AI Chat Paper
Note: Please note that the following content is generated by AMiner AI. SciOpen does not take any responsibility related to this content.
{{lang === 'zh_CN' ? '文章概述' : 'Summary'}}
{{lang === 'en_US' ? '中' : 'Eng'}}
Chat more with AI
PDF (1.2 MB)
Collect
Submit Manuscript AI Chat Paper
Show Outline
Outline
Show full outline
Hide outline
Outline
Show full outline
Hide outline
Regular Paper | Open Access

Network Embedding Algorithm for Vulnerability Assessment of Power Transmission Lines Using Integrated Structure and Attribute Information

Xianglong LianTong QianZepeng LiXingyu ChenWenhu Tang ( )Q. H. Wu
School of Electric Power Engineering, South China University of Technology, Guangzhou 510640, China
Show Author Information

Abstract

In power systems, failures of vulnerable lines can trigger large-scale cascading failures, and vulnerability assessment is dedicated to locating these lines and reducing the risks of such failures. Based on a structure and attribute network embedding (SANE) algorithm, a novel quantitative vulnerability analysis method is proposed to identify vulnerable lines in this research. First, a two-layered random walk network with topological and electrical properties of transmission lines is established. Subsequently, based on the weighted degree of nodes in the two-layered network, the inter-layer and intra-layer walking transition probabilities are developed to obtain walk sequences. Then, a Word2Vec algorithm is applied to obtain low-dimension vectors representing transmission lines, according to obtained walk sequences for calculating the vulnerability index of transmissions lines. Finally, the proposed method is compared with three widely used methods in two test systems. Results show the network embedding based method is superior to those comparison methods and can provide guidance for identifying vulnerable lines.

References

[1]

A. S. Wang, Y. Luo, G. Y. Tu, and P. Liu, “Vulnerability assessment scheme for power system transmission networks based on the fault chain theory” IEEE Transactions on Power Systems, vol. 26, no. 1, pp. 442–450, Feb. 2011.

[2]

M. Vaiman, K. R. Bell, Y. Chen, B. Chowdhury, I. Dobson, P. D. H. Hines, M. Papic, S. S. Miller, and P. Zhang, “Risk assessment of cascading outages: Methodologies and challenges” IEEE Transactions on Power Systems, vol. 27, no. 2, pp. 631–641, May 2012.

[3]

R. Albert, I. Albert, and G. L. Nakarado, “Structural vulnerability of the North American power grid” Physical Review E, vol. 69, no. 2, pp. 025103, Feb. 2004.

[4]

H. Bai and S. H. Miao, “Hybrid flow betweenness approach for identification of vulnerable line in power system” IET Generation, Transmission & Distribution, vol. 9, no. 12, pp. 1324–1331, Sep. 2015.

[5]

S. Poudel, Z. Ni, and W. Sun, “Electrical distance approach for searching vulnerable branches during contingencies” IEEE Transactions on Smart Grid, vol. 9, no. 4, pp. 3373–3382, Jul. 2018.

[6]

E. Bompard, E. Pons, and D. Wu, “Extended topological metrics for the analysis of power grid vulnerability” IEEE Systems Journal, vol. 6, no. 3, pp. 481–487, Sep. 2012.

[7]

C. L. Pu, P. Wu, and Y. X. Xia, “Vulnerability assessment of power grids against link-based attacks” IEEE Transactions on Circuits and Systems Ⅱ: Express Briefs, vol. 67, no. 10, pp. 2209–2213, Oct. 2020.

[8]

R. S. Biswas, A. Pal, T. Werho, and V. Vittal, “A graph theoretic approach to power system vulnerability identification” IEEE Transactions on Power Systems, vol. 36, no. 2, pp. 923–935, Mar. 2021.

[9]

A. Beiranvand and P. Cuffe, “A topological sorting approach to identify coherent cut-sets within power grids” IEEE Transactions on Power Systems, vol. 35, no. 1, pp. 721–730, Jan. 2020.

[10]

X. G. Wei, J. B. Zhao, T. Huang, and E. Bompard, “A novel cascading faults graph based transmission network vulnerability assessment method” IEEE Transactions on Power Systems, vol. 33, no. 3, pp. 2995–3000, May 2018.

[11]

X. G. Wei, S. B. Gao, T. Huang, E. Bompard, R. J. Pi, and T. Wang, “Complex network-based cascading faults graph for the analysis of transmission network vulnerability” IEEE Transactions on Industrial Informatics, vol. 15, no. 3, pp. 1265–1276, Mar. 2019.

[12]

M. Ding, Y. C. Qian, and J. J. Zhang, “Multi-timescale cascading failure evolution and risk assessment model” Proceedings of the CSEE, vol. 37, no. 20, pp. 5902–5912, Nov. 2017.

[13]

J. J. Qi, J. H. Wang, and K. Sun, “Efficient estimation of component interactions for cascading failure analysis by em algorithm” IEEE Transactions on Power Systems, vol. 33, no. 3, pp. 3153–3161, May 2018.

