Next Article in Journal
Experimental and Discrete Element Model Investigation of Limestone Aggregate Blending Process in Vertical Static and/or Conveyor Mixer for Application in the Concrete Mixture
Next Article in Special Issue
Splitting Physical Exergy by Its Feasible Working Ways
Previous Article in Journal
Simulation Based Approach for High-Throughput Stacking Processes in Battery Production
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Probabilistic Vulnerability Assessment of Transmission Lines Considering Cascading Failures

1
College of Electrical and Information Engineering, Hunan University, Changsha 410006, China
2
College of Artificial Intelligence, Beijing Technology and Business University, Beijing 100048, China
*
Author to whom correspondence should be addressed.
Processes 2021, 9(11), 1994; https://doi.org/10.3390/pr9111994
Submission received: 24 September 2021 / Revised: 31 October 2021 / Accepted: 4 November 2021 / Published: 8 November 2021

Abstract

:
The prevention of cascading failures and large-scale power outages of power grids by identifying weak links has become one of the key topics in power systems research. In this paper, a vulnerability radius index is proposed to identify the initial fault, and a fault chain model of cascading failure is developed with probabilistic attributes to identify the set of fault chains that have a significant impact on the safe and stable operation of power grids. On this basis, a method for evaluating the vulnerability of transmission lines based on a multi-criteria decision analysis is proposed, which can quickly identify critical transmission lines in the process of cascading failure. Finally, the proposed model and method for identifying vulnerable lines during the cascading failure process is demonstrated on the IEEE-118 bus system.

1. Introduction

Large-scale power outages around the world are often caused by cascading faults [1,2], and the propagation of cascading faults is closely related to weak links in the power grid [3,4]. In order to reveal weak links of the system, it is necessary to conduct a vulnerability assessment of the power grid.
A few power grid vulnerability assessment methods have been previously proposed for studying cascading failure, namely, structural analysis methods based on complex network theory [5,6,7], fault simulation methods based on self-organizing criticality theory [8,9,10], fault evolution methods based on cellular automata theory [11,12], and fault chain extraction methods based on Heinrich causal chain theory [13,14,15].
The structural vulnerability of a power grid is studied from the perspective of graph theory using structural analysis methods based on complex network theory, but the consideration of the physical process of the actual system is relatively simplified, so this method cannot analyze the operation state of the power grid. Fault simulation methods based on self-organized criticality theory reveal that the self-organized criticality of a power grid is the internal driving force of cascading blackouts, but it cannot describe the electrical characteristics of a power grid in detail. The principle of fault evolution methods based on cellular automata theory is to simulate component faults through cell rupture, and then simulate power grid cascading faults. However, because only the state combination of itself and neighborhood cells is considered in the change of cell state, the influence of electrical characteristics is ignored. Based on fault chain extraction methods, the relationship between cascading failure and components’ states is established on the premises of the power flow process and network structure of power grids. Not only can the phenomena of large-scale power outage be studied from the perspective of fault sequences, but also the causes of cascading failure can be identified from the various factors contributing to the fault sequences.
To perform vulnerability assessment using the fault chain model, the fault chain set must first be generated. When the power grid is very large, if all lines in the network are used as initial faults in turn [16,17], the workload of searching the fault chain is quite high. When predicting subsequent fault lines, if only one line is selected [18,19], the usefulness of the prediction result will be drastically limited and some of the riskier fault chains may remain unidentified. Moreover, if the lower-level fault line set is selected through index calculation, the results may also deviate from reality because of the uncertainty in the impact of the system’s load and the deterministic analysis of fault chains. Therefore, it is very important to select appropriate initial faults and subsequent fault lines to obtain the fault chain set.
After the fault chain set is obtained, the vulnerability of transmission lines can be evaluated from the perspective of topology, power flow, and vitality measures [20,21]. Regardless of the use of a topology or power flow perspective, (n-k) failure analyses [22,23] are required, and this poses computational concerns due to the large number of fault combinations and long calculation time. The vitality measures are mainly divided into probabilistic vitality [24,25] and deterministic vitality [26,27]. The probabilistic vitality is determined by the failure probability of each component in the power grid and the partial derivative of outage probability for each component, requiring a large amount of complex computation for large power grids. The deterministic vitality, on the other hand, only focuses on the position of lines in the fault chain of the fault tree, ignoring the importance of each fault chain itself and the difference between different lines in different fault chains, making the analysis result rather inaccurate.
In view of the above shortcomings, a probabilistic vulnerability assessment method based on the fault chain model is proposed in this paper to identify the weak lines. The major contributions of this article are as follows: (1) a cascading fault chain model with probabilistic attributes considering a variety of factors affecting cascading failure in the power system is proposed. This model can reasonably select initial faults and the subsequent lines, save the calculation of searching fault chain set, and predict the chain fault development mode with a more serious impact on the power grid. (2) A method for evaluating the vulnerability of transmission lines based on multi-criteria decision analysis is presented, which further avoids the faults combination problem and calculation time problem caused by n-k fault analysis and can evaluate the vulnerability of transmission lines from various aspects quickly and quantitatively. Simulation results from IEEE-118 bus system demonstrate the feasibility and effectiveness of the method proposed in this paper.

