Transmission System Vulnerability Assessment based on Practical Identification of Critical Relays and Contingencies

被引:0
|
作者
Bai, Hua [1 ]
Ajjarapu, Venkataramana [1 ]
机构
[1] Iowa State Univ, Dept Elect & Comp Engn, Ames, IA 50010 USA
来源
2008 IEEE POWER & ENERGY SOCIETY GENERAL MEETING, VOLS 1-11 | 2008年
关键词
Relay margin; relay staying time; contingency severity; critical relay; critical contingency; transmission system vulnerability;
D O I
暂无
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
Relay margin can be applied as a direct tool to evaluate relay status during system disturbances. Based on the practical dynamic security assessment criteria for relay margin, we propose the relay margin ratio and the relay staying time ratio which provide more valuable information than relay margin for relay status evaluation. Motivated by the need of considering relay tripping for contingency evaluations, the most possible tripping severity which incorporates the possibility of relay tripping to evaluate contingency severity is proposed. The relay margin ratio and relay staying time ratio are applied to identify the most critical relays for each contingency based on which the most possible tripping severity is obtained to identify the most critical contingencies in transmission systems. These two inherently related procedures together compose a framework to assess the transmission system vulnerability. Numerical test results are presented using a 23-bus test system.
引用
收藏
页码:4244 / 4251
页数:8
相关论文
共 50 条
  • [31] Vulnerability assessment method for manufacturing system based on complex network
    Gao G.
    Rong T.
    Yue W.
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2018, 24 (09): : 2288 - 2296
  • [32] Vulnerability assessment of water transportation system based on entropy theory
    Liu, Cong
    Liu, Yi
    Liu, Jingxian
    Liu, Zhao
    2017 4TH INTERNATIONAL CONFERENCE ON TRANSPORTATION INFORMATION AND SAFETY (ICTIS), 2017, : 496 - 502
  • [33] A Vulnerability Assessment Tool Based on OVAL in System Block Model
    Lee, Geuk
    Ko, Il-Seok
    Kim, Tai-hoon
    INTELLIGENT COMPUTING, PART I: INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING, ICIC 2006, PART I, 2006, 4113 : 1115 - 1120
  • [34] Kruskal algorithm based assessment on power system structural vulnerability
    Zhou, Yanheng
    Wu, Junyong
    Chen, Qichao
    Zhang, Guangtao
    Qu, Bo
    Dianwang Jishu/Power System Technology, 2013, 37 (11): : 3172 - 3177
  • [35] Vulnerability Distribution Model of Critical Infrastructures Based on Topological System Simulation
    Yao, Xiaobo
    Han, Chuanfeng
    Chen, Qian
    Meng, Lingpeng
    ADVANCED COMPUTING STRATEGIES FOR ENGINEERING, PT I, 2018, 10863 : 498 - 515
  • [36] Vulnerability Assessment of Emergency Logistics System Based on Linguistic Variables
    Nie, Tong-Tong
    Zhang, Xian-Long
    INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS & STATISTICS, 2013, 43 (13): : 68 - 76
  • [37] Power system vulnerability assessment based on transient energy margin
    Lu, Jinling
    Zhu, Yongli
    Diangong Jishu Xuebao/Transactions of China Electrotechnical Society, 2010, 25 (06): : 96 - 103
  • [38] Critical Lines Identification for ATC Assessment in Power System Planning
    Hojabri, Mojgan
    Hizam, Hashim
    Mariun, Norman
    Aris, Ishak
    Akorede, Mudathir Funsho
    INTERNATIONAL REVIEW OF ELECTRICAL ENGINEERING-IREE, 2011, 6 (04): : 1776 - 1782
  • [39] Dynamic time-based vulnerability assessment in pursuit of critical infrastructure resilience
    Nekooie, Mohammad Ali
    Taghizadeh, Ghasem
    PROCEEDINGS OF THE INSTITUTION OF CIVIL ENGINEERS-FORENSIC ENGINEERING, 2022,
  • [40] Critical transmission node identification method based on improved PageRank algorithm
    Zhu, Darui
    Wang, Rui
    Cheng, Wenji
    Duan, Jiandong
    Wang, Haifeng
    Dianli Xitong Baohu yu Kongzhi/Power System Protection and Control, 2022, 50 (05): : 86 - 93