引用本文: | 徐青山,王 伟,刘建坤,刘中泽,辛建波,许庆强.计及灵敏度因子的加权电气介数在电网脆弱性线路识别中的应用[J].电力自动化设备,2013,33(10): |
| XU Qingshan,WANG Wei,LIU Jiankun,LIU Zhongze,XIN Jianbo,XU Qingqiang.Application of weighted electric betweenness considering sensitivity factor in identification of vulnerable grid lines[J].Electric Power Automation Equipment,2013,33(10): |
|
摘要: |
基于复杂网络理论,通过引入“发电机-负荷”节点对之间的灵敏度因子,重新定义了计及灵敏度因子的加权电气介数,用于电网的脆弱性线路识别。通过修正发电机、负荷节点在加权电气介数计算过程中的权重值来强化“发电机-负荷”节点对之间的潮流指向性。以IEEE 9节点系统和IEEE 39节点系统作为测试算例,求解各线路的加权电气介数值并以此对脆弱线路进行排序,对排序靠前的脆弱线路分别进行N-1小干扰稳定性校验和静态攻击稳定性校验,校验结果验证了所提方法的正确性。 |
关键词: 加权电气介数 灵敏度因子 脆弱性线路 N-1校验 静态攻击 稳定性 模型 |
DOI: |
分类号: |
基金项目:国家高技术研究发展计划(863计划)资助项目(2012-AA050214);江苏省自然科学基金资助项目(BK2012753);国家电网公司科技项目(52182013000V);江苏省电力公司科技项目(J2013073) |
|
Application of weighted electric betweenness considering sensitivity factor in identification of vulnerable grid lines |
XU Qingshan1, WANG Wei1, LIU Jiankun2, LIU Zhongze1, XIN Jianbo3, XU Qingqiang2
|
1.School of Electrical Engineering,Southeast University,Nanjing 210096,China;2.Jiangsu Electric Power Company,Nanjing 210024,China;3.Jiangxi Electric Power Research Institute,Nanchang 330096,China
|
Abstract: |
The sensitivity factor between generator node and load node is introduced and the weighted electric betweenness considering the sensitivity factor is redefined based on the complex network theory for the identification of vulnerable lines in power grid. The weights of generator node and load node are revised during the computation of weighted electric betweenness to strengthen the directivity of power flow between generator node and load node. The weighted electric betweenness is calculated for each line of IEEE 9-bus system and IEEE 39-bus system,and the vulnerable lines are respectively sorted. The N-1 small signal stability verification and static attack stability verification are carried out for the leading vulnerable lines and results show the correctness of the proposed identification method. |
Key words: weighted electric betweenness sensitivity factor vulnerable line N-1 verification static attack stability models |