{"title":"A methodology for vulnerability assessment of backup protection under cascading failures","authors":"W. Yang, T. Bi, S. F. Huang, A. Xue, Q. Yang","doi":"10.1109/CRIS.2010.5617577","DOIUrl":null,"url":null,"abstract":"To avoid undesired operation of backup protection caused by load encroachment under cascading failures, the methodology for vulnerability assessment of backup protection is studied. In this paper, the vulnerability assessment of backup protections is formulated as a mixed integer nonlinear programming problem, which is solved by the binary particle swarm optimization approach. The measurement index for assessing the vulnerability of backup protection is given as well. The simulation results on New England 39-bus system demonstrate that the proposed method can effectively assess the vulnerability of backup protection under cascading failures.","PeriodicalId":206094,"journal":{"name":"2010 5th International Conference on Critical Infrastructure (CRIS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 5th International Conference on Critical Infrastructure (CRIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CRIS.2010.5617577","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
To avoid undesired operation of backup protection caused by load encroachment under cascading failures, the methodology for vulnerability assessment of backup protection is studied. In this paper, the vulnerability assessment of backup protections is formulated as a mixed integer nonlinear programming problem, which is solved by the binary particle swarm optimization approach. The measurement index for assessing the vulnerability of backup protection is given as well. The simulation results on New England 39-bus system demonstrate that the proposed method can effectively assess the vulnerability of backup protection under cascading failures.