Identification of Critical Transmission Lines in Complex Power Networks

被引:17
作者
Wang, Ziqi [1 ]
He, Jinghan [1 ]
Nechifor, Alexandru [2 ]
Zhang, Dahai [1 ]
Crossley, Peter [2 ]
机构
[1] Beijing Jiaotong Univ, Power Syst Protect & Control Res Lab, Shangyuancun 3, Beijing 100044, Peoples R China
[2] Univ Manchester, Sch Elect & Elect Engn, Manchester M13 9PL, Lancs, England
基金
国家重点研发计划;
关键词
critical line; vulnerability; power flow redistribution; integrated betweenness; cyclic addition algorithm; VULNERABILITY ANALYSIS; BETWEENNESS APPROACH; GRIDS; MITIGATION; TOPOLOGY; MODEL; RISK;
D O I
10.3390/en10091294
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
Growing load demands, complex operating conditions, and the increased use of intermittent renewable energy pose great challenges to power systems. Serious consequences can occur when the system suffers various disturbances or attacks, especially those that might initiate cascading failures. Accurate and rapid identification of critical transmission lines is helpful in assessing the system vulnerability. This can realize rational planning and ensure reliable security pre-warning to avoid large-scale accidents. In this study, an integrated "betweenness" based identification method is introduced, considering the line's role in power transmission and the impact when it is removed from a power system. At the same time, the sensitive regions of each line are located by a cyclic addition algorithm (CAA), which can reduce the calculation time and improve the engineering value of the betweenness, especially in large-scale power systems. The simulation result verifies the effectiveness and the feasibility of the identification method.
引用
收藏
页数:19
相关论文
共 45 条
  • [21] Recent Progress on the Resilience of Complex Networks
    Gao, Jianxi
    Liu, Xueming
    Li, Daqing
    Havlin, Shlomo
    [J]. ENERGIES, 2015, 8 (10) : 12187 - 12210
  • [22] Modeling and Vulnerability Analysis of Cyber-Physical Power Systems Considering Network Topology and Power Flow Properties
    Guo, Jia
    Han, Yuqi
    Guo, Chuangxin
    Lou, Fengdan
    Wang, Yanbo
    [J]. ENERGIES, 2017, 10 (01)
  • [23] Do topological models provide good information about electricity infrastructure vulnerability?
    Hines, Paul
    Cotilla-Sanchez, Eduardo
    Blumsack, Seth
    [J]. CHAOS, 2010, 20 (03)
  • [24] Growing scale-free networks with tunable clustering
    Holme, P
    Kim, BJ
    [J]. PHYSICAL REVIEW E, 2002, 65 (02)
  • [25] An N-k Analytic Method of Composite Generation and Transmission with Interval Load
    Hong, Shaoyun
    Cheng, Haozhong
    Zeng, Pingliang
    [J]. ENERGIES, 2017, 10 (02):
  • [26] Model validation for the August 10, 1996 WSCC system outage
    Kosterev, DN
    Taylor, CW
    Mittelstadt, WA
    [J]. IEEE TRANSACTIONS ON POWER SYSTEMS, 1999, 14 (03) : 967 - 974
  • [27] Optimization of Internal Cooling Fins for Metal Hydride Reactors
    Kukkapalli, Vamsi Krishna
    Kim, Sunwoo
    [J]. ENERGIES, 2016, 9 (06):
  • [28] Automatic identification of transmission sections based on complex network theory
    Luo Gang
    Shi Dongyuan
    Chen Jinfu
    Duan Xianzhong
    [J]. IET GENERATION TRANSMISSION & DISTRIBUTION, 2014, 8 (07) : 1203 - 1210
  • [29] Cascading Failure Analysis for Indian Power Grid
    Rampurkar, Vaishali
    Pentayya, Polgani
    Mangalvedekar, Harivittal A.
    Kazi, Faruk
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2016, 7 (04) : 1951 - 1960
  • [30] Topological vulnerability of the European power grid under errors and attacks
    Rosas-Casals, Marti
    Valverde, Sergi
    Sole, Ricard V.
    [J]. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2007, 17 (07): : 2465 - 2475