Abstract

This paper mainly studies the vulnerability of node combination of two kinds of networks, and verifies whether all networks can use the pinning control optimization point selection algorithm. One is the primitive network, in which the nodes correspond to the components in the power grid, and the other is the dual network, in which the nodes are mapped to the nodes of the dual model, It is mapped as an edge, and then the vulnerability of node combination is studied by containment control theory. In the experiment, IEEE57 nodes are used to study the original network, and different combination nodes are used to attack the original network to study the vulnerability. By studying the dual network with IEEE14 nodes, it is found that the eigenvalues of the residual matrix after deleting the control nodes are all zero. Therefore, the dual model of power grid can not use the pinning control theory, and it further shows that not any network can use the pinning control theory to select points.

Highlights

  • With the demand of life, the power system network has become a complex network

  • Literature[1]points out in the simulation of the power grid between the United States and South Canada that cascaded faults can usually propagate to a long distance from the initial fault, and a few vulnerable lines near the initial fault area play a role in the process of fault propagation[2]

  • The topology duality theory of power grid is used to realize the correspondence between transmission lines and nodes[5]

Read more

Summary

Introduction

The power system presents the characteristics of many kinds and quantities of electronic components, and the transmission line presents the characteristics of complex and cross. Such characteristics make the weak information of topology hidden in the power grid, which is easy to cause large-scale blackouts and chain accidents. Literature[1]points out in the simulation of the power grid between the United States and South Canada that cascaded faults can usually propagate to a long distance from the initial fault, and a few vulnerable lines near the initial fault area play a role in the process of fault propagation[2]. It is worthy of further study to find the identification algorithm of combined vulnerable nodes, and the identification of combined node vulnerability can provide a theoretical basis for the planning and construction of the new generation of power grid

Combination of basic theory of containment and control
Power grid vulnerability assessment index
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call