Font Size: a A A

The Study Of Power Grid Vulnerability Based On Complex Network Theory

Posted on:2016-06-19Degree:MasterType:Thesis
Country:ChinaCandidate:J H MoFull Text:PDF
GTID:2272330461957101Subject:Electrical engineering
Abstract/Summary:PDF Full Text Request
With the development of national economy and the improvement of people’s living standards, per capita electricity consumption is growing year by year, in order to meet the requirements of power load, the grid size becomes larger and more complex than before. Especially in order to make the optimal allocation of resources, large power grid interconnection is a kind of trend, but across regions in power network interconnection also increases the range of the system disturbance may spread. In recent years occurred in domestic and foreign large-scale blackouts, shows that inter-district interconnected power grid structure has its inherent vulnerability. In today’s volatile international environment, terrorism or war could happen at any time, once the system appear such deliberate attacks, interregional interconnected power grid vulnerability has been reflected. In the face of such a complex power grid analysis, the traditional method of power system analysis based on reductionism to show its limitations, the need to seek new more effective method for grid vulnerability assessment, the complex networks theory is applied to the grid vulnerability research is one of the current hot spot.At first, this paper summarizes the theory of complex network model, the characteristics of the index and its application status in power system. Actual power grid network topology model is established, and consider the topology even the edge of the weighted. The fourth chapter using complex overlapping network society and its algorithm software, to overlap grid IEEE118 node corporate research, based on the overlapping community node importance evaluation index, and through random attacks and attempted attacks verify the effectiveness of the proposed indicators in the identification of key network nodes.The article last part has carried on the branch betweenness considering the direction of the search path grid research, compares it with the traditional according to system load rate and does not consider the search path direction betweenness differences, and through the deliberate attack open circuit simulation, verified its effectiveness on to identify critical lines of the grid.
Keywords/Search Tags:Vulnerabilty, Key nodes, Key line, Complex network, Big grid
PDF Full Text Request
Related items