Complex Network Theory based Power Grid Vulnerability Assessment from Past to Future

Author(s):  
Guo Chen ◽  
Zhao Yang Dong ◽  
Junhua Zhao ◽  
S.R. Weller
2014 ◽  
Vol 2014 ◽  
pp. 1-12 ◽  
Author(s):  
Jinli Zhao ◽  
Hongshan Zhou ◽  
Bo Chen ◽  
Peng Li

Reasonable and strong structure is an important foundation for the smart transmission grid. For vigorously promoting construction of the smart grid, it is of great significance to have a thorough understanding of the complex structural characteristics of the power grid. The structural characteristics of several actual large-scale power grids of China are studied in this paper based on the complex network theory. Firstly, the topology-based network model of power grid is recalled for analyzing the statistical characteristic parameters. The result demonstrated that although some statistical characteristic parameters could reflect the topological characteristics of power grid from different ways, they have certain limitation in representing the electrical characteristics of power grid. Subsequently, the network model based on the electrical distance is established considering the limitation of topology-based model, which reflects that current and voltage distribution in the power grid are subject to Ohm's Law and Kirchhoff's Law. Comparing with the topology-based model, the electrical distance-based model performs better in reflecting the natural electrical characteristic structure of power grid, especially intuitive and effective in analyzing clustering characteristics and agglomeration characteristics of power grid. These two models could complement each other.


2013 ◽  
Vol 419 ◽  
pp. 877-882
Author(s):  
Xun Cheng Huang ◽  
Huan Qi ◽  
Xiao Pan Zhang ◽  
Li Fang Lu ◽  
Yang Yu Hu

Cascading failure of network features in power system is analyzed in this paper using complex network theory and method, and Central China power grid are analyzed in detail on the three kinds of attack forms (maximum load, the most generous attack and random attack) of regional vulnerability. It provides technical means for the prevention of cascading failure .


Sign in / Sign up

Export Citation Format

Share Document