2. Cascading Failure Model

2.1. Probabilistic Load Flow

Cascading failure of the power system will cause power supply interruption, and load variation will lead to uncertain power flow distribution. Moreover, the propagation path of cascading failure is not unique. Considering the uncertainty of power flow and fault propagation, probabilistic load flow methods [28] have been applied to construct cascading failure models.
Power system is a high-order complex nonlinear network. In case of cascading failure, the repeated solution of complete nonlinear power flow equations is huge and time-consuming. The DC power flow model, commonly used in power system planning and security analysis, can simplify the nonlinear problem into a linear problem and obtain the approximate value of component overload in a short time. Therefore, it is also suitable for analyzing cascading faults.
Without considering the influence of reactive power distribution, DC power flow model is used to calculate the flow distribution of power grid, which can be expressed as
{ P = B θ P line = T θ
where P is the power vector injected to buses; B is the admittance matrix of the power system; θ is the bus voltage angle phase vector; Pline is the power flow vector of all transmission lines; T is the parameter representing that the line power flow can be linearly expressed by the bus voltage angle phase.
The uncertainty associated with load demand variation can be described by a normal distribution [29], i.e.,
f ( E L , i ) = 1 2 π σ i exp [ ( E L , i μ i ) 2 2 σ i 2 ]
where EL,i is the load demand at bus i, μi is the mean value of the load, and σi is the standard deviation.
Using the probabilistic power load analysis, a cumulative distribution function of power flow under the influence of random disturbance and fault occurrence can be obtained, which can be integrated into a cascading fault index by using the Cumulant Method and Gram-Charlier expansion series.

2.2. Fault Chain

The propagation of cascading faults in a power system can be represented by a set of fault sequences [30,31]. Suppose a power grid has n fault chains. Fault chain set L and fault chain Li can be denoted as
L = { L 1 , L 2 , , L n } L i = { T i 1 T i 2 , , T im }
where Tij is the j-th stage of fault chain i, which is the fault line in this paper.
To establish the cascading failure model based on fault chains, we first identify initial faults, and then determine subsequent fault lines.

2.3. Selection of Initial Faults

In theory, all the lines in the network can possibly be an initial fault in turn, but this will be a time-consuming and blind process. For some light-load lines, moreover, the fault has little impact on other components in the network. Therefore, in this paper, combining the overload probability distribution of transmission lines and the normalized directed electric betweenness, a vulnerability radius index is proposed to select the lines that are more likely to cause subsequent faults as the initial fault set, resulting in improved effectiveness of initial faults identification.
The overload probability index pk is defined as the probability of overloading of line k calculated from probabilistic load flow taking into account load variations. Although the occurrence of the initial fault is random, the possibility of a fault in a heavy load line is greater [32]. Therefore, the index can be used to screen the initial fault lines in actual operating conditions.
The normalized directed electric betweenness bk is defined as
B k = i G ,   j L P Gi P ij ( k ) P ij
b k = B k / B max
where G is the generator set, L is the load set, PGi is the active power of generator i, Pij (k) is the active power transmitted from generator i to load j through line k, Pij is the active power transmitted from generator i to load j, Bk is the directed electric betweenness of line k, Bmax is the maximum value of the directed electric betweenness for all lines. The network topology has an important influence on whether the system can maintain stability after being disturbed [33]. A larger value of bk means greater influence of line k on the network topology.
The overload probability values are all greater than or equal to 0, and less than or equal to 1. The greater the value, the higher the risk of branch failure. The normalized directed electric betweenness values are also between 0 and 1. The larger the value, the more important the line is in the system structure. Based on this, the vulnerability radius index VRk is defined in this paper as follows:
VR K = b k 2 + p k 2
Thus, the vulnerability radius is essentially the distance from point (bk, pk) to the origin, as shown in Figure 1, and indicates the likelihood of line k causing subsequent cascading failures. For the same VRk, there can be many possible (bk, pk), and thus lines with different values of bk and pk may have the same effect on subsequent cascading failures.
According to the vulnerability radius index, a reasonable threshold is set, and the line with the largest index value is selected to form the initial fault set. In large power systems, this can avoid listing all unexpected events that may cause system instability.

