In the "dual carbon" goal background, massive, dispersed, and ubiquitous distributed resources are becoming an important component of China's power system. However, distributed flexible resources faced with security issues, such as data loss, data tampering, and privacy breaches, during the process of participating in power trading by aggregation method. Therefore, this article proposes key privacy protection technologies to support flexible resource hierarchical aggregation transactions. Through fully analyzing the current situation of flexible resource hierarchical aggregation transaction and the existing privacy leakage problems, this paper designs a collaborative interaction process of flexible resource hierarchical aggregation transactions, and implements privacy protection for electricity enterprises participating in aggregation and benefit distribution in a trustworthy and autonomous manner.
Industrial users of fused magnesium have a certain demand response capability, which can provide flexible adjustment resources for high proportion of renewable energy power systems. In this paper, based on the analysis of the generation process and load characteristics of fused magnesium, a baseline load optimization calculation model for industrial users of fused magnesium was established with the goal of minimizing the electricity cost. On this basis, the demand response decision model of user agent for fused magnesium aiming at the minimum response cost and the power grid agent decision model aiming at tracking renewable energy power generation were constructed respectively, and a demand response analysis method of user for fused magnesium industry based on multi-agent modeling was proposed. Multiagent system simulation can provide necessary technical support for the formulation of demand response incentive measures and quantitative evaluation of the response capacity of users in the fused magnesium industry. A case study of an electromolten magnesium enterprise was carried out to verify the effectiveness of the proposed model and method.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.