Power network vulnerability evaluation method based on multiple attack strategies

A power network and vulnerability technology, applied in the field of power network vulnerability assessment based on multiple attack strategies, can solve problems such as power network paralysis and collapse

Inactive Publication Date: 2020-11-17
XUZHOU NORMAL UNIVERSITY
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, the initial small faults in the power grid may cause large-scale network collapse and lead to the phenomenon of large-scale paralysis of the power network.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power network vulnerability evaluation method based on multiple attack strategies
  • Power network vulnerability evaluation method based on multiple attack strategies
  • Power network vulnerability evaluation method based on multiple attack strategies

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to facilitate understanding, the technical solutions in the embodiments of the present invention will be clearly and detailedly described below in conjunction with the accompanying drawings in the embodiments of the present invention. The described embodiments are only some of the embodiments of the invention.

[0035] Such as figure 1 As shown, a power network vulnerability assessment method based on multiple attack strategies mainly includes the following steps:

[0036] S1: Firstly, construct the power grid model according to the topology data of the collected IEEE300 power system.

[0037] The power grid modeling method is a network structure presented in the form of a natural network. The power station in the power network is abstracted as a node, and the power line connecting two power stations is abstracted as an edge. When there is a connection between two power stations, then in the topology There is an edge between these two nodes in the structure, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a power system vulnerability evaluation method based on multiple attack strategies. The method comprises the following steps: 1) constructing a power grid model; 2) evaluatingthe importance of nodes in the network from four aspects of node degree, betweenness, local centrality and node fault loss, and completing the formulation of an attack strategy according to the importance of the network nodes; 3) establishing a betweenness virtual flow model to simulate a cascade fault propagation process in a power system; and 4) establishing a vulnerability index based on the betweenness virtual flow model, simulating a network attack by adopting a plurality of attack strategies, and evaluating the vulnerability of the IEEE300 power system network according to the change ofthe vulnerability index. Aiming at the vulnerability of the power network under the condition of various attack strategies, the betweenness virtual flow model and the various attack strategies are established to analyze the performance change of the power grid under the cascade failure. The importance of nodes in a power network can be identified, and decision support is provided for maintenance work of power system managers and power system fault prevention of designers.

Description

technical field [0001] The present invention relates to the field of power network vulnerability and emergency management, in particular to a power network vulnerability assessment method based on multiple attack strategies Background technique [0002] The protection of power system is an important pillar to promote the stable development of social economy and people's livelihood. The damage to the power system will affect many aspects of society, and even the overall infrastructure system in some areas will be paralyzed. In order to prevent the power system network from being damaged, many countries are implementing policies to prevent the occurrence of power system damage events. At the same time, initial small faults in the power grid may cause large-scale network collapse and lead to a large-scale paralysis of the power network. For example, the Italian blackout in 2003, the North American blackout in 2003 and the Indian blackout in 2012 were all initial failures that ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F30/20G06Q10/06G06Q50/06
CPCG06Q10/0639G06Q50/06G06F30/20Y04S10/50
Inventor 陈辰王淑良顾喜丰
Owner XUZHOU NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products