2.4. Subsequent Cascading Failures

Cascading failure in power systems is caused by the successive tripping of links. There is a correlation between the upper and lower-level faults along a fault line. In addition, component faults in a power grid can be divided into explicit faults and implicit faults. Explicit faults are related to the extent of loading of the lines [34], while implicit faults are related to fluctuation of power [35].
Based on the vulnerability analysis, an evaluation index for subsequent cascading failure lines is proposed by combining the line probability correlation, line overload probability and probabilistic load flow fluctuation.
Suppose line j fails at the T-th stage of a fault chain. For a normal (healthy) line i in the network, the expected values of transmitted power in the T-th stage and the (T − 1)-th stage are SiT and SiT−1, respectively. Then, the line probability correlation Mi is defined as
M i = | S i T F ( S i T ) S i T 1 F ( S i T 1 ) S j T 1 F ( S j T 1 ) |
where F(SiT) is the cumulative probability of line i corresponding to SiT in the T-th link, and F(SiT−1) is the cumulative probability of line i corresponding to SiT−1 in the (T − 1)-th stage of the fault chain. Thus, the ratio of power flow difference of line i at the T-th stage and the (T − 1)-th stage to the power flow of line j at the (T − 1)-th stage would reflect the relative impact of the failure/withdrawal of faulty line j on healthy line i. The larger the value of Mi, the greater the impact.
The line overload probability pi is defined as the probability of line i to become overloaded as calculated from probabilistic load flow after faulty line j exits operation. The higher the value of pi, the higher the probability of an explicit fault.
The removal of line j will affect the power flow in line i. Considering the power flow transfer on line i and the probability margin of line i, the probabilistic load flow fluctuation Di is defined as follows:
D i = LODF ij P j F ( P j ) P i . max P i F ( P i )
where LODF is line outage distribution factor, Pj is the expected active power of line j, F(Pj) is the cumulative probability of line j at Pj, Pi,max is the power limit of line i, Pi is the expected active power of line i before line j is removed, and F(Pi) is the cumulative probability of line i at Pi. When Di is large, power flow fluctuation has a greater influence, and the probability of implicit fault is higher.
Thus, an overall evaluation index for subsequent cascading failure lines Gi can be defined as follows:
G i = w 1 M i + w 2 p i + w 3 D i
where w1, w2 and w3 are the corresponding weights. The value of Gi represents the extent to which non-faulty lines are affected by random factors such as power fluctuations and power flow shifts. Fault occurrence exhibits a probabilistic characteristic, and the subsequent line break based on this is a probabilistic property that reflects the likelihood of subsequent failure. In order to measure the complexity and uncertainty of the development process of cascading failure, a set of non-faulty lines with large G value is selected as the set of lower-level breaking lines.

2.5. Cascading Failure Process

In this paper, two criteria are used to end the cascading failure process: (1) The system has been judged as being transient unstable; (2) the predicted depth has reached a maximum of 8, because it is difficult to keep the power grid fully connected after N-8 failure events [23].
The flowchart of cascading failure is shown in Figure 2. From this, the fault chain set can be obtained.

3. Vulnerability Evaluation Method of Transmission Lines

The fault chain set gives different paths from the initial fault to the blackout. The purpose of the vulnerability assessment is to find the specific link (a particular stage) of the fault chain which is important to the stability of the power grid, combating the inaccurate prediction of a single fault chain.
Focusing on the fault chain set itself, a multi-criteria decision analysis model is proposed in this paper, which can evaluate the vulnerability of transmission lines without excessive and complex computational effort. The method involves four processes: selection of evaluation criteria, normalization of data, determination of criteria weights, and synthesis of data.

3.1. Selection of Evaluation Criteria

In assessing the vulnerability of transmission lines, the following considerations of the fault chain set should be noted. First, the intermediate fault link of a fault chain is the necessary step contributing to the occurrence of a system blackout. If more fault chains contain this fault link, the relative risk of the link is higher. Second, different intermediate links play different roles in the same fault chain. Furthermore, because different fault chains have varied levels of importance, the role of the same intermediate link in different fault chains can be different. Thus, a set of criteria should be used to evaluate the vulnerability of transmission lines, including the frequency, average location of lines in the fault chain set and the average depth of the fault chain to which the lines belong.
The frequency of line l in the fault chain set, denoted as αl, is
α l = n l
where nl is the total number of occurrences of line l in the fault chain set. The average location of line l in the fault chain set βl is
β l = i = 1 d max x i n l i
where xi is the frequency of line l appearing on the fault chain at depth i, and dmax is the maximum depth of in the fault chain set. Thus, a smaller value of βl means that line l is at the earlier position of the fault sequence, which will cause subsequent fault links to trigger one after another.
The average depth of fault chain to which line l belongs, denoted as γl, is defined as follows:
γ l = 1 n l j = 1 f d l , j
where f is the total number of fault chains in the fault chain set, dl,j is the depth of the j-th fault chain, where line l is located. If line l does not appear in the j-th fault chain, dl,j = 0. A smaller value of γl means that the fault chain where line l is located is more likely to cause serious blackout in the power grid.

3.2. Normalization of Data

For ease of referencing and analysis, data should be normalized. However, the usual linear transformation method may not offer the needed comparability for high-optimal and low-optimal indices. Thus, it is more advantageous to use a non-linear transformation function [36] to normalize sample index value x to the (0, 1) interval. For simplicity, the logistic value function v(x) can be used, i.e.,
v ( x ) = { 1 1 + e ( x μ ) / σ ,   x LB 1 1 + e + ( x μ ) / σ ,   x SB
where μ and σ are model parameters, LB (SB) is the range of values of x corresponding to indices that are larger (smaller) the better.

