaches 17%, under the operation mode of pumped-storage power plant with two pumps and one generator, the rate of new energy consumption starts to decrease, considering the system network loss and security level. Upon adjusting the operation mode of the pumped-storage power station, when the proportion of the installed new energy capacity reaches 20%, the new energy consumption can still be fully absorbed.
Figure 8 analyzes the sensitivity of grid network losses to the growth rate of the installed wind and PV capacities given the available channel capacity.
With the increase in the installed capacities of wind power and photovoltaic power, the network loss of the power grid first decreases, and then gradually rises. This is because there is a certain complementary characteristic between new energy and load, which is conducive to the coordination of the power supply and conventional power load at the node, and it reduces the network loss. When the proportion of the installed new energy capacity reaches 22–24%, the system network structure and load remain unchanged, and the network loss gradually increases. When the proportion of the installed new energy capacity reaches 35%, the network loss increases slowly due to the sacrifice of the new energy consumption rate index.

5. Conclusions

In this paper, a short-term optimal scheduling method based on security quantification is proposed for grid security optimization of pumped-storage-containing power plants. Combining the security evaluation method with scheduling, a short-term optimized scheduling model of the grid based on security quantification is constructed according to the grid security evaluation model. The improvement in the term IEEE 30-bus grid accessed by the pumped-storage power station is used as an example for research, and the results show that the method proposed in this paper can improve the security of the power grid while pursuing the new energy consumption rate and economy, and it can provide support for the safe and stable operation of the power system. Regarding pumped-storage power plants, it is recommended to combine the load curve and reasonably select the operation mode according to the number of peak and trough loads. With the increase in the installed capacities of wind power and photovoltaic power, the reasonable selection of the intervention bus and configuration capacity of each power source can reduce the trends of new energy reduction and grid loss increase. In the future, with the continuous acquisition of new information, the practical application can be solved on a rolling time scale, realizing the dynamic update in the power generation plan.

Author Contributions

H.L.: methodology, simulation, data collection, software, visualization, and writing—original draft, preparation. X.Q. and B.Z.: conceptualization, methodology, software, data curation, and visualization. G.Z.: supervision, validation, resources, and writing—review and editing. Q.X.: writing—review and editing. Y.W.: investigation. R.W.: formal analysis. All authors have read and agreed to the published version of the manuscript.

Funding

The work described in this paper was supported by the Electric Power Research Institute of State Grid Shanxi Electric Power Company 5226KY23001M.

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Conflicts of Interest

Authors Hua Li, Qiuyi Xi, Ruogu Wang and Yanxin Wang were employed by the Electric Power Research Institute. Author Xiangfei Qiu was employed by the Electric Power Research Institute. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest. The authors declare that this study received funding from Electric Power Research Institute of State Grid Shanxi Electric Power Company. The funder was not involved in the study design, collection, analysis, interpretation of data, the writing of this article or the decision to submit it for publication.

