AI Chat Paper
Note: Please note that the following content is generated by AMiner AI. SciOpen does not take any responsibility related to this content.
{{lang === 'zh_CN' ? '文章概述' : 'Summary'}}
{{lang === 'en_US' ? '中' : 'Eng'}}
Chat more with AI
PDF (1,015.8 KB)
Collect
Submit Manuscript AI Chat Paper
Show Outline
Outline
Show full outline
Hide outline
Outline
Show full outline
Hide outline
Open Access

Vulnerable Point Identification Using Heterogeneous Interdependent Node Theory for Distribution Systems

Yu ZhangXiaohui SongLiwei XieHua LiuYong Li( )
China Electric Power Research Institute, Beijing 100192, China
College of Electrical and Information Engineering, Hunan University, Changsha 410082, China
Show Author Information

Abstract

In order to reduce the occurrence or expansion of accidents and maintain safety in distribution networks, it is essential to find out the vulnerable points for the power system in time. In this paper, a vulnerable point identification method based on heterogeneous interdependent (HI) node theory and risk theory is proposed. Compared with the methods based on betweenness theory, the method based on HI nodes theory can deal with the shortcomings of the power flow shortest path, and consider the direct and indirect relationship of nodes. It is more suitable for identifying vulnerable points in a realistic power system. First, according to the analysis of heterogenous interdependent networks, the HI nodes are defined and used to evaluate the utility coupling value of each node. Then an identification indicator, which combines the utility coupling value and the risk indicators, is utilized to evaluate the vulnerability of each node. Results show that the proposed method is a suitable one to find the vulnerable points and better than betweenness-based methods for a distribution network.

