To reveal the mechanism of fault propagation and temporal information between electrical network branches intuitively and vividly, we have proposed a fault chain-based cascading fault graph (CFG) that considers the topological, physical, and fault operational features from an overload mechanism perspective. The proposed CFG is used to construct metrics to identify vulnerable branches of an electrical network. Furthermore, because the vulnerable branch rankings change with the changing fault chain length, the ranking results’ change rules are investigated. As a result, the branch vulnerabilities’ characteristics are found to be different at different stages under sequential attacks. Inspired by the characteristics, the CFGs are divided into three sub-CFGs, based on load shedding threshold, to identify the vulnerable branches at different stages. The proposed method is used to identify the vulnerable branches of the IEEE 39- and 118-bus systems, and its effectiveness is validated by investigating load shedding of the systems under deliberate attacks.
Analysis of electrical network vulnerability using segmented cascading faults graph / Wei, X.; Gao, S.; Huang, T.. - In: COMPUTERS & ELECTRICAL ENGINEERING. - ISSN 0045-7906. - 81:(2020), p. 106519. [10.1016/j.compeleceng.2019.106519]
Analysis of electrical network vulnerability using segmented cascading faults graph
Huang T.
2020
Abstract
To reveal the mechanism of fault propagation and temporal information between electrical network branches intuitively and vividly, we have proposed a fault chain-based cascading fault graph (CFG) that considers the topological, physical, and fault operational features from an overload mechanism perspective. The proposed CFG is used to construct metrics to identify vulnerable branches of an electrical network. Furthermore, because the vulnerable branch rankings change with the changing fault chain length, the ranking results’ change rules are investigated. As a result, the branch vulnerabilities’ characteristics are found to be different at different stages under sequential attacks. Inspired by the characteristics, the CFGs are divided into three sub-CFGs, based on load shedding threshold, to identify the vulnerable branches at different stages. The proposed method is used to identify the vulnerable branches of the IEEE 39- and 118-bus systems, and its effectiveness is validated by investigating load shedding of the systems under deliberate attacks.File | Dimensione | Formato | |
---|---|---|---|
1-s2.0-S0045790618324844-main.pdf
non disponibili
Tipologia:
2a Post-print versione editoriale / Version of Record
Licenza:
Non Pubblico - Accesso privato/ristretto
Dimensione
2.23 MB
Formato
Adobe PDF
|
2.23 MB | Adobe PDF | Visualizza/Apri Richiedi una copia |
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.
https://hdl.handle.net/11583/2780332