Transmission System Vulnerability Assessment based on Practical Identification of Critical Relays and Contingencies

被引:0
|
作者
Bai, Hua [1 ]
Ajjarapu, Venkataramana [1 ]
机构
[1] Iowa State Univ, Dept Elect & Comp Engn, Ames, IA 50010 USA
来源
2008 IEEE POWER & ENERGY SOCIETY GENERAL MEETING, VOLS 1-11 | 2008年
关键词
Relay margin; relay staying time; contingency severity; critical relay; critical contingency; transmission system vulnerability;
D O I
暂无
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
Relay margin can be applied as a direct tool to evaluate relay status during system disturbances. Based on the practical dynamic security assessment criteria for relay margin, we propose the relay margin ratio and the relay staying time ratio which provide more valuable information than relay margin for relay status evaluation. Motivated by the need of considering relay tripping for contingency evaluations, the most possible tripping severity which incorporates the possibility of relay tripping to evaluate contingency severity is proposed. The relay margin ratio and relay staying time ratio are applied to identify the most critical relays for each contingency based on which the most possible tripping severity is obtained to identify the most critical contingencies in transmission systems. These two inherently related procedures together compose a framework to assess the transmission system vulnerability. Numerical test results are presented using a 23-bus test system.
引用
收藏
页码:4244 / 4251
页数:8
相关论文
共 50 条
  • [41] Identification of Power Grid Critical Lines Based on Comprehensive Transmission Betweenness
    Cao, Yu
    Zhang, Yu
    Guo, Chuangxin
    Zhu, Bingquan
    Xu, Lizhong
    2017 IEEE POWER & ENERGY SOCIETY GENERAL MEETING, 2017,
  • [42] Vulnerability Identification in Mobile Agent based E-commerce System
    Saqib, Malik Najmus
    Aslam, Salman
    FUTURE INFORMATION TECHNOLOGY, 2011, 13 : 223 - 227
  • [43] Practical Identification of a DFIG based Wind Generator Model for Grid Assessment
    El Aimani, Salma
    2009 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS 2009), 2009, : 278 - 285
  • [44] Complex Network-Based Transmission Network Vulnerability Assessment Using Adjacent Graphs
    Zang, Tianlei
    Gao, Shibin
    Huang, Tao
    Wei, Xiaoguang
    Wang, Tao
    IEEE SYSTEMS JOURNAL, 2020, 14 (01): : 572 - 581
  • [45] CAT - A practical graph & SDL based toolkit for vulnerability assessment of 3G networks
    Kotapati, Kameswari
    Liu, Peng
    LaPorta, Thomas F.
    SECURITY AND PRIVACY IN DYNAMIC ENVIRONMENTS, 2006, 201 : 158 - +
  • [46] Study on Power System Vulnerability Assessment Based on Cascading Failure Model
    Qi, Hanbo
    Shi, Libao
    Ni, Yixin
    Yao, Liangzhong
    Masoud, Bazargan
    2014 IEEE PES GENERAL MEETING - CONFERENCE & EXPOSITION, 2014,
  • [47] Vulnerability Assessment of Authorization System for USB-Based Storage Devices
    Kumar, Ajay
    Sajeesh, C. S.
    Kumar, B. Vinod
    Sharma, Vineet
    Joseph, Gigi
    Vinod, Gopika
    RELIABILITY, SAFETY AND HAZARD ASSESSMENT FOR RISK-BASED TECHNOLOGIES, 2020, : 223 - 237
  • [48] A Vulnerability Assessment Method for Network System Based on Cooperative Game Theory
    Duan, Chenjian
    Wang, Zhen
    Ding, Hong
    Jiang, Mengting
    Ren, Yizhi
    Wu, Ting
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2019, PT II, 2020, 11945 : 391 - 398
  • [49] Vulnerability Assessment for Machine Learning Based Network Anomaly Detection System
    Ogawa, Yuji
    Kimura, Tomotaka
    Cheng, Jun
    2020 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TAIWAN), 2020,
  • [50] Critical zone identification framework for bulk electric system security assessment
    Qin, Chuan
    Guddanti, Kishan Prudhvi
    Vyakaranam, Bharat
    Nguyen, Tony
    Mahapatra, Kaveri
    Nguyen, Quan
    Hou, Zhangshuan
    Etingov, Pavel
    Samaan, Nader
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2024, 155