3.3. Determination of Criteria Weights

The variation coefficient method is an objective method of weighting by directly using the information contained in each index and calculating the weight. Suppose there are n transmission lines, and each transmission line has m evaluation criteria. The variation coefficient of criteria i, denoted as ρi, is given by
ρ i = σ i μ i ,   i = 1 , 2 , , m
where σi is the standard deviation of criterion i, and μi is the mean value of criterion i.
If ρi is large, it means that criterion i requires a high standard score technically. Thus, it can be reasonably assumed that the weight of criterion is proportional to the variation coefficient. Then, the relative weight of criterion i, denoted as ωi, is defined as follows:
ω i = ρ i j = 1 m ρ j

3.4. Synthesis of Data

The widely used data synthesis model is the weighted sum model. The disadvantage of this model lies in its mutual cancellation effect, that is, the low score of one criterion gets compensated by the high score of another criterion. In order to overcome this problem, the weighted geometric average model with relatively weak compensation [37] is adopted here, i.e.,
u = exp [ i = 1 m ω i ln ( v i ) ]
where u is the vulnerability of a transmission line, vi is the normalized index value, wi is the relative weight, and each transmission line has m evaluation indexes.
The vulnerability evaluation method of transmission lines proposed in this paper uses the logistic value function to normalize data, avoiding the loss of information in linear transformation. Then, the weighted geometric average model is used to aggregate each criterion into a comprehensive index, which avoids the problem where a high score index and a low score index cover up each other in the weighted sum model.

4. Case Study

To verify effectiveness of the method proposed in this paper, the IEEE118-bus system is used as an example for illustration. The schematic of the system is shown in Figure 3.

4.1. Initial Fault Set

An initial fault set is selected based on the vulnerability radius index, as shown in Figure 4. Each point in the figure represents a transmission line, and its distance from the origin is the vulnerability radius, which can be represented by the VR (Vulnerability Radius) line. The graph can be divided into three regions by setting a suitable threshold. The ability of lines in area 1 in causing subsequent cascading failures is weak. For lines in area 2, since their vulnerability radii exceed the threshold value but below 1, they are likely to cause subsequent cascading failures. Moreover, the vulnerability radii of lines in area 3 all exceed 1, which can be defined as generalized vulnerability radius. Lines with such characteristics are considered to have a high risk of causing subsequent cascading failures.
In order to facilitate the analysis, the entropy weight method is applied to find the fault set and is compared with the method proposed in this paper. We rank the calculated values from high to low and select the top 20 lines as the initial fault set, as shown in Table 1.
It can be seen from Table 1 that some lines located near a generator bus or at important transmission and connection positions can be identified by both methods, but their ranking is different. In addition, lines 8–9 and lines 9–10 are in the initial fault set calculated by the vulnerability radius index, and are ranked higher, but lines 8–9 and lines 9–10 are not included in the set calculated by entropy weight method. Through qualitative analysis, it is found that removal of lines 8–9 and lines 9–10 will cause the system to be disconnected, creating isolated islands, leading to large fluctuations of power flow on other lines. It is thus reasonable for them to appear in the initial fault set. Lines 13–15 and lines 3–5 are ranked in the top positions by the entropy weight method, but they are neither heavy-load lines nor important connecting lines. In this comparison, we see that the vulnerability radius method can more accurately identify the lines which will more likely cause subsequent failures.

4.2. Fault Chains of Cascading Failure

The consequence of cascading failure is measured by the number of lines in the fault chain in this paper. The less number of lines in the fault chain, the more serious consequence it will have on the system, which shows that only a few line faults can lead to system instability.
Due to space limitation, we do not list all fault chains here. We take lines 26–30 as the initial fault as an example. After the failure of lines 26–30, the system maintains its stable operation, and the subsequent fault line indexes are calculated. The cascading failure sequence predicted by the fault chain model with probabilistic attributes is shown in Table 2. Moreover, without considering uncertainty factor associated with load demand variation, the cascading failure sequence based on a deterministic method is shown in Table 3.
Comparing Table 2 and Table 3, we see that the deterministic results deviate significantly from the results obtained by the proposed method. When the fault path develops according to the first and second scenarios given in Table 2, the system loses stability after the removal of 6 lines. However, the results in Table 3 show that the system will still operate stably after disconnecting 6 lines, and cascading failure will continue to develop until the maximum predicted depth is reached. Based on the above discussion, we see that the cascading failure model with probabilistic attributes proposed in this paper can predict fault chains with more serious consequences, with the uncertainty of line disconnection taken into consideration.

