scheduling of electricity storage for peak shaving with
play

Scheduling of electricity storage for peak shaving with minimal - PowerPoint PPT Presentation

Scheduling of electricity storage for peak shaving with minimal wearing Thijs van der Klauw Johann Hurink Faculty of EEMCS, University of Twente 01-04-2014 Introduction Increasing use of renewable energy sources. Increasing use of electric


  1. Scheduling of electricity storage for peak shaving with minimal wearing Thijs van der Klauw Johann Hurink Faculty of EEMCS, University of Twente 01-04-2014

  2. Introduction Increasing use of renewable energy sources. Increasing use of electric appliances in general. Social and political motivation to move away from fossil fuel and nuclear power. Johann Hurink Scheduling storage devices 01-04-2014 2 / 23

  3. Introduction Electricity in the grid needs to be balanced to ensure grid stability; but: the aforementioned trends jeapordize this goal. Samrt Grids is a prommissing concept for the future energie grid. Storage of (electrical) energy is seen as one of the most crucial aspects. Apply storage for peak shaving and guaranteeing a certain base load. Johann Hurink Scheduling storage devices 01-04-2014 3 / 23

  4. Energy Flow Description We consider a discretized time horizon: T = [1 , . . . , T ]. 25 20 UB Flow value F t 15 10 5 LB 0 0 4 8 12 16 20 24 Time Johann Hurink Scheduling storage devices 01-04-2014 4 / 23

  5. Storage Description Given a set N = { 1 , . . . , N } of storage devices Modelling the use of the storage device i by variables s i t representing the amount of energy that flows into (or from) the device i in time interval t . Remaining flow after use of the storage device is: � s i f t = F t − t ∀ t ∈ T i ∈N Constraints to get the remainig flow between the bound (flow constraint): LB t ≤ f t ≤ UB t ∀ t ∈ T Johann Hurink Scheduling storage devices 01-04-2014 5 / 23

  6. Storage Description 25 20 UB Flow value 15 10 5 LB 0 0 4 8 12 16 20 24 Time Johann Hurink Scheduling storage devices 01-04-2014 6 / 23

  7. Storage Description A storage device is restricted by two more constraints. We can’t (dis)charge too much in one time interval (power constraint): | s i t | ≤ P i ∀ t ∈ T ; ∀ i ∈ N The amount of energy stored in the devices has to be nonnegative and below the given capacity bound C (SoC constraint): SoC i � s i t := j ∈ [0 , C i ] ∀ t ∈ T ; ∀ i ∈ N j ≤ t Johann Hurink Scheduling storage devices 01-04-2014 7 / 23

  8. Objective Function The most direct objective is to minimize the storage usage; i.e. to minimize: � � | s i t | i ∈N t ∈T We can rewrite this problem easily to an LP; thus this objective is easily solvable. Johann Hurink Scheduling storage devices 01-04-2014 8 / 23

  9. Objective Function Minimize Charging Cycles The battery lifetime is usually measured/given in charging cycles; i.e. the number of times the battery changes from discharging to charging and back to discharging. To calculate charging cycles we use binary variables Y i t indicating a switch between charging and discharging. Johann Hurink Scheduling storage devices 01-04-2014 9 / 23

  10. Objective Function Minimize Charging Cycles Every charging cycle icontains exactly 2 switches between charging and discharging. Thus minimizing charging cycles is equivalent with minimizing: � � Y i t i ∈N t ∈T Integrating the binary variables into the model, leads to an MILP; i.e., this problem may be harder to solve. Johann Hurink Scheduling storage devices 01-04-2014 10 / 23

  11. Multiple Devices Theorem The battery scheduling problem when minimizing charging cycles for multiple devices is NP-hard For 2 devices we use PARTITION for the reduction. If we consider the number of devices as input, we have a reduction from 3-PART. Both reductions hold even when all devices are the same Johann Hurink Scheduling storage devices 01-04-2014 11 / 23

