Abstract
This paper mainly studies the vulnerability of node combination of two kinds of networks, and verifies whether all networks can use the pinning control optimization point selection algorithm. One is the primitive network, in which the nodes correspond to the components in the power grid, and the other is the dual network, in which the nodes are mapped to the nodes of the dual model, It is mapped as an edge, and then the vulnerability of node combination is studied by containment control theory. In the experiment, IEEE57 nodes are used to study the original network, and different combination nodes are used to attack the original network to study the vulnerability. By studying the dual network with IEEE14 nodes, it is found that the eigenvalues of the residual matrix after deleting the control nodes are all zero. Therefore, the dual model of power grid can not use the pinning control theory, and it further shows that not any network can use the pinning control theory to select points.
Highlights
With the demand of life, the power system network has become a complex network
Literature[1]points out in the simulation of the power grid between the United States and South Canada that cascaded faults can usually propagate to a long distance from the initial fault, and a few vulnerable lines near the initial fault area play a role in the process of fault propagation[2]
The topology duality theory of power grid is used to realize the correspondence between transmission lines and nodes[5]
Summary
The power system presents the characteristics of many kinds and quantities of electronic components, and the transmission line presents the characteristics of complex and cross. Such characteristics make the weak information of topology hidden in the power grid, which is easy to cause large-scale blackouts and chain accidents. Literature[1]points out in the simulation of the power grid between the United States and South Canada that cascaded faults can usually propagate to a long distance from the initial fault, and a few vulnerable lines near the initial fault area play a role in the process of fault propagation[2]. It is worthy of further study to find the identification algorithm of combined vulnerable nodes, and the identification of combined node vulnerability can provide a theoretical basis for the planning and construction of the new generation of power grid
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have