A methodology for simulating power system vulnerability to cascading failures in the steady state

被引:5
|
作者
Kumbale, Murali
Hardiman, Rod
Makarov, Yuri
机构
来源
关键词
cascading failure analysis; extreme contingency analysis; procedures to prevent large-scale system collapse; blackout prevention;
D O I
10.1002/etep.303
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Simulations of power system conditions and event sequences leading to either local or widespread blackout has acquired increasing importance following wide-impact network collapses that have occurred over the past several years in North America and Europe. This paper summarizes an analytical framework that has been developed, implemented, and practically used by Southern Company to evaluate system vulnerability to cascading failures using the steady state model. This methodology was first used by Southern Company in 1999. The studies performed at Southern Company have already influenced and motivated certain transmission development projects. Future improvements to the method could include better modeling and sequencing of cascading steps, including time sequence of failures using equipment response time. Significant interest exists in developing preventive methods and procedures and in the application of this technology in the infrastructure security arena. Copyright (C) 2008 John Wiley & Sons, Ltd.
引用
下载
收藏
页码:802 / 808
页数:7
相关论文
共 50 条
  • [1] Vulnerability Assessment for Cascading Failures in Electric Power Systems
    Baldick, Ross
    Chowdhury, Badrul
    Dobson, Ian
    Dong, Zhaoyang
    Gou, Bei
    Hawkins, David
    Huang, Zhenyu
    Joung, Manho
    Kim, Janghoon
    Kirschen, Daniel
    Lee, Stephen
    Li, Fangxing
    Li, Juan
    Li, Zuyi
    Liu, Chen-Ching
    Luo, Xiaochuan
    Mili, Lamine
    Miller, Stephen
    Nakayama, Marvin
    Papic, Milorad
    Podmore, Robin
    Rossmaier, John
    Schneider, Kevin
    Sun, Hongbin
    Sun, Kai
    Wang, David
    Wu, Zhigang
    Yao, Liangzhong
    Hang, Pei
    Zhang, Wenjie
    Zhang, Xiaoping
    2009 IEEE/PES POWER SYSTEMS CONFERENCE AND EXPOSITION, VOLS 1-3, 2009, : 83 - 91
  • [2] Power Grid Vulnerability Measures to Cascading Overload Failures
    Wang, Zhifang
    Scaglione, Anna
    Thomas, Robert J.
    2012 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2012,
  • [3] Vulnerability Analysis of Power Transmission Grids Subject to Cascading Failures
    Cadini, Francesco
    Lomazzi, Luca
    Zio, Enrico
    ELECTRONICS, 2024, 13 (05)
  • [4] Revealing Structural and Functional Vulnerability of Power Grids to Cascading Failures
    Fang, Junyuan
    Wu, Jiajing
    Zheng, Zibin
    Tse, Chi K.
    IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS AND SYSTEMS, 2021, 11 (01) : 133 - 143
  • [5] Composite Power System Vulnerability Evaluation to Cascading Failures Using Importance Sampling and Antithetic Variates
    Chen, Quan
    Mili, Lamine
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2013, 28 (03) : 2321 - 2330
  • [6] Revealing Impacts of Cyber Attacks on Power Grids Vulnerability to Cascading Failures
    Che, Liang
    Liu, Xuan
    Ding, Tao
    Li, Zuyi
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2019, 66 (06) : 1058 - 1062
  • [7] Impacts of Wind Power Uncertainty on Grid Vulnerability to Cascading Overload Failures
    Athari, Mir Hadi
    Wang, Zhifang
    IEEE TRANSACTIONS ON SUSTAINABLE ENERGY, 2018, 9 (01) : 128 - 137
  • [8] Risk-Based Composite Power System Vulnerability Evaluation to Cascading Failures Using Importance Sampling
    Chen, Quan
    Mili, Lamine
    2011 IEEE POWER AND ENERGY SOCIETY GENERAL MEETING, 2011,
  • [9] Cascading Failures of Power System with the Consideration of Cyber Attacks
    Tu, Haicheng
    Shen, Hui-Liang
    Xia, Yongxiang
    2020 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2020,
  • [10] Vulnerability Analysis and Critical Components Identification of Power Networks under Cascading Failures
    Wang Shuliang
    Zhang Jianhua
    Gan Liangzhi
    PROCEEDINGS OF THE 35TH CHINESE CONTROL CONFERENCE 2016, 2016, : 6570 - 6574