  12. Theorem Theorem The battery scheduling problem when minimizing charging cycles for a single device can be solved in polynomial time Grouping the intervals into subsets No Lower Bound Violation on Flow First SoC constraint violation Decoupling points General Algorithm Johann Hurink Scheduling storage devices 01-04-2014 12 / 23

  13. Grouping The Intervals into Subsets We distinguish between intervals on which we are forced to charge or discharge by the flow constraint and intervals on which we are not. 25 20 UB Flow value 15 10 5 LB 0 T 1 T 2 T 3 T 4 T 5 T 6 T 7 T 8 T 9 Time Johann Hurink Scheduling storage devices 01-04-2014 13 / 23

  14. The Naive Schedule In the remainder we omit superscript i since we have only one device Definition The naive schedule (possibly infeasible) (dis)charge for every time interval the minimal amount to satisfy the flow constraint and is given by:  F t − UB t if F t ≥ UB t   s t = F t − LB t if F t ≤ LB t  0 else  The naive schedule can only violate the constraints induced by the storage device. If it violates the power constraint: no feasible solution exists. Johann Hurink Scheduling storage devices 01-04-2014 14 / 23

  15. Storage Requirements Naive Schedule 4 P Flow Into Battery 2 0 − 2 − 4 − P 0 4 8 12 16 20 24 Time Johann Hurink Scheduling storage devices 01-04-2014 15 / 23

  16. SoC Naive Schedule 15 10 C State of Charge 5 0 0 − 5 − 10 0 4 8 12 16 20 24 Time Johann Hurink Scheduling storage devices 01-04-2014 16 / 23

  17. First SoC constraint Violation -1- Consider the naive schedule up to the first violation of the SoC constraint: 15 10 C State of Charge 5 0 0 − 5 0 4 8 12 16 20 24 Time Johann Hurink Scheduling storage devices 01-04-2014 17 / 23

  18. First SoC constraint Violation -2- Apply extra decharging until SoC violation is reduced to 0 as follows: 1 First use subsets which introduce no extra charging cycle (in an arbitrary order). 2 Calculate for each subset the amount which can be discharged within this subset (depends on current schedule). Note: each discharge now increases number of switches by 2. 3 Pick the best possible subset, i.e. with the highest potential, and discharge within this subset. 4 Update the discharge capability of all other subsets and continue iteratively with step 2. Johann Hurink Scheduling storage devices 01-04-2014 18 / 23

  19. Decoupling Point We are able to solve the problem up to the first violation in our naive schedule. Now: consider the problem up to the next violation. Two cases: violation at the same bound or the oposite bound. Same bound: Starting with the schedule we got by solving the previous violation, apply the same method. Johann Hurink Scheduling storage devices 01-04-2014 19 / 23

  20. Decoupling Point Other case: the second violation is at the oposite bound. 15 10 C State of Charge 5 0 0 − 5 t ′ 0 4 8 12 16 20 24 Time Johann Hurink Scheduling storage devices 01-04-2014 20 / 23

  21. Algorithm Summary Algorithm: 1 Construct the naive schedule as the starting point. 2 Consider the subproblem up to the first violation in the naive schedule. 3 Change the schedule until this violation is ’solved’ by: First iteratively (dis)charge on the best subset which do not induce switches. Then iteratively (dis)charge on the best subset which do induce switches. 4 Iteratively consider the next violation, until there are no more SoC constraint violations: If the violation is at the oposite bound, introducing a decoupling point at previous violation. Applying step 3 to the schedule from the latest decoupling point to the current considered violation. Johann Hurink Scheduling storage devices 01-04-2014 21 / 23

  22. Future Work Integrate this method into a general framework for Demand Side Management (DSM). Currently we assume perfect knowledge of the future; Aim: account for fluctuations in the energy flow by useing techniques from e.g. Robust Optimization. Account for device specific constraints. Johann Hurink Scheduling storage devices 01-04-2014 22 / 23

  23. Questions? Johann Hurink Scheduling storage devices 01-04-2014 23 / 23

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend