Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Power system vulnerability detecting method based on power communication interaction

A power system, interactive influence technology, applied in the direction of measuring electricity, measuring devices, measuring electrical variables, etc., can solve problems such as difficult power system operation and control, inability to characterize the influence of communication on the power system, lack of detection, etc.

Inactive Publication Date: 2015-05-13
SOUTHEAST UNIV +4
View PDF8 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the excessive neglect of the physical characteristics of the power system by the complex network theory, it is still difficult to specifically guide the operation and control of the power system
[0005] At present, for the interactive influence of power communication, the problem of power system vulnerability detection method is that there is no mature power system vulnerability detection method that considers the influence of communication factors
The existing power system vulnerability detection methods lack the detection of the impact of communication faults such as delay, bit error and interruption in the power communication system on the power system, and cannot characterize the impact of communication on the power system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power system vulnerability detecting method based on power communication interaction
  • Power system vulnerability detecting method based on power communication interaction
  • Power system vulnerability detecting method based on power communication interaction

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The present invention will be further described in detail below in conjunction with test examples and specific embodiments. However, it should not be understood that the scope of the above subject matter of the present invention is limited to the following embodiments, and all technologies realized based on the content of the present invention belong to the scope of the present invention.

[0050] Such as figure 1 As shown, a method for detecting the vulnerability of a power system based on the interactive influence of power communication of the present invention, the detection method includes the following steps:

[0051] Step 10): Establishing the correlation matrix of the power-communication complex system.

[0052] In step 10), the correlation matrix of the power-communication composite system is given by the equation A z = A p ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a power system vulnerability detecting method based on power communication interaction. The method includes the following steps: step 10) building a power-communication composition system correlation matrix; step 20) measuring and calculating the power system vulnerability to obtain a power grid node vulnerability index and a power network branch vulnerability index; step 30) measuring and calculating communication business vulnerability, including a communication network node vulnerability index and a communication network branch vulnerability index; step 40) calculating power communication information interaction channel vulnerability; step 50) substituting the vulnerability indexes obtain from the step 20), the step 30) and the step 40) into the power-communication composite system correlation matrix to obtain the power-communication composite system vulnerability matrix, and sequencing the composite system vulnerability values from large to small. By means of the detecting method, the power system vulnerability can be accurately detected by combining the effect of the communication system on the power system.

Description

technical field [0001] The invention relates to the technical field of power grid security detection, in particular to a method for detecting the vulnerability of a power system based on the interactive influence of power communication. Background technique [0002] Vulnerability, also known as weakness or loophole, is a description of a system and its components that are easily affected and destroyed, and lack the ability to resist interference and restore the initial state. The vulnerability of the power system refers to the dangerous state of the power system where large-scale blackouts are latent due to factors such as human intervention, information, computing, communication, internal components, and protection and control systems. Power system vulnerability assessment mainly includes four aspects: event identification, risk calculation, network analysis and decision analysis. [0003] As China builds a strong smart grid with the UHV grid as the backbone grid and the c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G01R31/00
Inventor 汤奕韩啸
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products