Appendix A

Table A1. Randomized consistency RI table.
Table A1. Randomized consistency RI table.
n order123456
RI000.520.891.121.26
n order789101112
RI1.361.411.461.491.521.54
n order131415161718
RI1.561.581.591.59431.60641.6133
n order192021222324
RI1.62071.62921.63581.64031.64621.6497
1 1.25 0.83 1.67 2.5 5 0.71 0.63 0.56 0.5 0.21 0.45 0.22 0.28 0.33 0.29 0.31 0.25 0.42 0.36 0.26 0.38 0.23 0.24 0.8 1 0.67 1.3 2 4 0.57 0.5 0.44 0.4 0.17 0.36 0.17 0.22 0.27 0.24 0.25 0.2 0.33 0.29 0.21 0.31 0.18 0.19 1.2 1.5 1 2 3 6 0.86 0.75 0.67 0.6 0.25 0.55 0.26 0.33 0.4 0.35 0.38 0.3 0.5 0.43 0.32 0.46 0.27 0.29 0.6 0.75 0.5 1 1.5 3 0.42 0.38 0.33 0.3 0.13 0.27 0.13 0.17 0.2 0.18 0.19 0.15 0.25 0.21 0.16 0.23 0.14 0.14 0.4 0.5 0.33 0.67 1 2 0.29 0.25 0.22 0.2 0.08 0.18 0.09 0.11 0.13 0.12 1.3 0.1 0.17 0.14 0.11 0.15 0.09 0.1 0.2 0.25 0.17 0.33 0.5 1 0.14 0.13 0.11 0.1 0.04 0.09 0.04 0.06 0.07 0.06 0.06 0.05 0.08 0.07 0.05 0.08 0.05 0.05 1.4 1.75 1.17 2.33 3.5 7 1 0.88 0.78 0.7 0.29 0.64 0.3 0.39 0.47 0.41 0.44 0.35 0.58 0.5 0.37 0.54 0.32 0.33 1.6 2 1.33 2.67 4 8 1.14 1 0.89 0.8 0.33 0.73 0.35 0.44 0.53 0.47 0.5 0.4 0.67 0.57 0.42 0.62 0.36 0.38 1.8 2.25 1.5 3 4.5 9 1.29 1.13 1 0.9 0.38 0.82 0.39 0.5 0.6 0.53 0.56 0.45 0.75 0.64 0.47 0.69 0.41 0.43 2 2.5 1.67 3.33 5 10 1.43 1.25 1.11 1 0.42 0.91 0.43 0.56 0.67 0.59 0.63 0.5 0.83 0.71 0.53 0.77 0.45 0.47 4.8 6 4 8 12 24 3.43 3 2.67 2.4 1 2.18 1.04 1.33 1.6 1.41 1.5 1.2 2 1.71 1.26 1.85 1.09 1.14 2.2 2.75 1.83 3.67 5.5 11 1.57 1.38 1.22 1.1 0.46 1 0.48 0.61 0.73 0.65 0.69 0.55 0.92 0.79 0.58 0.85 0.5 0.52 4.6 5.75 3.83 7.67 11.5 23 3.29 2.88 2.56 2.3 0.96 2.09 1 1.28 1.53 1.35 1.44 1.15 1.92 1.64 1.21 1.77 1.05 1.1 3.6 4.5 3 6 9 18 2.57 2.25 2 1.8 0.75 1.64 0.78 1 1.2 1.06 1.13 0.9 1.5 1.29 0.95 1.38 0.82 0.85 3 3.75 2.5 5 7.5 15 2.14 1.88 1.67 1.5 0.63 1.36 2.65 0.83 1 0.88 0.94 0.75 1.25 1.07 0.79 1.15 0.68 0.71 3.4 4.25 2.83 5.67 8.5 17 2.43 2.13 1.89 1.7 0.71 1.55 0.74 0.94 1.13 1 1.06 0.85 1.42 1.21 0.89 1.31 0.77 0.81 3.2 4 2.67 5.33 8 16 2.29 2 1.78 1.6 0.67 1.45 0.70 0.89 1.07 0.94 1 0.8 1.33 1.14 0.84 1.23 0.73 0.76 4 5 3.33 6.67 10 20 2.86 2.5 2.22 2 0.83 1.82 0.87 1.11 1.33 1.18 1.25 1 1.67 1.42 1.05 1.54 0.91 0.95 2.4 3 2 4 6 12 1.71 1.5 1.33 1.2 0.5 1.09 0.52 0.67 0.8 0.71 0.75 0.6 1 0.86 0.63 0.92 0.55 0.57 2.8 3.5 2.33 4.67 7 14 2 1.75 1.56 1.4 0.58 1.27 0.61 0.78 0.93 0.82 0.88 0.7 1.17 1 0.74 1.08 0.64 0.67 3.8 4.75 3.17 6.33 9.5 19 2.71 2.38 2.11 1.9 0.79 1.73 0.83 1.06 1.27 1.12 1.19 0.95 1.58 1.36 1 1.46 0.86 0.90 2.6 3.25 2.17 4.33 6.5 13 1.86 1.63 1.44 1.3 0.54 1.18 0.57 0.72 0.87 0.76 0.81 0.65 1.08 0.93 0.68 1 0.59 0.62 4.4 5.5 3.67 7.33 11 22 3.14 2.75 2.44 2.2 0.92 2 0.96 1.22 1.47 1.29 1.38 1.1 1.83 1.57 1.16 1.69 1 1.05 4.2 5.25 3.5 7 10.5 21 3 2.63 2.33 2.1 0.88 1.91 0.91 1.17 1.4 1.24 1.31 1.05 1.75 1.5 1.11 1.62 0.95 1

