A Method of Power Network Security Analysis Considering Cascading Trip
- 24 Downloads
In this paper, a grid security index considering cascade tripping is proposed, and an algorithm is proposed for this index combination with the operating behavior of relay protection so as to solve the cascading tripping problem of the power system. Firstly, according to the current behavior of branch cascading tripping and the action of line current-mode backup protection, the critical state of grid cascading trip is analyzed, and it is proved that the input power of grid nodes can be used to describe the security of grid. Then, based on the relationship between the input power of nodes and the security level of power grid, a model is presented to represent the security level of power system without cascading failures under the impact of initial faults, and the model is solved by particle swarm optimization. An example proves the validity of the algorithm.
KeywordsPower system Security index Cascade tripping Particle swarm optimization
This research was financially supported by Doctoral Research Foundation of Fujian University of Technology under the grant GY-Z13104, and Scientific Research and Development Foundation of Fujian University of Technology under the grant GY-Z17149.
- 1.Cao, J., Zhang, Y., Lin, H., et al.: Self-organized criticality identification of power system based on homogeneity. Electric Power Autom. Equip. 33(7), 6–11, 18 (2013)Google Scholar
- 2.Zhang, J., Tong, X., Jiang, J.: Power system cascading failure analysis based on seepage and risk theory. Power Syst. Autom. 41(5), 46–52 (2017)Google Scholar
- 3.Deng, H., Li, P., Zheng, R.: Analysis of disturbed branches and associated nodes in cascading faults of power grid. J. Fujian Inst. Eng. 13(3), 223–228 (2015)Google Scholar
- 4.Yang, J., Luo, X., Qu, C., et al.: Cascading failure analysis model of substation automation system. Power Syst. Autom. 40(23), 36–41 (2016)Google Scholar
- 5.Fu, L., Huang, W., Xiao, S., et al.: Vulnerability assessment for power grid based on small-world topological model. In: Power and Energy Engineering Conference, pp. 1–4. IEEE (2010)Google Scholar
- 6.Song, B., Zhang, Z.: Preferential redistribution in cascading failure by considering local real-time information. Elsevier Ltd. 128, 5–15 (2019)Google Scholar
- 7.Zhang, B.: Analysis of Higher Power Network. Tsinghua University Press, Beijing (2007)Google Scholar