Font Size: a A A

Analysis Of Power System Vulnerable Under Deliberate Attack Threat

Posted on:2013-05-18Degree:MasterType:Thesis
Country:ChinaCandidate:H Z HuangFull Text:PDF
GTID:2232330374965137Subject:Power economy
Abstract/Summary:PDF Full Text Request
As one of the critical infrastructure, electric power system has the duty of delivering power energy to society. Losses of property and other led from problems in the supply caused by an accident or failure are immeasurable, and therefor power system need to ensure stability and reliability of its operation. How to deal with possible electric power systems for malicious damage, and minimize the losses of power supply, becomes a more and more concerned problem.This research devices a bi-level optimization model to investigate through a problem in which the goal of the destructive agent is to minimize the number of power system components that must be destroyed in order to cause a loss of greater or equal to a specified level while the system operator will implement all feasible corrective actions to minimize the level of loss. After that, this paper transformed the bi-level optimization formulations into an equivalent standard mixed-integer linear program by using equivalent linear expressions. Example analysis shows that the model can figure out the vulnerable parts of power system and rcmind operator to raise the security level.Details as follows:first of all, the thesis introduces the derivation, methods of power system vulnerability analyzing and research achievement about power system to deliberate attack problem; then introduces the base theory, definition and optimality conditions of bi-level problem, and discusses the main characteristic and existence of solution.Thesis formulates the vulnerability of power system to deliberate attack as a bi-level problem, taking all components in consideration. By using equivalent linearization method, the original bi-level formulation converted into a S-MILP problem for an optimal result. Results from cases studies are provided and analyzed.At last, thesis figures out summarizes and future goals.
Keywords/Search Tags:Bi-level optimization, Mixed integer linear programming, Power systemvulnerable
PDF Full Text Request
Related items