[14]

Z. Y. Ma, C. Shen, F. Liu, and S. W. Mei, “Fast screening of vulnerable transmission lines in power grids: a PageRank-based approach” IEEE Transactions on Smart Grid, vol. 10, no. 2, pp. 1982–1991, Mar. 2019.

[15]

X. Chen, B. Kang, J. Lijffijt, and T. De Bie, “ALPINE: active link prediction using network embedding” Applied Sciences, vol. 11, no. 11, pp. 5043, May 2021.

[16]

P. Goyal and E. Ferrara, “Graph embedding techniques, applications, and performance: a survey” Knowledge-Based Systems, vol. 151, pp. 78–94, Jul. 2018.

[17]

X. Yue, Z. Wang, J. G. Huang, S. Parthasarathy, S. Moosavinasab, Y. G. Huang, S. M. Lin, W. Zhang, P. Zhang, and H. Sun, “Graph embedding on biomedical networks: methods, applications and evaluations” Bioinformatics, vol. 36, no. 4, pp. 1241–1251, Feb. 2020.

[18]
Q. Huang, A. X. Zheng, X. S. Shao, X. Q. Lu, and M. M. Duan, “Graph embedding and its application in defect detection system” in Proceedings of 2017 International Conference on Security, Pattern Analysis, and Cybernetics, 2017, pp. 690–695.
[19]

T. Wu, Y. J. A. Zhang, Y. Liu, W. C. Lau, and H. L. Xu, “Missing data recovery in large power systems using network embedding” IEEE Transactions on Smart Grid, vol. 12, no. 1, pp. 680–691, Jan. 2021.

[20]

P. Cui, X. Wang, J. Pei, and W. W. Zhu, “A survey on network embedding” IEEE Transactions on Knowledge and Data Engineering, vol. 31, no. 5, pp. 833–852, May 2019.

[21]
B. Perozzi, R. Al-Rfou, and S. Skiena, “DeepWalk: online learning of social representations” in Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2014, pp. 701–710.
[22]
A. Grover and J. Leskovec, “node2vec: scalable feature learning for networks” in Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2016, pp. 855–864.
[23]
S. Bandyopadhyay, A. Biswas, H. Kara, and M. N. Murty, “A multilayered informative random walk for attributed social network embedding” in ECAI 2020, G. De Giacomo, A. Catala, B. Dilkina, M. Milano, S. Barro, A. Bugarín, and J. Lang, Eds. IOS Press, 2020.
[24]

J. Z. Tu, J. Zhang, G. Q. Bu, J. Yi, Y. H. Yin, and J. C. Jia, “Analysis of the sending-side system instability caused by multiple HVDC commutation failure” CSEE Journal of Power and Energy Systems, vol. 1, no. 4, pp. 37–44, Dec. 2015.

[25]

H. J. Tong, R. C. Qiu, D. X. Zhang, H. S. Yang, Q. Ding, and X. Shi, “Detection and classification of transmission line transient faults based on graph convolutional neural network” CSEE Journal of Power and Energy Systems, vol. 7, no. 3, pp. 456–471, May 2021.

[26]
T. Mikolov, K. Chen, G. Corrado, and J. Dean, “Efficient estimation of word representations in vector space” arXiv preprint arXiv: 1301.3781, 2013.
[27]
T. Mikolov, I. Sutskever, K. Chen, G. Corrado, and J. Dean, “Distributed representations of words and phrases and their compositionality” in Proceedings of the 26th International Conference on Neural Information Processing Systems, 2013, pp. 3111–3119.
[28]

J. K. Fang, C. Su, Z. Chen, H. S. Sun, and P. Lund, “Power system structural vulnerability assessment based on an improved maximum flow approach” IEEE Transactions on Smart Grid, vol. 9, no. 2, pp. 777–785, Mar. 2018.

[29]
Y. Koç, T. Verma, N. A. M. Araujo, and M. Warnier, “MATCASC: a tool to analyse cascading line outages in power grids” in Proceedings of 2013 IEEE International Workshop on Inteligent Energy Systems, 2013, pp. 143–148.
[30]
C. Coffrin, D. Gordon, and P. Scott, “NESTA, the NICTA energy system test case archive” arXiv preprint arXiv: 1411.0359, 2014.
CSEE Journal of Power and Energy Systems
Pages 351-360
Cite this article:
Lian X, Qian T, Li Z, et al. Network Embedding Algorithm for Vulnerability Assessment of Power Transmission Lines Using Integrated Structure and Attribute Information. CSEE Journal of Power and Energy Systems, 2024, 10(1): 351-360. https://doi.org/10.17775/CSEEJPES.2021.09630

227

Views

2

Downloads

0

Crossref

1

Web of Science

1

Scopus

0

CSCD

Altmetrics

Received: 31 December 2021
Revised: 11 March 2022
Accepted: 12 April 2022
Published: 03 March 2023
© 2021 CSEE.

This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).

Return