Operation Betweenness Based Assessment on Overload Vulnerability

Article Preview

Abstract:

An operation betweenness based method to assess overloaded lines is proposed. Based on electrical network theory, firstly the branch current sharing factors are deduced; then the operation betweenness of transmission line is defined; finally, on this basis the overload vulnerability of transmission line is assessed. In the proposed method, the impacts of both topological structure and operation modes of power network on vulnerability are considered for the assessment. The physical meaning of the proposed method is determinate and conforms to actual condition of power system, and this method avoids the defect in the complicated network model that the power flows only flow along the shortest path. The correctness of the proposed assessment method is verified by simulation results of IEEE 39-bus system.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1378-1383

Citation:

Online since:

August 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Zhenxiang Han, Yiiia Cao.Power system security and it's prevention[J].Power System Technology,2004,28(9):l-6(in Chinese).

Google Scholar

[2] Qiang Lu.An introduction to research project on key issues on economical and secure operation of power system in China [J].Automation of Electric Power Systems,2000,24(1):6(in Chinese).

Google Scholar

[3] Baosheng Tang.Blackout in south of London and its lessons [J].Power System Technology, 2003,27(11):1-5(in Chinese).

Google Scholar

[4] Meiyi Wang.Thoughts and feelings about the whopping power failures occurred in western part of the USA[J].Power System Technology,1996,20(9):43-46(in Chinese).

Google Scholar

[5] Xuehao Hu.Rethinking and enlightenment of large scope blackout in interconnected North America power grid[J].Power System Technology,2003,27(9):2-6 (in Chinese).

Google Scholar

[6] Yonghua Yin,Jianbo Guo,Jianjun Zhao,et al.Preliminary analysis of large scale blackout in interconnect north America power grid [J].Power System Technology,2003,27(10):8-11(in Chinese).

Google Scholar

[7] Xizheng Zhao.Strengthen power system security to ensure reliable delivery[J].Power System Technology,2003,27(10):1-7(in Chinese).

Google Scholar

[8] Xiangyi Chen, Yunping Chen, Chunyan Li,et al.Constructing wide-area security defensive system in bulk power grid:a pondering over the large-scale blackout in the European power grid on November 4[J].Automation of Electric Power Systems,2007,31(1):4-8 (in Chinese).

DOI: 10.1109/upec.2007.4469004

Google Scholar

[9] Albert R,Albert I,Nakarado G L.Structural vulnerability of the North American power grid[J].Physical Review E,2004,69(2):025103-1-4.

DOI: 10.1103/physreve.69.025103

Google Scholar

[10] Crucitti P,Latora V,Marchiori M.A topological analysis of the Italian electric power grid[J].Physica A,2004,338(1):92-97.

DOI: 10.1016/j.physa.2004.02.029

Google Scholar

[11] Zhongwei Meng, Zongxiang Lu, Jingyan Song.Comparison analysis of the small-world topological model of Chinese and American power grids[J].Automation of Electric Power Systems,2004,28(15):21-29(in Chinese).

Google Scholar

[12] Jian Ding, Xiaomin Bai, Wei Zhao,et al.The improvement of the small-world network model and its application research in bulk power system[C]/2006 International Conference on Power System Technology.Chongqing,China:2006 International Conference on Power System Technology,2006:22-26.

DOI: 10.1109/icpst.2006.321710

Google Scholar

[13] Yijia Cao, Xiaogang Chen, Ke Sun.Identification of vulnerable lines in power grid based on complex network theory[J].Electric Power Automation Equipment,2006,26(12):1-5(in Chinese).

Google Scholar

[14] Yan Liu, Xueping Gu.Node importance assessment based skeleton network reconfiguration[J].Proceedings of the CSEE,2007,27(10):20-27(in Chinese).

Google Scholar

[15] Jin Shi, Guangyu Tu, Yi Luo.Complex network characteristic analysis and model improving of the power system[J].Proceedings of the CSEE,2008,28(5):93-98(in Chinese).

Google Scholar

[16] Lin Xu, Xiuli Wang, Xifan Wang.Small-world feature identification based on equivalent admittance for power system[J].Proceedings of the CSEE,2009,29(19):20-26(in Chinese).

Google Scholar

[17] Lin Xu, Xiuli Wang, Xifan Wang.Electric betweenness and its application in vulnerable line identification in power grid [J].Proceedings of the CSEE,2010,30(1):33-39(in Chinese).

Google Scholar

[18] Ming Ding, Pingping Han.Vulnerability assessment to small-world power grid based on weighted topological model[J].Proceedings of the CSEE,2008,28(10):20-25(in Chinese).

Google Scholar