4.3. Line Vulnerability Assessment

As vulnerability assessment based on the fault chain set can quantify the vulnerability of each line in the set which poses serious threats to the safe and stable operation of a power grid; vulnerability assessment is practically important to power grid monitoring. The lines with outstanding vulnerability based on the method in this paper are listed in Table 4, and these important power lines are highlighted in Figure 5.
For illustration purposes, we compare the results with those generated by other previously proposed methods.
The results of structural vulnerability lines obtained by risk theory [38] are shown as “method 1”, and those state vulnerability lines [38] are shown as “method 2”. The same fault chain model is adopted in method 1 and method 2. After the initial fault is randomly selected, the outage probability of each line is estimated based on the DC power flow model. With failure probability acknowledged, the roulette wheel selection is utilized to determine the next fault line until the system collapses or no failure happens consecutively, and the simulation runs for 300,000 times. In contrast, the initial fault is not randomly selected in this paper, and a more identifiable initial fault set is proposed, which can greatly reduce the workload of searching the fault chain set.
From the perspective of topology, the system and topology related changes caused by transmission lines are analyzed in method 1, and the line structure vulnerability is evaluated combined with risk theory. From the perspective of power flow, the system state changes caused by transmission lines are evaluated in method 2, and the line state vulnerability results are obtained. Based on the fault chain set proposed in this paper, the structural importance method of fault tree theory [21] is used to evaluate the vulnerability of transmission lines from the perspective of importance, and the results are shown as “method 3”.
The following points can be observed from Table 5:
(1)
Although the proposed model is different from those of methods 1 and 2, the results are partially similar, especially for the lines with the highest vulnerability, which show the effectiveness of the proposed model. However, method 1 only considers structural risks, while method 2 focuses on state risks. Moreover, both structural factors and state factors are considered in our proposed method, which thus avoids one-sided results. In addition, in methods 1 and 2, new line interruptions are selected based on the initial fault, without considering cascading failure. Since cascading failure does occur in practice, simulation without considering cascading failure may lose its relevance. Thus, critical lines identified in this paper will be more practically relevant.
(2)
Based on the same fault chain model, the similarity between the results of method 3 and ours is 50%. The difference is that only the frequency of the line in the fault chain set is considered in method 3, while the frequency of the line, the different roles of different lines in the fault chain and the importance of the fault chain itself are considered by the multi-criteria decision analysis model proposed here. In comparison, the evaluation results of this paper contain more information. If the probabilistic importance method is used to quantify the vulnerability of each line in the fault chain set, it is necessary to know the failure probability of each component in the power grid and the partial differential equation of outage probability for each component. For a large power grid, the calculation is very complex. The method given in this paper focuses on the fault chain set itself, which not only reduces computational complexity, but also evaluates the vulnerability of each line in the fault chain set from multiple aspects.
Referring to Figure 6, the IEEE 118-bus system can be divided into three parts, as shown on the upper left, upper right, and the lower half of the diagram. The three parts are connected by lines 23–24, 24–70, 8–30, 30–38, 38–65, 34–43, 47–69, 49–69, 69–75 and 69–77. These lines play an important role in the power exchange between regions. At the same time, high load-to-capacity ratio and regional power fluctuations increase the vulnerability of these lines. It can be seen that the method proposed in this paper can effectively identify the vulnerable transmission lines during the development of cascading failure. It is particularly necessary to pay attention to these lines in the prevention and control of cascading failure.
It can be seen from the vulnerability evaluation results that balancing heavy load nearby and avoiding long-distance power transmission are effective means to prevent and control cascading failure in a power grid. For example, the maximum load bus in the IEEE 118-bus system is bus 59 (277 MW). There is a generator on the bus, and only a small portion of the power required for the load is transmitted over a long distance. Thus, the vulnerability of lines connected to bus 59 is relatively low. On the contrary, although the load on bus 106 (43 MW) is lower than that on bus 59, the vulnerability of line 100–106 connected to bus 106 is higher due to the need for long-distance transmission of power. On this basis, qualitative analysis of buses can be further performed. For example, buses 69, 49 and 100, which are connected to multiple vulnerable lines, play an important role in the transmission network and are critical buses. These results are consistent with that reported earlier in the literature [39].

5. Conclusions

Identification of critical links in power systems is an effective procedure for predicting occurrences of serious faults and failure events. Such prediction is often complicated by uncertainty factors which deprive direct applications of deterministic methods. In this paper, a probabilistic vulnerability assessment method of transmission lines with consideration of cascading failure and uncertainties is proposed. Specifically, a fault chain model with probabilistic attributes is established, which can identify the fault chain set that has a serious impact on the operation of power grids. Based on this model, a multi-criteria decision analysis method is proposed to evaluate the vulnerability of transmission lines with considerations of structural, operational, and other uncertainty factors, making the evaluation results more comprehensive. The feasibility of the method proposed has been demonstrated with simulation experiments performed on the IEEE 118-bus system for the assessment of vulnerable lines in the cascading failure process. The proposed assessment method can be used to prevent large-scale power outages and provide reference for the operation, maintenance, and planning of power systems.

Author Contributions

Methodology, Y.L., M.P. and X.G.; software, Y.L.; validation, Y.L., M.P., X.G. and H.Z.; formal analysis, Y.L.; investigation, Y.L. and M.P.; resources, M.P.; data curation, Y.L.; writing—original draft preparation, Y.L.; writing—review and editing, Y.L., M.P., X.G. and H.Z.; visualization, Y.L.; supervision, M.P. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China under Grant 61973107 and Grant 61472128.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Conflicts of Interest

The authors declare no conflict of interest.

Nomenclature

Badmittance matrix of power system
Θbus voltage angle phase vector
Plinepower flow vector
EL,Iload demand of bus i
μmean value
σstandard deviation.
Ggenerator set
Lload set
PGiactive power of generator i
Pij(k)active power transmitted from generator i to load j through line k
Pijactive power transmitted from generator i to load j
Bkdirected electric betweenness of line k
Bmaxmaximum value of the directed electric betweenness for all lines.
bknormalized directed electric betweenness of line k
pkoverload probability of line k
F(SiT)cumulative probability of line i
SiTexpected values of transmitted power in the T-th stage of line i
Miline probability correlation of line i
Diprobabilistic load flow fluctuation of line i
Gievaluation index for subsequent cascading failure of line i
αlfrequency of line l in the fault chain set
nltotal number of occurrence of line l in the fault chain set
βlaverage location of line l in the fault chain set
xifrequency of line l appearing on the fault chain at depth i
dmaxmaximum depth of in the fault chain set
γlaverage depth of fault chain to which line l belongs
ftotal number of fault chains in the fault chain set
dl,jdepth of the j-th fault chain where line l is located
v(x)logistic value function
ρivariation coefficient of criteria i
ωweight

