首页 | 本学科首页   官方微博 | 高级检索  
     

融合拓扑和安全及稳定的电力网脆弱性评估
引用本文:田启东,刘顺桂,江 辉,彭建春. 融合拓扑和安全及稳定的电力网脆弱性评估[J]. 计算机工程与应用, 2016, 52(6): 223-226
作者姓名:田启东  刘顺桂  江 辉  彭建春
作者单位:1.深圳供电局有限公司 系统运行部,广东 深圳 5180012.深圳大学 机电与控制工程学院,广东 深圳 518060
摘    要:提出了一种融合拓扑和安全及稳定的静态电力网脆弱性评估方法。先从依赖物理规律的不同程序提取出评估电力网脆弱性的三个主导指标:拓扑脆弱性指标、安全脆弱性指标、稳定脆弱性指标。基于邻接矩阵构建了拓扑脆弱性指标的度量方法。结合线路热极限和功角稳定极限,分别给出了安全脆弱性指标和稳定脆弱性指标的度量方法。计及三个主导脆弱性指标影响电力网脆弱性方式的差异,提出了三合一脆弱性指标的融合模型,并给出了脆弱性指标的算法。示例仿真结果表明,提出的三合一脆弱性指标方法对评估电力网脆弱性有效、可行。

关 键 词:脆弱性  邻接矩阵  特征值  安全性  稳定性  

Grid vulnerability evaluation by fusing grid topology and security and stability
TIAN Qidong,LIU Shungui,JIANG Hui,PENG Jianchun. Grid vulnerability evaluation by fusing grid topology and security and stability[J]. Computer Engineering and Applications, 2016, 52(6): 223-226
Authors:TIAN Qidong  LIU Shungui  JIANG Hui  PENG Jianchun
Affiliation:1.System Operation Department, Shenzhen Power Supply Co. LTD, Shenzhen, Guangdong 518001, China2.College of Mechatronics and Control Engineering, Shenzhen University, Shenzhen, Guangdong 518060, China
Abstract:A grid vulnerability evaluation method is proposed in this paper by fusing grid topology and security and stability. Firstly, three dominant indices called topology vulnerability index, security vulnerability index and stability vulnerability index are refined from different levels of dependence on physical laws. The adjacency matrix is employed to form the topology vulnerability index. The security vulnerability index and stability vulnerability index are quantified respectively based on line security limit and angle stability limit. Then a three-to-one method is proposed to fuse the three dominant indices to evaluate grid vulnerability, which considers the differences in ways of impact on grid vulnerability of the three dominant indices. The algorithm of calculating three dominant indices and three-to-one vulnerability index is put forward. Simulation results show that the proposed grid vulnerability evaluation method is effective and practicable.
Keywords:vulnerability  adjacency matrix  eigenvalue  security  stability  
点击此处可从《计算机工程与应用》浏览原始摘要信息
点击此处可从《计算机工程与应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号