By Topic

Vulnerability assessment of bulk power grid based on complex network theory

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

6 Author(s)
Zhang Guohua ; Key Lab. of Power Syst. Protection & Dynamic Security Monitoring & Control under Minist. of Educ., North China Electr. Power Univ., Beijing ; Wang Ce ; Zhang Jianhua ; Yang Jingyan
more authors

The vulnerability assessment algorithm of the bulk power grid based on complex network theory is proposed in this paper. The traditional research model of the power grid based on complex network theory is a graph with no direction and no weight at present. Because this model is far from the real power system, sometimes the wrong results may be gotten. In this paper, the models of components in the power grid are constructed detailedly, furthermore the weighted and directional graph is provided. First, the connecting formings among buses (instead in the traditional methods only substations are considered), lines, transformers and generators are simulated detailedly. Second, the power flow direction in the power grid is considered, and the components' tolerance to disturbances is also considered. Based on the proposed model, the power grid's tolerance to errors and attacks is analyzed. The key components and weak areas are indicated. At last, the robustness and fault dissemination mechanism of the power grid under cascading failures are analyzed based on the proposed method. The North China power grid is used as an example to validate the proposed method.

Published in:

Electric Utility Deregulation and Restructuring and Power Technologies, 2008. DRPT 2008. Third International Conference on

Date of Conference:

6-9 April 2008