References

  1. Zhang, D.; Zhu, H.; Zhang, H.; Goh, H.H.; Liu, H.; Wu, T. Multi-Objective Optimization for Smart Integrated Energy System Considering Demand Responses and Dynamic Prices. IEEE Trans. Smart Grid 2022, 13, 1100–1112. [Google Scholar] [CrossRef]
  2. Guo, Z.; Zhang, R.; Wang, L.; Zeng, S.; Li, Y. Optimal operation of regional integrated energy system considering demand response. Appl. Therm. Eng. 2021, 191, 116860. [Google Scholar] [CrossRef]
  3. Berjawi, A.E.H.; Walker, S.L.; Patsios, C.; Hosseini, S.H.R. An evaluation framework for future integrated energy systems: A whole energy systems approach. Renew. Sustain. Energy Rev. 2021, 145, 111163. [Google Scholar] [CrossRef]
  4. Wang, L.; Hou, C.; Ye, B.; Wang, X.; Yin, C.; Cong, H. Optimal Operation Analysis of Integrated Community Energy System Considering the Uncertainty of Demand Response. IEEE Trans. Power Syst. 2021, 36, 3681–3691. [Google Scholar] [CrossRef]
  5. Zheng, S.; Sun, Y.; Li, B.; Qi, B.; Zhang, X.; Li, F. Incentive-based integrated demand response for multiple energy carriers under complex uncertainties and double coupling effects. Appl. Energy 2021, 283, 116254. [Google Scholar] [CrossRef]
  6. Kandpal, B.; Pareek, P.; Verma, A. A robust day-ahead scheduling strategy for EV charging stations in unbalanced distribution grid. Energy 2022, 249, 123737. [Google Scholar] [CrossRef]
  7. Liu, X. Research on flexibility evaluation method of distribution system based on renewable energy and electric vehicles. IEEE Access 2020, 8, 109249–109265. [Google Scholar] [CrossRef]
  8. Arias, M.B.; Kim, M.; Bae, S. Prediction of electric vehicle charging-power demand in realistic urban traffic networks. Appl. Energy 2017, 195, 738–753. [Google Scholar] [CrossRef]
  9. Gong, S.; Cheng, V.H.; Ardeshiri, A.; Rashidi, T.H. Incentives and concerns on vehicle-to-grid technology expressed by Australian employees and employers. Transp. Res. Part D Transp. Environ. 2021, 98, 102986. [Google Scholar] [CrossRef]
  10. Chunqi, Z.; Yue, X.; Tale, F.; Ping, R.; Yifan, Q.; Youbo, L. Estimation of electric vehicle charging demand and V2G adjustable capacity driven by trajectory data. Autom. Electr. Power Syst. 2022, 46, 46–55. [Google Scholar]
  11. Delkhosh, H.; Seifi, H. Economic Valuation of Power Grid Frequency Security and the Participants Share Specification. IEEE Trans. Power Syst. 2023, 38, 1487–1500. [Google Scholar] [CrossRef]
  12. Xu, X.; Wang, K.; Lu, Y.; Tian, Y.; Hu, L.; Zhong, M. Research on Performance Evaluation Index System and Assessment Methods for Microgrid Operation in the Port Area. Sustainability 2023, 15, 15019. [Google Scholar] [CrossRef]
  13. Xiao, J.; Lin, X.; Jiao, H.; Song, C.; Zhou, H.; Zu, G.; Zhou, C.; Wang, D. Model, calculation, and application of available supply capability for distribution systems. Appl. Energy 2023, 348, 121489. [Google Scholar] [CrossRef]
  14. Warnock, J.; McMillan, D.; Pilgrim, J.; Shenton, S. Failure Rates of Offshore Wind Transmission Systems. Energies 2019, 12, 2682. [Google Scholar] [CrossRef]
  15. Dong, F.; Zhang, Y.; Shang, M. Multi-criteria comprehensive evaluation of distributed energy system. Proc. CSEE 2016, 36, 3214–3222. (In Chinese) [Google Scholar]
  16. Zhang, S.; Lu, S. Comprehensive energy system evaluation method for park microgrid. Power Syst. Technol. 2018, 42, 2431–2438. (In Chinese) [Google Scholar]
  17. Wang, S.; Ye, G.M. Comprehensive Evaluation of joint Operational Command Information System Based on CITIC-TOPSlS. Ship Electron. Eng. 2021, 41, 15–19. [Google Scholar]
