Discover the SciOpen Platform and Achieve Your Research Goals with Ease.
Search articles, authors, keywords, DOl and etc.
In power systems, failures of vulnerable lines can trigger large-scale cascading failures, and vulnerability assessment is dedicated to locating these lines and reducing the risks of such failures. Based on a structure and attribute network embedding (SANE) algorithm, a novel quantitative vulnerability analysis method is proposed to identify vulnerable lines in this research. First, a two-layered random walk network with topological and electrical properties of transmission lines is established. Subsequently, based on the weighted degree of nodes in the two-layered network, the inter-layer and intra-layer walking transition probabilities are developed to obtain walk sequences. Then, a Word2Vec algorithm is applied to obtain low-dimension vectors representing transmission lines, according to obtained walk sequences for calculating the vulnerability index of transmissions lines. Finally, the proposed method is compared with three widely used methods in two test systems. Results show the network embedding based method is superior to those comparison methods and can provide guidance for identifying vulnerable lines.
A. S. Wang, Y. Luo, G. Y. Tu, and P. Liu, “Vulnerability assessment scheme for power system transmission networks based on the fault chain theory” IEEE Transactions on Power Systems, vol. 26, no. 1, pp. 442–450, Feb. 2011.
M. Vaiman, K. R. Bell, Y. Chen, B. Chowdhury, I. Dobson, P. D. H. Hines, M. Papic, S. S. Miller, and P. Zhang, “Risk assessment of cascading outages: Methodologies and challenges” IEEE Transactions on Power Systems, vol. 27, no. 2, pp. 631–641, May 2012.
R. Albert, I. Albert, and G. L. Nakarado, “Structural vulnerability of the North American power grid” Physical Review E, vol. 69, no. 2, pp. 025103, Feb. 2004.
H. Bai and S. H. Miao, “Hybrid flow betweenness approach for identification of vulnerable line in power system” IET Generation, Transmission & Distribution, vol. 9, no. 12, pp. 1324–1331, Sep. 2015.
S. Poudel, Z. Ni, and W. Sun, “Electrical distance approach for searching vulnerable branches during contingencies” IEEE Transactions on Smart Grid, vol. 9, no. 4, pp. 3373–3382, Jul. 2018.
E. Bompard, E. Pons, and D. Wu, “Extended topological metrics for the analysis of power grid vulnerability” IEEE Systems Journal, vol. 6, no. 3, pp. 481–487, Sep. 2012.
C. L. Pu, P. Wu, and Y. X. Xia, “Vulnerability assessment of power grids against link-based attacks” IEEE Transactions on Circuits and Systems Ⅱ: Express Briefs, vol. 67, no. 10, pp. 2209–2213, Oct. 2020.
R. S. Biswas, A. Pal, T. Werho, and V. Vittal, “A graph theoretic approach to power system vulnerability identification” IEEE Transactions on Power Systems, vol. 36, no. 2, pp. 923–935, Mar. 2021.
A. Beiranvand and P. Cuffe, “A topological sorting approach to identify coherent cut-sets within power grids” IEEE Transactions on Power Systems, vol. 35, no. 1, pp. 721–730, Jan. 2020.
X. G. Wei, J. B. Zhao, T. Huang, and E. Bompard, “A novel cascading faults graph based transmission network vulnerability assessment method” IEEE Transactions on Power Systems, vol. 33, no. 3, pp. 2995–3000, May 2018.
X. G. Wei, S. B. Gao, T. Huang, E. Bompard, R. J. Pi, and T. Wang, “Complex network-based cascading faults graph for the analysis of transmission network vulnerability” IEEE Transactions on Industrial Informatics, vol. 15, no. 3, pp. 1265–1276, Mar. 2019.
M. Ding, Y. C. Qian, and J. J. Zhang, “Multi-timescale cascading failure evolution and risk assessment model” Proceedings of the CSEE, vol. 37, no. 20, pp. 5902–5912, Nov. 2017.
J. J. Qi, J. H. Wang, and K. Sun, “Efficient estimation of component interactions for cascading failure analysis by em algorithm” IEEE Transactions on Power Systems, vol. 33, no. 3, pp. 3153–3161, May 2018.
Z. Y. Ma, C. Shen, F. Liu, and S. W. Mei, “Fast screening of vulnerable transmission lines in power grids: a PageRank-based approach” IEEE Transactions on Smart Grid, vol. 10, no. 2, pp. 1982–1991, Mar. 2019.
X. Chen, B. Kang, J. Lijffijt, and T. De Bie, “ALPINE: active link prediction using network embedding” Applied Sciences, vol. 11, no. 11, pp. 5043, May 2021.
P. Goyal and E. Ferrara, “Graph embedding techniques, applications, and performance: a survey” Knowledge-Based Systems, vol. 151, pp. 78–94, Jul. 2018.
X. Yue, Z. Wang, J. G. Huang, S. Parthasarathy, S. Moosavinasab, Y. G. Huang, S. M. Lin, W. Zhang, P. Zhang, and H. Sun, “Graph embedding on biomedical networks: methods, applications and evaluations” Bioinformatics, vol. 36, no. 4, pp. 1241–1251, Feb. 2020.
T. Wu, Y. J. A. Zhang, Y. Liu, W. C. Lau, and H. L. Xu, “Missing data recovery in large power systems using network embedding” IEEE Transactions on Smart Grid, vol. 12, no. 1, pp. 680–691, Jan. 2021.
P. Cui, X. Wang, J. Pei, and W. W. Zhu, “A survey on network embedding” IEEE Transactions on Knowledge and Data Engineering, vol. 31, no. 5, pp. 833–852, May 2019.
J. Z. Tu, J. Zhang, G. Q. Bu, J. Yi, Y. H. Yin, and J. C. Jia, “Analysis of the sending-side system instability caused by multiple HVDC commutation failure” CSEE Journal of Power and Energy Systems, vol. 1, no. 4, pp. 37–44, Dec. 2015.
H. J. Tong, R. C. Qiu, D. X. Zhang, H. S. Yang, Q. Ding, and X. Shi, “Detection and classification of transmission line transient faults based on graph convolutional neural network” CSEE Journal of Power and Energy Systems, vol. 7, no. 3, pp. 456–471, May 2021.
J. K. Fang, C. Su, Z. Chen, H. S. Sun, and P. Lund, “Power system structural vulnerability assessment based on an improved maximum flow approach” IEEE Transactions on Smart Grid, vol. 9, no. 2, pp. 777–785, Mar. 2018.
This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).