Unlock instant, AI-driven research and patent intelligence for your innovation.

Power grid line vulnerability analysis method based on HITS algorithm

An analysis method and vulnerability technology, applied in calculation, computer-aided design, electrical digital data processing, etc., can solve problems such as complex power grid structure, and achieve the effect of fast calculation speed

Pending Publication Date: 2022-06-03
CEEC JIANGSU ELECTRIC POWER DESIGN INST
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, the main research methods for vulnerability analysis of power systems at home and abroad include structural vulnerability assessment and state vulnerability assessment, and have achieved certain results. However, considering the complex structure and large scale of the power grid, it is still necessary to study Faster and more effective vulnerability analysis method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power grid line vulnerability analysis method based on HITS algorithm
  • Power grid line vulnerability analysis method based on HITS algorithm
  • Power grid line vulnerability analysis method based on HITS algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] Below in conjunction with accompanying drawing, technical scheme of the present invention is further described:

[0068] The present invention proposes a power grid line vulnerability analysis method based on HITS algorithm, such as figure 1 shown, including the following steps:

[0069] Step A: Perform N-1 scanning calculation on the entire network lines of the power grid, and obtain an initial root set matrix according to the power flow transfer data obtained by scanning.

[0070] Step A01, read the topology structure and system operation data of the power grid, carry out N-1 scanning calculation to the entire network line, obtain the power flow transfer data of the power grid, and form a power flow transfer matrix TP, and the expression of each element in the power flow transfer matrix TP is as follows;

[0071]

[0072] where ΔP ij Indicates the influence on line j after line i is disconnected in the power grid, P j i represents the active power transmitted o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a power grid line vulnerability analysis method based on an HITS algorithm, and the method comprises the steps: carrying out the N-1 scanning calculation of a whole network line of a power grid, and obtaining an initial root set matrix according to the power flow transfer data obtained through scanning; correcting the initial root set matrix based on the influence of the system power flow entropy and the hidden fault to obtain an extended root set matrix; taking the extended root set matrix as the input of an HITS algorithm model to carry out iterative calculation to obtain a convergent authority vector and a hub vector; eliminating virtual system power flow entropy points and hidden fault points from the converged authority vector and hub vector to obtain a final power grid line authority value and hub value; and calculating the vulnerability index value of the whole network line according to the power grid line authority value and the hub value, and obtaining the vulnerability of each line through sorting. According to the invention, the fragile lines in the power grid can be analyzed and compared efficiently and reasonably.

Description

technical field [0001] The invention relates to a power grid line vulnerability analysis method based on HITS algorithm, and belongs to the technical field of power system analysis. Background technique [0002] People's production and life are increasingly demanding and dependent on electricity, and the requirements for safe and stable power supply are getting higher and higher. Nowadays, large power grids are developing in the direction of long-distance, ultra-high voltage and ultra-high voltage. The scale of the network is becoming larger and the structure is increasingly complex. While achieving the benefits of networking, the risks caused by the inherently complex behavior of the power system not only It is unavoidable and is still growing. The vulnerability of large power grids has become more and more prominent, and they have to bear more potential risks of large-scale power outages caused by multiple failures or cascading failures. [0003] In recent years, frequen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q10/00G06Q50/06G06F30/20G06F113/04G06F119/06
CPCG06Q10/20G06Q50/06G06F30/20G06F2113/04G06F2119/06Y04S10/50
Inventor 孙顺祥杨赟顾康慧牛涛管永高刘代刚郭学英何悦甄宏宁赵继超
Owner CEEC JIANGSU ELECTRIC POWER DESIGN INST
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More