  18. Wang, H.; Li, Y.; Liu, T. Optimizing lrrigation Scheduling for Greenhouse Crops Using the CRITlC-TOPSIS Framework. J. lrrig. Drain. 2023, 42, 52–59. [Google Scholar]
  19. Dvorkin, Y.; Henneaux, P.; Kirschen, D.S.; Pandžić, H. Optimizing primary response in preventive security-constrained optimal power flow. IEEE Syst. J. 2018, 12, 414–423. [Google Scholar] [CrossRef]
  20. Nguyen, N.; Almasabi, S.; Bera, A.; Mitra, J. Optimal power flow incorporating frequency security constraint. IEEE Trans. Ind. Appl. 2019, 55, 6508–6516. [Google Scholar] [CrossRef]
  21. Paniagua-Contreras, J.M.; Gutiérrez, G.; Tovar, J.H.; Hinojosa-Mateus, V. Stochastic Preventive Security-Constrained Economic Dispatch. IEEE Lat. Am. Trans. 2022, 20, 171–179. [Google Scholar] [CrossRef]
  22. Wu, L.; Mohammad, S.; Fu, Y. Security-Constrained Generation and Transmission Outage Scheduling with Uncertainties. IEEE Trans. Power Syst. 2010, 25, 1674–1685. [Google Scholar]
  23. Javadi, M.; Amraee, T.; Capitanescu, F. Look ahead dynamic security-constrained economic dispatch considering frequency stability and smart loads. Int. J. Electr. Power Energy Syst. 2019, 108, 240–251. [Google Scholar] [CrossRef]
  24. Thakurta, P.G.; Maeght, J.; Belmans, R.; Van Hertem, D. Increasing Transmission Grid Flexibility by TSO Coordination to Integrate More Wind Energy Sources While Maintaining System Security. IEEE Trans. Sustain. Energy 2015, 6, 1122–1130. [Google Scholar] [CrossRef]
  25. Alshamrani, A.M.; El-Meligy, M.A.; Sharaf, M.A.F.; Saif, W.A.M.; Awwad, E.M. Transmission Expansion Planning Considering a High Share of Wind Power to Maximize Available Transfer Capability. IEEE Access 2023, 11, 23136–23145. [Google Scholar] [CrossRef]
  26. Hu, W.; Yao, W.; Hu, Y.; Li, H. Collaborative Optimization of Distributed Scheduling Based on Blockchain Consensus Mechanism Considering Battery-Swap Stations of Electric Vehicles. IEEE Access 2019, 7, 137959–137967. [Google Scholar] [CrossRef]
  27. Adolfo, G.G.; Rebeca, S.; Alberto, L.R. Impact of electric vechicles on power transmission grids. Heliyon 2023, 9, e22253. [Google Scholar]
  28. Pan, L.; Xu, X.; Liu, J.; Hu, W. Adaptive robust scheduling of a hydro/photovoltaic/pumped-storage hybrid system in day-ahead electricity and hydrogen markets. Sustain. Cities Soc. 2023, 95, 104571. [Google Scholar] [CrossRef]
  29. Basu, M.; Das, S. Short-term pumped storage hydrothermal generation scheduling considering uncertainty of load demand and renewable energy sources. J. Energy Storage 2023, 70, 107933. [Google Scholar] [CrossRef]
  30. Sakthivel, V.; Thirumal, K.; Sathya, P. Short term scheduling of hydrothermal power systems with photovoltaic and pumped storage plants using quasi-oppositional turbulent water flow optimization. Renew. Energy 2022, 191, 459–492. [Google Scholar] [CrossRef]
  31. Lu, N.; Su, C.; Guo, C.; Wang, P.; Wu, H.; Sui, Q. Stochastic optimal scheduling of wind power and pumped-storage hydropower complementary systems with multiple uncertainties. J. Energy Storage 2024, 78, 110060. [Google Scholar] [CrossRef]
  32. Naval, N.; Yusta, J.M.; Sánchez, R.; Sebastián, F. Optimal scheduling and management of pumped hydro storage integrated with grid-connected renewable power plants. J. Energy Storage 2023, 73 Pt B, 108993. [Google Scholar] [CrossRef]
  33. Li, X.; Yang, W.; Zhao, Z.; Wang, R.; Yin, X.; Liu, P. Risk-averse energy management of hydro/thermal/pumped storage complementarily operating with wind/solar: Balancing risk, cost and carbon emission. Sustain. Energy Technol. Assess. 2023, 60, 103534. [Google Scholar] [CrossRef]
  34. Wang, G.; Gao, Y.; Feng, J.; Song, J.; Jia, D.; Li, G.; Li, Y.; Vartosh, A. Optimal stochastic scheduling in residential micro energy grids considering pumped-storage unit and demand response. Energy Strategy Rev. 2023, 49, 101172. [Google Scholar] [CrossRef]
  35. Bafrani, A.A.; Rezazade, A.; Sedighizadeh, M. Robust electrical reserve and energy scheduling of power system considering hydro pumped storage units and renewable energy resources. J. Energy Storage 2022, 54, 105310. [Google Scholar] [CrossRef]
  36. Yahia, Z.; Pradhan, A. Simultaneous and sequential stochastic optimization approaches for pumped storage plant scheduling with random breakdowns. Energy 2020, 204, 117896. [Google Scholar] [CrossRef]
  37. Li, P.; Zhao, Z.; Li, J.; Liu, Z.; Liu, Y.; Mahmud, M.A.; Sun, Y.; Chen, D. Unlocking potential contribution of seasonal pumped storage to ensure the flexibility of power systems with high proportion of renewable energy sources. Renew. Energy 2023, 218, 119280. [Google Scholar] [CrossRef]
  38. Liang, G.; Zhang, H.; Li, C.; Wu, X.; Guo, P.; Nan, H. High fidelity modeling of pumped storage units for optimal operation of a multi-energy co-generation system. J. Clean. Prod. 2024, 438, 140773. [Google Scholar] [CrossRef]
  39. von Lücken, C.; Barán, B.; Brizuela, C. A survey on multi-objective evolutionary algorithms for many-objective problems. Comput. Optim. Appl. 2014, 58, 707–756. [Google Scholar] [CrossRef]
  40. Falcón-Cardona, J.G.; Coello, C.A.C. Indicator-based multi-objective evolutionary algorithms: A comprehensive survey. ACM Comput. Surv. 2020, 53, 1–35. [Google Scholar] [CrossRef]
  41. Tan, K.C.; Lee, T.H.; Khor, E.F. Evolutionary algorithms for multi-objective optimization: Performance assessments and comparisons. Artif. Intell. Rev. 2002, 17, 251–290. [Google Scholar] [CrossRef]
  42. Colorni, A.; Dorigo, M.; Maniezzo, V. Distributed optimization by ant colonies. In Proceedings of the First European Conference on Artificial Life, Paris, France, 11–13 December 1991; Volume 142, pp. 134–142. [Google Scholar]
  43. Marco, D. Optimization, learning and natural algorithms. Ph.D. Thesis, Politecnico di Milano, Milan, Italy, 1992. [Google Scholar]
  44. Kennedy, J.; Eberhart, R. Particle swarm optimization. In Proceedings of the ICNN’95-International Conference on Neural Networks, Perth, WA, Australia, 27 November–1 December 1995; IEEE: New York, NY, USA, 1995; Volume 4. [Google Scholar]
  45. Yan, X.; She, D.; Xu, Y. Deep order-wavelet convolutional variational autoencoder for fault identification of rolling bearing under fluctuating speed conditions. Expert Syst. Appl. 2023, 216, 119479. [Google Scholar] [CrossRef]
  46. Xue, J.; Shen, B. Dung beetle optimizer: A new meta-heuristic algorithm for global optimization. J. Supercomput. 2023, 79, 7305–7336. [Google Scholar] [CrossRef]
Figure 1. Flowchart of short-term optimal dispatch method for pumped-storage-containing power plant grid based on security quantification.
Figure 1. Flowchart of short-term optimal dispatch method for pumped-storage-containing power plant grid based on security quantification.
Energies 17 04406 g001
Figure 2. Basic structure of the improvement in the term IEEE 30-bus grid.
Figure 2. Basic structure of the improvement in the term IEEE 30-bus grid.
Energies 17 04406 g002
Figure 3. Typical daily new energy forecast and load processes.
Figure 3. Typical daily new energy forecast and load processes.
Energies 17 04406 g003
Figure 4. Pareto solution set for each typical scenario. (a) Pumping once and generating once; (b) pumping once and generating twice; (c) pumping twice and generating once; (d) pumping twice and generating twice.
Figure 4. Pareto solution set for each typical scenario. (a) Pumping once and generating once; (b) pumping once and generating twice; (c) pumping twice and generating once; (d) pumping twice and generating twice.
Energies 17 04406 g004
Figure 5. Pareto solution set for each level of each typical scenario. (a) Pumping once and generating once; (b) pumping once and generating twice; (c) pumping twice and generating once; (d) pumping twice and generating twice.
Figure 5. Pareto solution set for each level of each typical scenario. (a) Pumping once and generating once; (b) pumping once and generating twice; (c) pumping twice and generating once; (d) pumping twice and generating twice.
Energies 17 04406 g005aEnergies 17 04406 g005bEnergies 17 04406 g005c
Figure 6. Optimization results of each typical scenario for each power station in each time period. (a) Pumping once and generating once; (b) pumping once and generating twice; (c) pumping twice and generating once; (d) pumping twice and generating twice.
Figure 6. Optimization results of each typical scenario for each power station in each time period. (a) Pumping once and generating once; (b) pumping once and generating twice; (c) pumping twice and generating once; (d) pumping twice and generating twice.
Energies 17 04406 g006
Figure 7. Relationship between the rate of new energy consumption in the grid and the growth rate of installed wind power and photovoltaic capacities.
Figure 7. Relationship between the rate of new energy consumption in the grid and the growth rate of installed wind power and photovoltaic capacities.
Energies 17 04406 g007
Figure 8. Relationship between the new energy consumption rate of the grid and the growth rate of installed wind and photovoltaic capacities.
Figure 8. Relationship between the new energy consumption rate of the grid and the growth rate of installed wind and photovoltaic capacities.
Energies 17 04406 g008
Table 1. Proportional scaling of materiality.
Table 1. Proportional scaling of materiality.
B i j ’s AssignmentMean B i j ’s AssignmentMean
1i and j are of equal importance
3i is slightly more important than j1/3i is slightly more unimportant than j
5i is clearly more important than j1/5i is clearly more unimportant than j
7i is highly important compared to j1/7i has a higher unimportance than j
9i is extremely important compared to j1/9i has an extreme unimportance compared to j
2, 4, 6, 8Between {1, 3, 5, 7, 9} 1/2, 1/4, 1/6, 1/8Between {1, 1/3, 1/5, 1/7, 1/9}
Table 2. Line limit transmission capacity.
Table 2. Line limit transmission capacity.
Prime NodeEnd NodeMaximum Transmission Capacity (MVA)Prime NodeEnd NodeMaximum Transmission Capacity (MVA)
12130151816
13130181916
2465192032
34130102032
25130101732
2665102132
4690102232
5770212232
67130152316
6832222416
6965232416
61032242516
91165252616
91065252716
41265282765
121365272916
121432273016
121532293016
12163282832
14151662832
161716
Table 3. Weights of scheduling periods.
Table 3. Weights of scheduling periods.
Scheduling periods123456
Weights0.01670.01330.02000.01000.00670.0033
Scheduling periods789101112
Weights0.02330.02670.03000.03330.08000.0367
Scheduling periods131415161718
Weights0.07670.06000.05000.05670.05330.0667
Scheduling periods192021222324
Weights0.04000.04670.06330.04330.07330.0700
Table 4. Weights of security index.
Table 4. Weights of security index.
IndexFlexibility Resource CapacityBranch Load BalanceFlexibility Resource Responsiveness
Weights0.50.330.17
Table 5. Fuzzy evaluation subsets.
Table 5. Fuzzy evaluation subsets.
Operating MethodIndexPassIntermediateMeritDistinction
Pumping once and generating onceFlexibility resource capacity[112, 124][124, 139][139, 162][162, 169]
Branch load balance[0.23, 0.27][0.21, 0.23][0.20, 0.21][0.19, 0.20]
Flexibility resource responsiveness[166, 187][187, 214][214, 240][240, 293]
Pumping once and generating twiceFlexibility resource capacity[109, 127][127, 139][139, 163][163, 171]
Branch load balance[0.23, 0.27][0.22, 0.23][0.21, 0.22][0.19, 0.21]
Flexibility resource responsiveness[162, 165][165, 176][176, 208][208, 286]
Pumping twice and generating onceFlexibility resource capacity[113, 123][123, 140][140, 163][163, 167]
Branch load balance[0.22, 0.26][0.21, 0.22][0.20, 0.21][0.19, 0.20]
Flexibility resource responsiveness[175, 187][187, 211][211, 231][231, 289]
Pumping twice and generating twiceFlexibility resource capacity[116, 123][123, 140][140, 161][161, 169]
Branch load balance[0.24, 0.27][0.23, 0.24][0.21, 0.23][0.19, 0.21]
Flexibility resource responsiveness[170, 174][174, 179][179, 194][194, 280]
Table 6. Range of new energy consumption and grid losses.
Table 6. Range of new energy consumption and grid losses.
Operating MethodGrid Security LevelNew Energy Consumption Rate Limit (%)Grid Loss Limit (MW)
Pumping once and generating onceDistinction94.76–96.9453.64–55.15
Merit95.56–97.0553.79–55.17
Intermediate95.26–97.5553.72–55.94
Pass94.93–97.3253.35–55.92
Pumping once and generating twiceDistinction95.21–97.8954.25–55.28
Merit95.93–98.1754.27–56.00
Intermediate95.54–98.4254.27–56.25
Pass95.33–98.5154.26–56.49
Pumping twice and generating onceDistinction92.58–96.5154.75–56.17
Merit92.24–97.2254.67–56.68
Intermediate92.34–97.0254.69–56.41
Pass93.02–96.0654.86–55-94
Pumping twice and generating twiceDistinction96.24–98.2055.23–56.73
Merit95.65–97.9855.21–56.63
Intermediate95.35–97.8655.19–56.59
Pass95.27–98.2955.18–56.75
Table 7. Optimization results of compromise solutions for different operation modes of pumped-storage plant.
Table 7. Optimization results of compromise solutions for different operation modes of pumped-storage plant.
Operating MethodNew Energy Consumption Rate (%)Grid Loss (MW)
Pumping once and generating once96.6354.527
Pumping once and generating twice97.6554.354
Pumping twice and generating once95.8055.854
Pumping twice and generating twice96.3855.237
Table 8. Optimization results of the two models for typical period.
Table 8. Optimization results of the two models for typical period.
Typical PeriodModelNew Energy Consumption Rate (%)Grid Loss (MW)Grid Security Level
Dry water periodTraditional model96.5654.44Merit
Proposed model96.6354.53Distinction
Flood seasonTraditional model89.2764.40Intermediate
Proposed model87.1763.58Distinction
Table 9. Calculation time comparison.
Table 9. Calculation time comparison.
ModelCalculation Time/Min
Dry Water PeriodFlood Season
Proposed model6.4236.481
Traditional model4.0584.382
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Li, H.; Qiu, X.; Xi, Q.; Wang, R.; Zhang, G.; Wang, Y.; Zhang, B. Short-Term Optimal Scheduling of Power Grids Containing Pumped-Storage Power Station Based on Security Quantification. Energies 2024, 17, 4406. https://doi.org/10.3390/en17174406

AMA Style

Li H, Qiu X, Xi Q, Wang R, Zhang G, Wang Y, Zhang B. Short-Term Optimal Scheduling of Power Grids Containing Pumped-Storage Power Station Based on Security Quantification. Energies. 2024; 17(17):4406. https://doi.org/10.3390/en17174406

Chicago/Turabian Style

Li, Hua, Xiangfei Qiu, Qiuyi Xi, Ruogu Wang, Gang Zhang, Yanxin Wang, and Bao Zhang. 2024. "Short-Term Optimal Scheduling of Power Grids Containing Pumped-Storage Power Station Based on Security Quantification" Energies 17, no. 17: 4406. https://doi.org/10.3390/en17174406

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop