Research on Vulnerability Assessment System of Complicated Power System

Article Preview

Abstract:

The factors which lead to large-area power outages are more than ever, when the complexity of the expansion power system is increasing. Therefore, it is important to assess the vulnerability of the complicated power system. This paper first proposes an objective, practical and adaptive vulnerability assessment system of complicated power system by use of Analytic Hierarchy Process, which based on multi-factors analysis of large-area outages. This system can find out the vulnerability point of the power system,and take advantages of the government, who can over-all plan, correspond and organize the social resource to reduce the vulnerability of power system and prevent large-area power outages, and the power enterprises who can maintaining the stability of power system by technology. Finally, the paper gives an assessment example of provincial power system.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 204-210)

Pages:

622-626

Citation:

Online since:

February 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Hou Hui, Yin Xianggen, Chen Qingqian, You Dahai, Tong Guangyi and Shao Dejun: Automation of Electric Power System Vol. 32-11 (2008), pp.12-15. (in Chinese).

DOI: 10.1109/upec.2007.4468958

Google Scholar

[2] South Bureau of State Electricity Regulatory Commission: Final Report on 2008 southern China power grid situation summary in the snow disaster, China, Guangzhou (2008). (in Chinese).

Google Scholar

[3] Chen Xiaogang, Sun Ke and Cao Yijia: Transactions of China electrotechnical society Vol. 22-10 (2007), pp.138-144. (in Chinese).

Google Scholar

[4] U.S. Department of Energy Office of Energy Assurance: Vulnerability assessment methodology- Electric Power Infrastructure (2002).

Google Scholar

[5] Brooke Phillip J and Paige Richard F: Computers and Security, Vol. 22 (2003), pp.256-264.

Google Scholar

[6] Gao Shang: Science Technology and Engineering Vol. 7-20 (2001), pp.5204-5207. (in Chinese).

Google Scholar

[7] Harold A. Linstone and Murray Turoff: The Delphi Method: Techniques and Applications. (Addison-Wesley Publishing Company, Reading, Mass. 1975).

DOI: 10.1016/0160-9327(76)90011-9

Google Scholar