Power grid vulnerability evaluation method based on membership function fuzzy comprehensive evaluation method

A fuzzy comprehensive evaluation and membership function technology, applied in data processing applications, instruments, calculations, etc., can solve problems such as limited reference value

Inactive Publication Date: 2016-09-28
STATE GRID CORP OF CHINA +3
View PDF4 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are various reasons for the vulnerability of the power grid. This method can only reflect the fragile c

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power grid vulnerability evaluation method based on membership function fuzzy comprehensive evaluation method
  • Power grid vulnerability evaluation method based on membership function fuzzy comprehensive evaluation method
  • Power grid vulnerability evaluation method based on membership function fuzzy comprehensive evaluation method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0235] The present invention will be described in detail below with reference to the drawings and specific embodiments. This embodiment is implemented on the premise of the technical solution of the present invention, and a detailed implementation mode and specific operation process are given, but the protection scope of the present invention is not limited to the following embodiments.

[0236] Such as figure 1 As shown, this embodiment provides a comprehensive evaluation method of power grid vulnerability based on the fuzzy comprehensive evaluation method of membership function, including the steps:

[0237] S1. Complete the calculation of the vulnerability indicators of static security, dynamic security, topology stability and reliability related to the vulnerability of the power grid.

[0238] S101, Power grid static security analysis

[0239] 1) Calculate the average power flow limit AQBO of the power grid branch:

[0240]

[0241]

[0242] Where: N BO Set for the overloaded bran...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a power grid vulnerability evaluation method based on a membership function fuzzy comprehensive evaluation method. The power grid vulnerability evaluation method comprises the steps that 1) static safety analysis, dynamic safety analysis, power grid topology structure safety analysis and reliability analysis indexes of a power grid are defined; and 2) vulnerability fuzzy comprehensive evaluation is carried out based on membership functions. According to the invention, for a continuous and reliable power supply target of a load, the vulnerability level of the power grid is comprehensively measured from the aspects of voltage, current, structure, reliability and the like of the power grid; the vulnerability score is more comprehensive and more for reference; and the vulnerability state evaluation level of the power grid is improved.

Description

technical field [0001] The invention relates to a method for evaluating the vulnerability of a power grid, in particular to a method for comprehensively evaluating the vulnerability of a power grid based on a fuzzy comprehensive evaluation method of a membership degree function. Background technique [0002] Power grid vulnerability assessment is to analyze the degree of vulnerability and potential weak links and key system components of the system from the perspective of the whole, system and macro. The power sector can improve the robustness of the system by strengthening the monitoring of vulnerable links and key equipment , Reduce the potential risk and vulnerability of the system. How to conduct a comprehensive and comprehensive assessment of the vulnerability of the power grid has always been a subject of much concern. [0003] The assessment of power grid vulnerability can be roughly divided into the following aspects. The first category is power system vulnerabilit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q50/06
CPCG06Q50/06
Inventor 魏文辉林昌年夏继红马强金逸费益军杨选怀高峰赵云军张辉秦可源马群史立勤林春龙
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products