z-logo
open-access-imgOpen Access
Identification of vulnerable transmission lines in power system based on game theory
Author(s) -
Bowen Zhu,
Lixia Zhang,
Guanghuan Li
Publication year - 2024
Publication title -
ieee access
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.587
H-Index - 127
ISSN - 2169-3536
DOI - 10.1109/access.2024.3368629
Subject(s) - aerospace , bioengineering , communication, networking and broadcast technologies , components, circuits, devices and systems , computing and processing , engineered materials, dielectrics and plasmas , engineering profession , fields, waves and electromagnetics , general topics for engineers , geoscience , nuclear engineering , photonics and electrooptics , power, energy and industry applications , robotics and control systems , signal processing and analysis , transportation
Accurately identifying vulnerable transmission lines in power system is paramount for averting cascading failures and guaranteeing the safety and stability of power grid operations. This paper introduces a vulnerability assessment method for transmission lines in power system, which incorporates network topology and system operational states. The enhanced degree index is used to assess the lines’ structural vulnerability. In order to evaluate the variations in power flow during regular system operation or following a failure, the improved power transfer distribution factor (PTDF) and line outage distribution factor (LODF) are used to build the line operational state vulnerability indices.To mitigate the limitations of a single assignment method, subjective indicator weights are determined using the hierarchical analysis method, while objective weights are calculated using the entropy value method. These weights are subsequently distributed using game theory. The effectiveness of the proposed method is verified through simulations on the IEEE 39-bus and IEEE 118-bus systems. The experimental results show that the proposed method has higher precision compared with other methods. And the new index can identify the vulnerable lines of the system, either due to their position in the network or by the power they transmit along the network.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here