References

[1]
Y. W. Shang, S. X. Shi, B. Wang, X. Z. Dong, and J. Liu, “Operation risk assessment for distribution system with Photovoltaic Substation connections,” in Proceedings of the 12th IET International Conference on Developments in Power System Protection, 2014, pp. 15.
[2]
V. B. Venkateswaran, D. K. Saini and M. Sharma, “Approaches for optimal planning of energy storage units in distribution network and their impacts on system resiliency,” CSEE Journal of Power and Energy Systems, vol. 6, no. 4, pp. 816833, Dec. 2020.
[3]
L. Zhou, W. Sheng, W. Liu and Z. Ma, “An optimal expansion planning of electric distribution network incorporating health index and non-network solutions,” CSEE Journal of Power and Energy Systems, vol. 6, no. 3, pp. 681692, Sep. 2020.
[4]
A. S. Wang, Y. Luo, G. Y. Tu, and P. Liu, “Vulnerability assessment scheme for power system transmission networks based on the fault chain theory,” IEEE Transactions on Power System, vol. 26, no. 1, pp. 442450, Feb. 2011.
[5]
J. K. Fang, C. Su, Z. Chen, H. S. Sun, and P. Lund, “Power system structural vulnerability assessment based on an improved maximum flow approach,” IEEE Transactions on Smart Grid, vol. 9, no. 2, pp. 777785, Mar. 2018.
[6]
Y. Cai, Y. J. Cao, Y. Li, T. Huang, and B. Zhou, “Cascading failure analysis considering interaction between power grids and communication networks,” IEEE Transactions on Smart Grid, vol. 7, no. 1, pp. 530538, Jan. 2016.
[7]
X. B. Yu and C. Singh, “A practical approach for integrated power system vulnerability analysis with protection failures,” IEEE Transactions on Power Systems, vol. 19, no. 4, pp. 18111820, Nov. 2004.
[8]
W. N. Wu, J. Yang, W. P. Hu, Z. L. Zeng, T. K. Yu, and P. Liu, “Power grid risk assessment system considering characteristics of transmission line failure,” Electric Power Automation Equipment, vol. 34, no. 6, pp. 129134, Jun. 2014.
[9]
M. Ding, Y. Guo, and J. J. Zhang, “Vulnerability identification for cascading failures of complex power grid based on effect risk entropy,” Automation of Electric Power Systems, vol. 37, no. 17, pp. 5257, Sep. 2013.
[10]
M. Ding, Y. Guo, J. J. Zhang, Y. C. Qian, X. J. Qi, J. He, and J. Yi, “Node vulnerability assessment for complex power grids based on effect risk entropy-weighted fuzzy comprehensive evaluation,” Transactions of China Electrotechnical Society, vol. 30, no. 3, pp. 214223, Feb. 2015.
[11]
Y. Zheng, K. G. Xie, H. B. Li, Z. Y. Li, B. Hu, and Y. H. Ma, “Application of the weak part identification based on reliability tracking method to reliability improvement of provincial power network,” Electrical Measurement & Instrumentation, vol. 52, no. 6, pp. 118123, Mar. 2015.
[12]
D. T. Nguyen, Y. L. Shen, and M. T. Thai, “Detecting critical nodes in interdependent power networks for vulnerability assessment,” IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 151159, Mar. 2013.
[13]
E. Bompard, D. Wu, and F. Xue, “Structural vulnerability of power systems: A topological approach,” Electric Power Systems Research, vol. 81, no. 7, pp. 13341340, Jul. 2011.
[14]
R. Albert, H. Jeong, and A. L. Barabási, “Error and attack tolerance of complex networks,” Nature, vol. 406, no. 6794, pp. 378382, Jul. 2000.
[15]
S. W. Mei, X. M. Zhang, and M. Cao, Power Grid Complexity. Berlin Heidelberg: Springer, 2011.
[16]
G. Chen, Z. Y. Dong, D. J. Hill, and G. H. Zhang, “An improved model for structural vulnerability analysis of power networks,” Physica A: statistical Mechanics and its Applications, vol. 388, no. 19, pp. 42594266, Oct. 2009.
[17]
A. L. Barabási and R. Albert, “Emergence of scaling in random networks,” Science, vol. 286, no. 5439, pp. 509512, Oct. 1999.
[18]
R. Albert, I. Albert, and G. L. Nakarado, “Structural vulnerability of the North American power grid,” Physical Review E, vol. 69, no. 2, pp. 025103, Feb. 2004.
[19]
X. G. Chen, K. Sun, and Y. J. Cao, “Structural vulnerability analysis of large power grid based on complex network theory,” Transactions of China Electrotechnical Society, vol. 22, no. 10, pp. 138144, Oct. 2007.
[20]
M. Ding and P. P. Han, “Vulnerability assessment to small-world power grid based on weighted topological mode,” Proceedings of the CSEE, vol. 28. no. 10, pp. 2025, Apr. 2008.
[21]
W. C. Shi, X. M. Li, X. L. Wang, S. X. Sun, Y. X. Zhou, and C. C. Hao, “Vulnerability assessment method for distribution network,” Proceedings of the CSU-EPSA, vol. 30, no. 12, pp. 125131, Dec. 2018.
[22]
E. Bompard, E. Pons, and D. Wu, “Extended topological metrics for the analysis of power grid vulnerability,” IEEE Systems Journal, vol. 6, no. 3, pp. 481487, Sep. 2012.
[23]
A. Dwivedi and X. H. Yu, “A maximum-flow-based complex network approach for power system vulnerability analysis,” IEEE Transactions on Industrial Informatics, vol. 9, no. 1, pp. 8188, Feb. 2013.
[24]
R. W. Wang, Y. G. Zhang, Y. Yang, and J. Li, “Vulnerable line identification of complex power grid based on electrical betweenness,” Power System Protection and Control, vol. 42, no. 20, pp. 16, Oct. 2014.
[25]
S. V. Buldyrev, R. Parshani, G. Paul, H. E. Stanley, and S. Havlin, “Catastrophic cascade of failures in interdependent networks,” Nature, vol. 464, no. 7291, pp. 10251028, Apr. 2010.
[26]
J. X. Gao, S. V. Buldyrev, H. E. Stanley, and S. Havlin, “Networks formed from interdependent networks,” Nature Physics, vol. 8, no. 1, pp. 4048, Dec. 2012.
[27]
S. Y. Wu and G. Xu, “Degeneration characters of heterogeneous-interdependent network and key node Identification,” Acta Automatica Sinica, vol. 44, no. 5, pp. 953960, May 2018.
[28]
Y. Z. Sun, J. W. Han, X. F. Yan, P. S. Yu, and T. Y. Wu, “PathSim: Meta path-based top-k similarity search in heterogeneous information networks,” in Proceedings of the VLDB Endowment, vol. 4, no. 11, pp. 9921003, Aug. 2011.
[29]
W. Y. Liu, J. M. Wang, C. Xie, and W. Z. Wang. Brittleness source identification model for cascading failure of complex power grid based on brittle risk entropy,” Proceedings of the CSEE, vol. 32, no. 31, pp. 142149, Nov. 2012.
[30]
F. Xiong, B. B. Dong, and G. F. Li, “Risk evaluation of distribution system with stochastic distributed generator,” Automation of Electric Power Systems, vol. 40, no. 12, pp. 6267, Jun. 2016.
[31]
K. Wang, B. H. Zhang, Z. Zhang, X. G. Yin, and B. Wang, “An electrical betweenness approach for vulnerability assessment of power grids considering the capacity of generators and load,” Physica A: Statistical Mechanics and its Applications, vol. 390, no. 23–24, pp. 46924701, Nov. 2011.
CSEE Journal of Power and Energy Systems
Pages 591-598
Cite this article:
Zhang Y, Song X, Xie L, et al. Vulnerable Point Identification Using Heterogeneous Interdependent Node Theory for Distribution Systems. CSEE Journal of Power and Energy Systems, 2022, 8(2): 591-598. https://doi.org/10.17775/CSEEJPES.2019.02310

703

Views

21

Downloads

6

Crossref

N/A

Web of Science

11

Scopus

0

CSCD

Altmetrics

Received: 25 September 2019
Revised: 11 February 2020
Accepted: 08 April 2020
Published: 30 April 2020
© 2019 CSEE
Return