OPTIMIZATION STRATEGIES FOR THE VULNERABILITY ANALYSIS OF THE ELECTRIC POWER GRID

被引:94
作者
Pinar, Ali [1 ]
Meza, Juan [2 ]
Donde, Vaibhav [3 ]
Lesieutre, Bernard [4 ,5 ]
机构
[1] Sandia Natl Labs, Dept Informat & Decis Sci, Livermore, CA 94550 USA
[2] Univ Calif Berkeley, Lawrence Berkeley Lab, High Performance Comp Res Dept, Berkeley, CA 94720 USA
[3] ABB Inc, Corp Res Ctr, Raleigh, NC 27606 USA
[4] Univ Calif Berkeley, Lawrence Berkeley Lab, Environm Energy Technol Div, Berkeley, CA 94720 USA
[5] Univ Wisconsin, Dept Elect & Comp Engn, Madison, WI 53706 USA
关键词
mixed integer nonlinear programming; network inhibition; network flow; mixed integer linear programming; electric power flow; network vulnerability; graph theory;
D O I
10.1137/070708275
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Identifying small groups of lines, whose removal would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerability analysis can be studied as a bilevel mixed integer nonlinear programming problem. Our analysis reveals a special structure in the formulation that can be exploited to avoid nonlinearity and approximate the original problem as a pure combinatorial problem. The key new observation behind our analysis is the correspondence between the Jacobian matrix (a representation of the feasibility boundary of the equations that describe the flow of power in the network) and the Laplacian matrix in spectral graph theory (a representation of the graph of the power grid). The reduced combinatorial problem is known as the network inhibition problem, for which we present a mixed integer linear programming formulation. Our experiments on benchmark power grids show that the reduced combinatorial model provides an accurate approximation, to enable vulnerability analyses of real-sized problems with more than 16,520 power lines.
引用
收藏
页码:1786 / 1810
页数:25
相关论文
共 29 条
  • [1] COMPUTATION OF CLOSEST BIFURCATIONS IN POWER-SYSTEMS
    ALVARADO, F
    DOBSON, I
    HU, Y
    PAI, MA
    PAL, NK
    [J]. IEEE TRANSACTIONS ON POWER SYSTEMS, 1994, 9 (02) : 918 - 928
  • [2] [Anonymous], 2004, 37 HAW INT C SYST SC
  • [3] [Anonymous], P 39 HAW INT C SYST
  • [4] [Anonymous], LBNL62142
  • [5] On the solution of the bilevel programming formulation of the terrorist threat problem
    Arroyo, JM
    Galiana, FD
    [J]. IEEE TRANSACTIONS ON POWER SYSTEMS, 2005, 20 (02) : 789 - 797
  • [6] BIENSTOCK D, 2005, TR200507 COL U IEOR
  • [7] CARRERAS B, 2002, P 35 HAW INT C SYST
  • [8] Carreras B. A., 2001, P 34 HAW INT C SYST
  • [9] Cormen T., 2001, Introduction to Algorithms
  • [10] DOBSON I, 2001, P 34 HAW INT C SYST