Key Transmission Section Search Based on Graph Theory and PMU Data for Vulnerable Line Identification in Power System

IF 1.2 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Journal of Electrical and Computer Engineering Pub Date : 2023-10-30 DOI:10.1155/2023/8643537
Miao Yu, Shouzhi Zhang, Fang Shi, Jianqun Sun, Jingjing Wei, Yixiao Wu, Jingxuan Hu
{"title":"Key Transmission Section Search Based on Graph Theory and PMU Data for Vulnerable Line Identification in Power System","authors":"Miao Yu, Shouzhi Zhang, Fang Shi, Jianqun Sun, Jingjing Wei, Yixiao Wu, Jingxuan Hu","doi":"10.1155/2023/8643537","DOIUrl":null,"url":null,"abstract":"Failure of vulnerable lines in the power system often results in tidal shifts, and triggering chain failures and their corresponding transmission sections are concentrated manifestations of the weak links in the power system. It is very important to identify the vulnerable lines and search the transmission section to prevent the chain faults as well as to analyze the stability of the power system. Aiming at the problems of inaccurate search of vulnerable lines, difficulties adapting to the complex and changing power system as well as wrong selection and omission of transmission section search in the existing references, this paper proposes an algorithm for searching vulnerable lines and their key transmission sections based on the graph theory and PMU (phasor measurement unit) data. First, the method combines with the graph theory and PMU data to construct the grid topology map. Second, the comprehensive indicators for screening vulnerable lines are proposed by fully considering the network topology and line capacity, which combines with power exchange efficiency and energy fluctuation probability. Third, the distance matrix in the Floyd algorithm is transformed into a unit group that can store more elements, which reduces the traversal times of the algorithm and improves computational efficiency. The fast localization of transmission cross sections associated with vulnerable lines is realized. Finally, the critical transmission cross sections are screened according to the line outage distribution factor and line safety margin. The IEEE 39-bus system is selected for simulation experiments, and the simulation results show that the key transmission section search method proposed in this paper can better adapt to the variable power grid and is faster and more accurate than the other common method.","PeriodicalId":46573,"journal":{"name":"Journal of Electrical and Computer Engineering","volume":null,"pages":null},"PeriodicalIF":1.2000,"publicationDate":"2023-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Electrical and Computer Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1155/2023/8643537","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Failure of vulnerable lines in the power system often results in tidal shifts, and triggering chain failures and their corresponding transmission sections are concentrated manifestations of the weak links in the power system. It is very important to identify the vulnerable lines and search the transmission section to prevent the chain faults as well as to analyze the stability of the power system. Aiming at the problems of inaccurate search of vulnerable lines, difficulties adapting to the complex and changing power system as well as wrong selection and omission of transmission section search in the existing references, this paper proposes an algorithm for searching vulnerable lines and their key transmission sections based on the graph theory and PMU (phasor measurement unit) data. First, the method combines with the graph theory and PMU data to construct the grid topology map. Second, the comprehensive indicators for screening vulnerable lines are proposed by fully considering the network topology and line capacity, which combines with power exchange efficiency and energy fluctuation probability. Third, the distance matrix in the Floyd algorithm is transformed into a unit group that can store more elements, which reduces the traversal times of the algorithm and improves computational efficiency. The fast localization of transmission cross sections associated with vulnerable lines is realized. Finally, the critical transmission cross sections are screened according to the line outage distribution factor and line safety margin. The IEEE 39-bus system is selected for simulation experiments, and the simulation results show that the key transmission section search method proposed in this paper can better adapt to the variable power grid and is faster and more accurate than the other common method.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于图论和PMU数据的输电关键区段搜索在电力系统脆弱线路识别中的应用
电力系统中易损线路的故障往往会引起潮流偏移,触发链故障及其相应的输电路段是电力系统薄弱环节的集中表现。脆弱线路的识别和输电区段的搜索,对防止连锁故障的发生以及分析电力系统的稳定性具有十分重要的意义。针对现有文献中脆弱线路搜索不准确、难以适应复杂多变的电力系统以及输电段搜索选择错误和遗漏等问题,提出了一种基于图论和相量测量单元(PMU)数据的脆弱线路及其关键输电段搜索算法。首先,该方法结合图论和PMU数据构建网格拓扑图。其次,在充分考虑电网拓扑结构和线路容量的基础上,结合电力交换效率和能量波动概率,提出了筛选脆弱线路的综合指标。第三,将Floyd算法中的距离矩阵转化为可存储更多元素的单元群,减少了算法的遍历次数,提高了计算效率。实现了与脆弱线路相关的传输截面的快速定位。最后,根据线路停运分配系数和线路安全裕度对关键输电截面进行筛选。选择IEEE 39总线系统进行仿真实验,仿真结果表明,本文提出的关键传输段搜索方法能够更好地适应可变电网,并且比其他常用方法更快、更准确。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Journal of Electrical and Computer Engineering
Journal of Electrical and Computer Engineering COMPUTER SCIENCE, INFORMATION SYSTEMS-
CiteScore
4.20
自引率
0.00%
发文量
152
审稿时长
19 weeks
期刊最新文献
Network Intrusion Detection Using Knapsack Optimization, Mutual Information Gain, and Machine Learning Electronically Tunable Grounded and Floating Capacitance Multipliers Using a Single Active Element A Novel Technique for Facial Recognition Based on the GSO-CNN Deep Learning Algorithm Simulation Analysis of Arc-Quenching Performance of Eco-Friendly Insulating Gas Mixture of CF3I and CO2 under Impulse Arc Balancing Data Privacy and 5G VNFs Security Monitoring: Federated Learning with CNN + BiLSTM + LSTM Model
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1