Identification method of vulnerable nodes of distribution network

An identification method and technology of distribution network, applied in the direction of instruments, data processing applications, resources, etc., can solve problems such as no longer applicable, increasing failure occurrence, weak links in distribution network, etc., to achieve accurate and reasonable, accurate High, effectiveness in addressing vulnerability issues

Pending Publication Date: 2018-04-03
HUIZHOU POWER SUPPLY BUREAU OF GUANGDONG POWER GRID CO LTD
View PDF2 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, a large number of vulnerability studies are mainly concentrated on the transmission network, and the research on the distribution network is still in its infancy. With the development of new energy and the improvement of various distributed power sources, the distribution network will be connected to distributed power sources. This will have an impact on the structure of the distribution network, which may lead to weak links in the distribution network and increase the probability of failure
Most of the current vulnerability assessments are based on complex network theory, and they are all aimed at the vulnerability assessment of the transmission network. Considering that most distribution networks are radial networks with open-loop operation, many of the assumptions and evaluation indicators are It is no longer applicable, so it is not suitable to directly transplant the evaluation system to the distribution network, and needs to be improved and improved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identification method of vulnerable nodes of distribution network
  • Identification method of vulnerable nodes of distribution network
  • Identification method of vulnerable nodes of distribution network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The accompanying drawings are for illustrative purposes only, and should not be construed as limitations on this patent; in order to better illustrate this embodiment, certain components in the accompanying drawings will be omitted, enlarged or reduced, and do not represent the size of the actual product; for those skilled in the art It is understandable that some well-known structures and descriptions thereof may be omitted in the drawings. The positional relationship described in the drawings is for illustrative purposes only, and should not be construed as a limitation on this patent.

[0046] Such as figure 1 As shown, a method for identifying vulnerable nodes in a distribution network includes the following steps:

[0047] Step 1, establishing distribution network node indicators, specifically including:

[0048] Step 101, establishing vulnerability assessment indicators based on complex network theory;

[0049] Step 102, establishing risk assessment indicators ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identification method of vulnerable nodes of a distribution network. The method includes the following steps: (1) establishing vulnerability evaluation indexes based on complex network theory, and a risk evaluation index based on risk theory; (2) using a hierarchical analysis method to carry out weighted summation on the vulnerability evaluation indexes of the distribution network and comprehensively analyze the vulnerability indexes and the risk index, and establishing a comprehensive estimation index of node vulnerability of the distribution network; (3) acquiringstructure data of the distribution network and a power flow calculation result, and calculating the comprehensive estimation index of the distribution network; and (4) outputting the relatively vulnerable nodes of the distribution network. The comprehensive estimation index has the following advantages that: the complex network theory and the risk theory are adopted, a structure of the distribution network is taken into account, fault risks are taken into account, and the identification problem of the vulnerable nodes in the distribution network is comprehensively solved.

Description

technical field [0001] The invention relates to the technical field of power system safety operation evaluation, in particular to a method for identifying vulnerable nodes of a distribution network. Background technique [0002] Since the Russian Moscow blackout in 2005, global blackouts have occurred frequently, which has led to further attention to the security of the power system. Therefore, the concept of power grid vulnerability has attracted the attention of scholars. The so-called power grid vulnerability is to find out the weak nodes or lines in the power grid. When these nodes or lines are affected by the outside world or the system is disturbed, it will lead to successive failures of line components and cause large-scale power outages. Therefore, before the system fails, find out the weak links of the whole system according to the various parameters of the system and improve them, which will greatly reduce the probability of major blackouts in the system. [0003]...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/06G06Q50/06
CPCG06Q10/0635G06Q50/06
Inventor 张繁碧黄志球张志宏王孝琳蔡思海黄锦伟李高标欧志光陈德权邓惠华何奕枫黄国良郑超裴月琳罗星球赖来源周晓明郭琳林冠强陈慧欢刘智斌何鸿远朱锡锋林丽红胡凯何志强郑伟杰叶剑挺
Owner HUIZHOU POWER SUPPLY BUREAU OF GUANGDONG POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products