References

  1. Yan, J.; Tang, Y.; He, H.; Sun, Y. Cascading Failure Analysis with DC Power Flow Model and Transient Stability Analysis. IEEE Trans. Power Syst. 2014, 30, 285–297. [Google Scholar] [CrossRef]
  2. Chen, Q.; Mili, L. Composite Power System Vulnerability Evaluation to Cascading Failures Using Importance Sampling and Antithetic Variates. IEEE Trans. Power Syst. 2013, 28, 2321–2330. [Google Scholar] [CrossRef]
  3. Kinney, R.; Crucitti, P.; Albert, R.; Latora, V. Modeling cascading failures in the North American power grid. Eur. Phys. J. B 2005, 46, 101–107. [Google Scholar] [CrossRef]
  4. Albert, R.; Albert, I.; Nakarado, G.L. Structural vulnerability of the North American power grid. Phys. Rev. E 2004, 69, 025103. [Google Scholar] [CrossRef] [Green Version]
  5. Wang, B.; Wan, S.; Zhang, X.; Choo, K.-K.R. A Novel Index for Assessing the Robustness of Integrated Electrical Network and a Natural Gas Network. IEEE Access 2018, 6, 40400–40410. [Google Scholar] [CrossRef]
  6. Ding, S.Q.; Tao, L.; Xu, X.L.; Xu, H.P.; Zhang, D.Y. Research on structure vulnerability of grid assessment method based on the electrical betweenness of load transfer coefficient. Electr. Meas. Instrum. 2016, 53, 6–9. [Google Scholar]
  7. Beyza, J.; Garcia-Paricio, E.; Yusta, J.M. Applying Complex Network Theory to the Vulnerability Assessment of Interdependent Energy Infrastructures. Energies 2019, 12, 421. [Google Scholar] [CrossRef] [Green Version]
  8. Zeng, K.W.; Wen, J.Y.; Cheng, S.J.; Lu, E.; Wang, N. Critical line identification of complex power system in cascading failure. Proc. Chin. Soc. Elect. Eng. 2014, 34, 1103–1112. [Google Scholar]
  9. Liu, X.; Li, Z. Revealing the Impact of Multiple Solutions in DCOPF on the Risk Assessment of Line Cascading Failure in OPA Model. IEEE Trans. Power Syst. 2015, 31, 4159–4160. [Google Scholar] [CrossRef]
  10. Hasanvand, S.; Fallahzadeh-Abarghouei, H.; Mahboubi-Moghaddam, E. Power system security improvement using an OPA model and IPSO algorithm. Simulation 2019, 96, 325–335. [Google Scholar] [CrossRef]
  11. Li, H.; Jia, X.F.; Li, L.J.; Wu, J.; Ma, B.M. An approach for critical lines identification of power grid hidden fault propagation model based on cellular automata. Power Syst. Prot. Control 2018, 46, 16–23. [Google Scholar]
  12. Yu, Q.; Wang, Q.; Cao, N. A control measure for interconnection power grid cascading failure based on heterogeneous cellular automata. Power Syst. Prot. Control 2020, 48, 118–132. [Google Scholar]
  13. Wei, X.G.; Zhao, J.B.; Huang, T.; Bompard, E. A novel cascading faults graph based transmission network vulnerability assessment method. IEEE Trans. Power Syst. 2018, 33, 2995–3000. [Google Scholar] [CrossRef]
  14. Zheng, Q.; Qiu, X.Y.; Liu, N.; Sun, B.; Liu, M.; Zhu, L.F. Cascading failure preventive control based on assessment of transmission line vulnerability. Proc. CSU-EPSA 2014, 26, 32–36. [Google Scholar]
  15. Pan, Y.; Mei, F.; Zhou, C.; Shi, T.; Zheng, J. Analysis on Integrated Energy System Cascading Failures Considering Interaction of Coupled Heating and Power Networks. IEEE Access 2019, 7, 89752–89765. [Google Scholar] [CrossRef]
  16. Qi, H.-B.; Shi, L.-B.; Qian, W.; Xiao, Y.-Q.; Ni, Y.-X. Correlation evaluation of searching event chains in power system cascading failure. In Proceedings of the 2014 International Conference on Power System Technology, Chengdu, China, 20–22 October 2014. [Google Scholar]
  17. Jiang, S.; Pan, X.; Xiao, Y.; Zhou, Q.; Li, M.; Yang, J. Identification of vulnerable lines in large power grid based on FP-growth algorithm. J. Eng. 2017, 2017, 1862–1866. [Google Scholar] [CrossRef]
  18. Wei, X.G.; Gao, S.B.; Li, D.; Huang, T.; Pi, R.J.; Wang, T. Cascading fault graph for the analysis of transmission network vulnerability under different attacks. Proc. Chin. Soc. Elect. Eng. 2018, 38, 465–474. [Google Scholar]
