Search

CN-121998250-A - New energy power plant simulated operation compensation information transparentization management method and system

CN121998250ACN 121998250 ACN121998250 ACN 121998250ACN-121998250-A

Abstract

The invention provides a new energy power plant simulated operation compensation information transparentization management method and a system, which relate to the technical field of new energy power management and comprise the steps of constructing a scatter set of an actual and theoretical power generation curve of a new energy power plant in a two-dimensional phase space, forming a closed boundary, extracting vertex coordinates, calculating topological deviation and determining compensation amount; performing Fourier transformation on the vertex coordinates to generate a phase angle sequence, dividing phase angle segments based on topological morphology, generating a layering key by combining local deviation, encrypting binary data of the compensation amount in a partitioning manner to form a layering information package, and returning corresponding information according to the inquiry identity level. The invention realizes the transparent management of the compensation information, ensures the awareness of all parties and improves the data security.

Inventors

  • ZHENG JIANHU
  • KANG ZHUANG
  • XIANG MEI
  • DU YUXIN

Assignees

  • 陕西华电新能源发电有限公司

Dates

Publication Date
20260508
Application Date
20260126

Claims (10)

  1. 1. The new energy power plant simulation operation compensation information transparentization management method is characterized by comprising the following steps of: acquiring an actual power generation curve and a theoretical power generation curve of a new energy power plant in a scheduling period; Constructing a scatter set in a two-dimensional phase space by using actual power generation curve power and theoretical power generation curve power, iteratively selecting boundary points to form a closed boundary, extracting a vertex coordinate sequence, calculating the topological deviation of the closed boundary area and a reference area, and calculating the compensation amount according to the positive and negative signs of the topological deviation; Performing Fourier transformation on the vertex coordinate sequence to extract a phase angle, forming an initial phase angle sequence, dividing the initial phase angle sequence into phase angle segments based on the topological form of the closed boundary, performing numerical fusion on the partial deviation of the phase angle segments and the topological partition, and performing hash operation to generate a layered encryption key set; converting the compensation amount into binary data, attributing the binary data to each topological partition based on the geometric center coordinates of the topological partition, performing encryption operation on the binary data of each topological partition by using a hierarchical encryption key set, and packaging to form a hierarchical information packet; And determining the topological partition level according to the query identity, decrypting the hierarchical information package and returning the content of the corresponding level.
  2. 2. The method of claim 1, wherein constructing a scatter set of actual power generation curve power and theoretical power generation curve power in a two-dimensional phase space, iteratively selecting boundary points to form a closed boundary and extracting a vertex coordinate sequence, calculating a topological deviation of a closed boundary area from a reference area, and calculating a compensation amount according to a sign of the topological deviation comprises: Sampling an actual power generation curve and a theoretical power generation curve according to a time interval to obtain an actual power sampling sequence and a theoretical power sampling sequence, taking the actual power sampling sequence as an abscissa and the theoretical power sampling sequence as an ordinate, and generating coordinate points in a two-dimensional phase space to form a scattered point set; Iteratively selecting boundary points from the scattered point set, connecting the boundary points to form a closed boundary, and extracting the horizontal coordinate value and the vertical coordinate value of each boundary point on the closed boundary to form a vertex coordinate sequence in sequence; Calculating the length of each boundary line segment according to the coordinate difference value of adjacent vertexes in the vertex coordinate sequence, and calculating the convex polygon area of the closed boundary by accumulating the length of each boundary line segment and the corresponding vertex coordinates through a polygon area formula; Determining a diagonal line between an origin in the two-dimensional phase space and a maximum power point in the scattered point set, and calculating a right triangle area surrounded by the diagonal line, a transverse axis and a longitudinal axis as a reference area; The reference area is subtracted from the convex polygon area to obtain the topological deviation, and the positive and negative signs of the topological deviation are multiplied by the positive compensation coefficient or the negative compensation coefficient respectively to obtain the compensation amount.
  3. 3. The method of claim 2, wherein iteratively selecting boundary points from the set of scatter points and connecting to form a closed boundary, and wherein extracting the abscissa and ordinate values of each boundary point on the closed boundary to form a vertex coordinate sequence in order comprises: calculating Euclidean distance from each coordinate point in the scattered point set to the origin of the two-dimensional phase space, and selecting the coordinate point with the largest Euclidean distance as an initial boundary point; Calculating connection vectors formed by the initial boundary point and other coordinate points in the scattered point set by taking the initial boundary point as a starting point, calculating included angles between the connection vectors and the positive direction of the transverse axis of the two-dimensional phase space, selecting a coordinate point with the smallest included angle value from all included angles as a first subsequent boundary point, and taking a connecting line between the initial boundary point and the first subsequent boundary point as a first boundary line segment; Calculating connection vectors formed by the first subsequent boundary points and other non-accessed coordinate points in the scattered point set by taking the first subsequent boundary points as new starting points, calculating included angles between each connection vector and the extending direction of the first boundary line segment, selecting a coordinate point with the smallest included angle value from all included angles as a second subsequent boundary point, and taking a connecting line between the first subsequent boundary point and the second subsequent boundary point as a second boundary line segment; and performing iteration until the next boundary point returns to the initial boundary point to form a closed boundary, and extracting all boundary points on the closed boundary according to the connection sequence to form a vertex coordinate sequence.
  4. 4. The method of claim 1, wherein fourier transforming the sequence of vertex coordinates to extract phase angles, constructing an initial sequence of phase angles, dividing the initial sequence of phase angles into phase angle segments based on a topology morphology of the closed boundary, numerically fusing the phase angle segments with local deviations of the topology partitions, and performing a hash operation to generate the hierarchical encryption key set comprises: performing discrete Fourier transform on the abscissa component and the ordinate component of the vertex coordinate sequence to obtain an abscissa frequency domain coefficient sequence and an ordinate frequency domain coefficient sequence; calculating the amplitude of each frequency component in the abscissa frequency domain coefficient sequence and the ordinate frequency domain coefficient sequence, selecting the frequency component with the amplitude exceeding a preset amplitude threshold as a target frequency component set, extracting the phase angle corresponding to each frequency component in the target frequency component set, and forming an initial phase angle sequence; Dividing an initial phase angle sequence into a plurality of phase angle sections based on the topology form of a closed boundary, carrying out numerical fusion on phase angle values in the phase angle sections and local deviation amounts of topology sections corresponding to the phase angle sections aiming at each phase angle section to obtain a characteristic phase angle sequence of the topology section, and carrying out hash operation on the characteristic phase angle sequence to generate a partition key of the topology section; and arranging partition keys of all topological partitions according to the spatial sequence of the topological partitions in the closed boundary to form a layered encryption key set as an encryption key.
