Vulnerability Assessment Method for Distribution Network

Article Preview

Abstract:

. This article is based on the concept of vulnerability for power system, and focuses on vulnerable source of distribution network and summarizes the characteristics of vulnerability assessment methodologies and inadequate for the distribution network.And pointed out that domestic and international research for distribution network vulnerability is still in the initial stages,evaluation of existing methods are accessible only from one side distribution system's security status,the vulnerability assessment methodology of distribution network can be more fully reflected the global distribution network of security that will be researched in the future.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 986-987)

Pages:

652-655

Citation:

Online since:

July 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Weihua Chen, Quanyuan Jiang, Yijia Cao and so on. Risk-based vulnerability assessment in complex power systems [J]. Power System Technology. 2005: 29(4): 12-17.

DOI: 10.1109/ipec.2005.207004

Google Scholar

[2] Weihua Chen, Quanyuan Jiang, Yijia Cao. Voltage vulnerability assessment based on risk theory and fuzzy reasoning [J]. Proceedings of the CSEE. 2005: 25(24): 20-25.

DOI: 10.1109/ipec.2005.207004

Google Scholar

[3] Limei Yan. Brittleness Theory of System and Application to Electric Power System[D]. Harbin: Harbin Engineering University. (2006).

Google Scholar

[4] Jialin Bai, Tianqi Liu, Guoyun Cao and so on. A survey on vulnerability assessment method for power system [J]. Power System Technology. 2008: 32(2): 26-30.

Google Scholar

[5] Kang Lin, Keith E H. PRA for vulnerability assessment of power system infrastructure security[C]. Proceedings of the 37th Annual North American, Illinois, USA, (2005).

DOI: 10.1109/naps.2005.1560500

Google Scholar

[6] Kamwa I, Béland J, Cnabb D. PMU-based vulnerability assessment using wide-area severity indices and tracking modal analysis[C]. Power Systems Conference and Exposition, Atlanta, USA, (2006).

DOI: 10.1109/psce.2006.296288

Google Scholar

[7] Le Wang. Application Study on Vulnerability Assessment in Power System Security Defense System[D]. Beijing: North China Electric Power University. (2005).

Google Scholar

[8] Jinling Lu, Qunxing Ji, Yongli Zhu. Power Grid Vulnerability Assessment Based on Energy Function[J]. Power System Technology. 2008: 32(7): 30-33.

DOI: 10.1109/drpt.2008.4523560

Google Scholar

[9] Zhenbo Wei, Junyong Liu, Guojun Zhu and so on. Theoretical study on the vulnerability of power system[J]. Electric Power Automation Equipment. 2009: 29(7): 38-42.

DOI: 10.1109/supergen.2009.5348314

Google Scholar

[10] Tao Lin, Xingyuan Fan, Xialing Xu. Summary of power system vulnerability assessment method[j]. Journal of Electric Power Science and Technology. 2010: 25(4): 20-23.

Google Scholar

[11] Qian Li, Huaqiang Li, Zhaomeng Huang and so on. Power system vulnerability assessment based on transient energy hybrid method[J]. Power System Protection and Control. 2013: 41(20): 1-6.

Google Scholar