  19. Khaledian, P.; Johnson, B.K.; Hemati, S. Power grid security improvement by remedial action schemes using vulnerability assessment based on fault chains and power flow. In Proceedings of the 2018 International Conference on Probabilistic Methods Applied to Power Systems, Boise, ID, USA, 24–28 June 2018. [Google Scholar]
  20. Wang, M.; Lu, W.; Wu, S.L.; Zhao, C.; Feng, Y.; Luo, C.; Xiao, Y. Vulnerability assessment model of power grid cascading failures based on fault chain and dynamic fault tree. In Proceedings of the 7th Annual International Conference on CYBER Technology in Automation, Control, and Intelligent Systems, Honolulu, HI, USA, 31 July–4 August 2017. [Google Scholar]
  21. Wang, A.S. Vulnerability Assessmentand Stability Controlof Power Grid Basedonthe Fault Chains. Ph.D. Thesis, Huazhong University of Science and Technology, Wuhan, China, 2010. [Google Scholar]
  22. Abedi, A.; Gaudard, L.; Romerio, F. Review of major approaches to analyze vulnerability in power system. Reliab. Eng. Syst. Saf. 2018, 183, 153–172. [Google Scholar] [CrossRef]
  23. Rocchetta, R.; Patelli, E. Assessment of power grid vulnerabilities accounting for stochastic loads and model imprecision. Int. J. Electr. Power Energy Syst. 2018, 98, 219–232. [Google Scholar] [CrossRef] [Green Version]
  24. Beeson, S.; Andrews, J.D. Importance measures for noncoherent systemanalysis. IEEE Trans. Reliab. 2003, 52, 301–310. [Google Scholar] [CrossRef] [Green Version]
  25. Baraldi, P.; Compare, M.; Zio, E. Component Ranking by Birnbaum Importance in Presence of Epistemic Uncertainty in Failure Event Probabilities. IEEE Trans. Reliab. 2013, 62, 37–48. [Google Scholar] [CrossRef] [Green Version]
  26. Bartlett, L.M.; Andrews, J.D. An ordering heuristic to develop the binary decision diagram based on structural importance. Reliab. Eng. Syst. Saf. 2001, 72, 31–38. [Google Scholar] [CrossRef]
  27. Du, Y.; Si, S.; Jin, T. Reliability Importance Measures for Network Based on Failure Counting Process. IEEE Trans. Reliab. 2018, 68, 267–279. [Google Scholar] [CrossRef]
  28. Liu, Y.; Gao, S.; Yang, S.C.; Yao, J.G. Review on algorithms for probabilistic load flow in power system. Autom. Elect. Power Syst. 2014, 38, 127–135. [Google Scholar]
  29. Rocchetta, R.; Li, Y.F.; Zio, E. Risk assessment and risk-cost optimization of distributedpower generation systems considering extreme weather conditions. Reliab. Eng. Syst. Saf. 2015, 136, 47–61. [Google Scholar] [CrossRef] [Green Version]
  30. Huang, T.; Voronca, S.L.; Purcarea, A.A.; Estebsari, A.; Bompard, E. Analysis of chain of events in major historic power out-age. Adv. Elect. Comput. Eng. 2014, 14, 63–70. [Google Scholar] [CrossRef]
  31. Yang, J.; Jiang, K. The sensitive line identification in resilient power system based on fault chain model. Int. J. Electr. Power Energy Syst. 2017, 92, 212–220. [Google Scholar] [CrossRef]
  32. Xu, W.; Zhang, J.H.; Wu, L.W.; Huang, Z. Method of operational risk assessment on transmission system cascading failure. Proc. Chin. Soc. Elect. Eng. 2012, 32, 74–82. [Google Scholar]
  33. Tan, Y.D. Research on Complex Power System Vulnerability Assessment Methods. Ph.D. Thesis, Hunan University, Changsha, China, 2013. [Google Scholar]
  34. Luo, Y.; Wang, Y.Y.; Wan, W.; Zhang, B.H.; Cai, H.; Liu, G.D.; Li, H.; He, L.N.; Li, Y.F. Fault chains model for cascading failure of grid. Autom. Elect. Power Syst. 2009, 33, 1–5. [Google Scholar]
  35. Zhou, J.; Zhang, Y.W.; Min, Y. Preliminary study on cascading failure mechanism of power system. Mod. Elect. Power 2006, 23, 1–5. [Google Scholar]
  36. Rezaei, J. Piecewise linear value functions for multi-criteria decision-making. Expert Syst. Appl. 2018, 98, 43–56. [Google Scholar] [CrossRef]
  37. Bullen, S.P. Handbook of Means and Their Inequalities; Kluwer Academic Publishers: Dordrecht, The Netherlands, 2003; pp. 79–94. [Google Scholar]
  38. Qi, H.; Shi, L.; Ni, Y.; Yao, L.; Masoud, B. Study on power system vulnerability assessment based on cascading failure model. In Proceedings of the IEEE PES General Meeting, Conference & Exposition, National Harbor, MD, USA, 27–31 July 2014. [Google Scholar]
