To reveal the mechanism of fault propagation and temporal information between electrical network branches intuitively and vividly, we have proposed a fault chain-based cascading fault graph (CFG) that considers the topological, physical, and fault operational features from an overload mechanism perspective. The proposed CFG is used to construct metrics to identify vulnerable branches of an electrical network. Furthermore, because the vulnerable branch rankings change with the changing fault chain length, the ranking results’ change rules are investigated. As a result, the branch vulnerabilities’ characteristics are found to be different at different stages under sequential attacks. Inspired by the characteristics, the CFGs are divided into three sub-CFGs, based on load shedding threshold, to identify the vulnerable branches at different stages. The proposed method is used to identify the vulnerable branches of the IEEE 39- and 118-bus systems, and its effectiveness is validated by investigating load shedding of the systems under deliberate attacks.

Analysis of electrical network vulnerability using segmented cascading faults graph / Wei, X.; Gao, S.; Huang, T.. - In: COMPUTERS & ELECTRICAL ENGINEERING. - ISSN 0045-7906. - 81:(2020), p. 106519. [10.1016/j.compeleceng.2019.106519]

Analysis of electrical network vulnerability using segmented cascading faults graph

Huang T.
2020

Abstract

To reveal the mechanism of fault propagation and temporal information between electrical network branches intuitively and vividly, we have proposed a fault chain-based cascading fault graph (CFG) that considers the topological, physical, and fault operational features from an overload mechanism perspective. The proposed CFG is used to construct metrics to identify vulnerable branches of an electrical network. Furthermore, because the vulnerable branch rankings change with the changing fault chain length, the ranking results’ change rules are investigated. As a result, the branch vulnerabilities’ characteristics are found to be different at different stages under sequential attacks. Inspired by the characteristics, the CFGs are divided into three sub-CFGs, based on load shedding threshold, to identify the vulnerable branches at different stages. The proposed method is used to identify the vulnerable branches of the IEEE 39- and 118-bus systems, and its effectiveness is validated by investigating load shedding of the systems under deliberate attacks.
File in questo prodotto:
File Dimensione Formato  
1-s2.0-S0045790618324844-main.pdf

non disponibili

Tipologia: 2a Post-print versione editoriale / Version of Record
Licenza: Non Pubblico - Accesso privato/ristretto
Dimensione 2.23 MB
Formato Adobe PDF
2.23 MB Adobe PDF   Visualizza/Apri   Richiedi una copia
Pubblicazioni consigliate

Caricamento pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11583/2780332