  5. 5. The method of claim 4, wherein dividing the initial phase angle sequence into a plurality of phase angle segments based on a topology of the closed boundary comprises: dividing the closed boundary into a plurality of boundary segments along the peripheral direction of the closed boundary according to the sequence of the vertex sequence numbers, and calculating the local deviation between the boundary segment and the reference area for each boundary segment; setting a deviation grading threshold set, comparing all boundary segments with each threshold value in the deviation grading threshold set according to the absolute value of the local deviation, and merging continuous boundary segments with the absolute value of the local deviation in the same threshold value interval into a topological partition; Counting the total number of topological partitions of the closed boundary, which is obtained by combining boundary segments, and obtaining the total number of phase angles in an initial phase angle sequence; calculating the ratio of the total number of phase angles in the initial phase angle sequence to the total number of topological partitions, and rounding up the ratio to obtain the corresponding phase angle number quota of each topological partition; And extracting phase angles from the initial position of the initial phase angle sequence according to the space sequence of the topological partition in the closed boundary, and sequentially extracting the phase angles according to the phase angle quantity quota to form a phase angle segment, wherein the phase angle segment is associated with the corresponding topological partition until all phase angles in the initial phase angle sequence are divided into phase angle segments.
  6. 6. The method of claim 1, wherein converting the compensation amount into binary data, attributing the binary data to each topological partition based on geometric center coordinates of the topological partition, performing an encryption operation on the binary data of each topological partition using a hierarchical encryption key set, and encapsulating to form a hierarchical packet comprises: The compensation amount is quantized and coded according to preset precision and converted into binary data, the geometric center coordinates of each topological partition in a two-dimensional phase space in a closed boundary are obtained, modular operation is carried out on the total number of bits of the binary data and the total number of the topological partitions, a mapping relation is established between the geometric center coordinates of each topological partition and the bit indexes of the binary data according to a modular result, and a space mapping table from bits to the topological partitions is constructed; Traversing each bit of binary data, searching a corresponding topology partition identifier from a space mapping table according to the index position of the bit, attributing the bit to the corresponding topology partition to form a plurality of bit sets, wherein each bit set corresponds to one topology partition; Aiming at bit sets of each topological partition, partition keys of the corresponding topological partition are obtained from the hierarchical encryption key set, the partition keys are used as encryption keys to execute exclusive-or operation on binary data in the bit sets, and encrypted data blocks corresponding to the topological partition are obtained; binding the encrypted data blocks of all the topological partitions with the geometric center coordinates of the corresponding topological partitions, arranging binding results according to the spatial sequence of the topological partitions in the closed boundary, and packaging to form a layered information packet containing spatial position information.
  7. 7. The method of claim 6, wherein establishing a mapping relationship between the geometric center coordinates of each topological partition and the bit index of the binary data based on the modulo result, and constructing a spatial mapping table of bits to topological partitions comprises: Performing modulo operation on the total number of bits of the binary data and the total number of topological partitions to obtain a modulo remainder, and judging whether the modulo remainder is zero or not; When the modulo remainder is zero, establishing a one-to-one mapping relation between bit indexes of binary data and the space sequence of the topological partition in a sequential increasing mode; When the modulo remainder is not zero, splicing the abscissa value and the ordinate value of the geometric center coordinate of each topological partition, and then taking the spliced abscissa value and the ordinate value as input, performing hash operation to generate a hash value sequence of the topological partition, and sequencing the hash value sequence according to the numerical value to obtain the sequence of the topological partition; And establishing a mapping relation between bit indexes of binary data and the topology partition according to the arrangement sequence, and constructing a space mapping table from bits to the topology partition.
  8. 8. A new energy power plant simulation operation compensation information transparentization management system for realizing the method of any one of the preceding claims 1 to 7, characterized by comprising: The data acquisition unit is used for acquiring an actual power generation curve and a theoretical power generation curve of the new energy power plant in the scheduling period; The deviation calculation unit is used for constructing a scatter set of the actual power generation curve power and the theoretical power generation curve power in a two-dimensional phase space, iteratively selecting boundary points to form a closed boundary, extracting a vertex coordinate sequence, calculating the topological deviation of the closed boundary area and a reference area, and calculating the compensation amount according to the positive and negative signs of the topological deviation; The key generation unit is used for carrying out Fourier transformation on the vertex coordinate sequence to extract phase angles, forming an initial phase angle sequence, dividing the initial phase angle sequence into phase angle segments based on the topological form of the closed boundary, carrying out numerical fusion on the partial deviation of the phase angle segments and the topological partition, and carrying out hash operation to generate a layered encryption key set; The hierarchical encryption unit is used for converting the compensation amount into binary data, attributing the binary data to each topological partition based on the geometric center coordinates of the topological partition, executing encryption operation on the binary data of each topological partition by using the hierarchical encryption key set, and packaging to form a hierarchical information packet; and the hierarchical decryption unit is used for determining the topological partition level according to the query identity, decrypting the hierarchical information packet and returning the content of the corresponding level.
  9. 9. An electronic device, comprising: A processor; A memory for storing processor-executable instructions; Wherein the processor is configured to invoke the instructions stored in the memory to perform the method of any of claims 1 to 7.
  10. 10. A computer readable storage medium having stored thereon computer program instructions, which when executed by a processor, implement the method of any of claims 1 to 7.

Description

New energy power plant simulated operation compensation information transparentization management method and system Technical Field The invention relates to the technical field of new energy power management, in particular to a new energy power plant simulated operation compensation information transparentization management method and system. Background With the deep advancement of global energy transformation, the specific gravity of new energy power generation in an electric power system is continuously improved. Because the new energy power generation has the characteristics of volatility, intermittence and the like, in order to ensure the safe and stable operation of the power grid, a power dispatching department usually regulates and controls the power of the new energy power plant according to the system demand, so that the power generation output deviates from the theoretical maximum power generation capacity. In order to compensate economic loss of the new energy power plant, a reasonable simulation operation compensation mechanism needs to be established, and the fairness and transparency of the compensation process are ensured. The traditional new energy power plant simulation operation compensation management has obvious defects that the existing compensation calculation method is mostly based on simple power difference integral, the topological characteristic of a power generation curve in a two-dimensional phase space cannot be fully considered, the calculation accuracy of compensation amount is insufficient, the difference between actual and theoretical power generation states cannot be accurately reflected, the compensation information management lacks an effective hierarchical encryption mechanism, the compensation data is either excessively disclosed to cause commercial information leakage or excessively secret to cause that related parties cannot effectively supervise, transparency is insufficient, the storage and query modes of the compensation information are relatively single, differentiated information access service is difficult to provide according to authority levels of different users, and the public belief of the compensation process and the acceptance of each party to a compensation result are influenced. Disclosure of Invention The embodiment of the invention provides a new energy power plant simulated operation compensation information transparentization management method and system, which can solve the problems in the prior art. In a first aspect of the embodiment of the present invention, a method for transparently managing simulated operation compensation information of a new energy power plant is provided, including: acquiring an actual power generation curve and a theoretical power generation curve of a new energy power plant in a scheduling period; Constructing a scatter set in a two-dimensional phase space by using actual power generation curve power and theoretical power generation curve power, iteratively selecting boundary points to form a closed boundary, extracting a vertex coordinate sequence, calculating the topological deviation of the closed boundary area and a reference area, and calculating the compensation amount according to the positive and negative signs of the topological deviation; Performing Fourier transformation on the vertex coordinate sequence to extract a phase angle, forming an initial phase angle sequence, dividing the initial phase angle sequence into phase angle segments based on the topological form of the closed boundary, performing numerical fusion on the partial deviation of the phase angle segments and the topological partition, and performing hash operation to generate a layered encryption key set; converting the compensation amount into binary data, attributing the binary data to each topological partition based on the geometric center coordinates of the topological partition, performing encryption operation on the binary data of each topological partition by using a hierarchical encryption key set, and packaging to form a hierarchical information packet; And determining the topological partition level according to the query identity, decrypting the hierarchical information package and returning the content of the corresponding level. In an alternative embodiment, constructing a scatter set of actual power generation curve power and theoretical power generation curve power in a two-dimensional phase space, iteratively selecting boundary points to form a closed boundary and extracting a vertex coordinate sequence, calculating a topological deviation amount of a closed boundary area and a reference area, and calculating a compensation amount according to positive and negative signs of the topological deviation amount comprises: Sampling an actual power generation curve and a theoretical power generation curve according to a time interval to obtain an actual power sampling sequence and a theoretical power sampling sequence, taking the actua