  39. Wang, K. Research on Structural Complexity and Vulnerability of Power Grids Based on Complex Network Theory. Ph.D. Thesis, Huazhong University of Science and Technology, Wuhan, China, 2011. [Google Scholar]
Figure 1. Vulnerability radius.
Figure 1. Vulnerability radius.
Processes 09 01994 g001
Figure 2. Flow chart of cascading failure.
Figure 2. Flow chart of cascading failure.
Processes 09 01994 g002
Figure 3. IEEE 118-bus system.
Figure 3. IEEE 118-bus system.
Processes 09 01994 g003
Figure 4. Vulnerability radius index.
Figure 4. Vulnerability radius index.
Processes 09 01994 g004
Figure 5. Vulnerable lines in IEEE 118-bus system.
Figure 5. Vulnerable lines in IEEE 118-bus system.
Processes 09 01994 g005
Figure 6. IEEE 118-bus system, with three partitions interconnected.
Figure 6. IEEE 118-bus system, with three partitions interconnected.
Processes 09 01994 g006
Table 1. Initial Fault Set.
Table 1. Initial Fault Set.
Sequence NumberVulnerability Radius
Method
Entropy Weight
Method
LineVulnerability RadiusLineWeighted
Index
1L49–691.1664L49–690.8955
2L69–771.0073L69–770.7722
3L69–751.0029L69–750.7675
4L8–91L24–700.7443
5L9–101L75–770.6837
6L24–700.9615L13–150.6650
7L75–770.9383L47–690.6313
8L38–650.8971L3–50.6147
9L47–690.8109L22–230.5877
10L49–660.8102L17–310.5856
11L89–920.7705L16–170.5528
12L17–310.7646L19–200.5503
13L45–460.7563L45–490.5492
14L30–380.7361L89–920.5460
15L16–170.7315L23–250.5436
16L23–250.7195L100–1060.5400
17L8–300.7191L26–300.5387
18L100–1060.7031L103–1050.5256
19L45–490.7012L32–1130.5101
20L26–300.7002L8–300.4847
Table 2. Fault Chains Obtained by Probabilistic Method.
Table 2. Fault Chains Obtained by Probabilistic Method.
NumberFault Chain
1L26–30L69–75L70–74L70–75L75–77L76–77
2L26–30L69–75L69–70L24–70L75–77L76–77
3L26–30L69–75L69–70L24–70L75–77L23–32L25–27
4L26–30L69–75L69–70L24–70L75–77L45–49L23–32L25–27
Table 3. Fault Chains Obtained by Deterministic Method.
Table 3. Fault Chains Obtained by Deterministic Method.
NumberFault Chain
1L26–30L24–70L45–49L49–54L49–54L42–49L42–49L75–77
2L26–30L24–70L45–49L49–54L49–54L42–49L25–27L38–65
3L26–30L24–70L69–75L69–70L45–49L75–77L23–32L25–27
4L26–30L24–70L69–75L70–74L70–75L75–77L77–80L79–80
Table 4. Vulnerability of Transmission Lines.
Table 4. Vulnerability of Transmission Lines.
Sequence NumberLineVulnerability
1L47–690.8340
2L38–650.8231
3L92–1000.7951
4L69–750.7904
5L49–690.7472
6L26–300.7328
7L69–770.7095
8L42–490.7068
9L89–920.7029
10L8–300.6633
11L30–380.6630
12L49–540.6174
13L69–700.6069
14L49–660.6013
15L100–1060.6004
16L23–240.5742
17L16–170.5578
18L24–700.5542
19L45–490.5345
20L34–430.5321
Table 5. Comparison of Vulnerability Assessment Results.
Table 5. Comparison of Vulnerability Assessment Results.
Sequence NumberProposed MethodMethod 1 [38]Method 2 [38]Method 3 [21]
1L47–69L49–69L38–65L69–75
2L38–65L38–65L92–9449–54
3L92–100L24–70L92–10047–69
4L69–75L92–100L68–6926–30
5L49–69L47–69L26–3045–49
6L26–30L41–42L47–6975–77
7L69–77L80–99L41–4216–17
8L42–49L45–49L85–8938–65
9L89–92L24–72L25–2670–74
10L8–30L98–100L59–6342–49
11L30–38L99–100L85–8669–77
12L49–54L71–72L63–6476–77
13L69–70L77–82L65–6870–75
14L49–66L40–42L69–7549–54
15L100–106L92–94L86–8769–70
16L23–24L25–26L49–5419–34
17L16–17L34–43L49–5425–27
18L24–70L94–96L69–7049–51
19L45–49L49–54L80–9919–34
20L34–43L49–54L40–4245–46
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Liu, Y.; Peng, M.; Gao, X.; Zhang, H. Probabilistic Vulnerability Assessment of Transmission Lines Considering Cascading Failures. Processes 2021, 9, 1994. https://doi.org/10.3390/pr9111994

AMA Style

Liu Y, Peng M, Gao X, Zhang H. Probabilistic Vulnerability Assessment of Transmission Lines Considering Cascading Failures. Processes. 2021; 9(11):1994. https://doi.org/10.3390/pr9111994

Chicago/Turabian Style

Liu, Yanchen, Minfang Peng, Xingle Gao, and Haiyan Zhang. 2021. "Probabilistic Vulnerability Assessment of Transmission Lines Considering Cascading Failures" Processes 9, no. 11: 1994. https://doi.org/10.3390/pr9111994

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop