{"title":"电力传输系统脆弱性的确定","authors":"B. Carreras, D. Newman, I. Dobson","doi":"10.1109/HICSS.2012.208","DOIUrl":null,"url":null,"abstract":"Determining the vulnerabilities in power transmission systems requires two distinct steps because most large blackouts have two distinct parts, the triggers/initiating event followed by the cascading failure. Finding the important triggers for large blackouts is the first and standard step. Next, the cascading part of the extreme event (which can be long or short) is critically dependent on the \"state\" of the system, how heavily the lines are loaded, how much generation margin exists, and where the generation exists relative to the load. However, during large cascading events there are some lines whose probability of overloading is higher that the others. Statistical studies of blackouts using the OPA code allow the identification of such lines or groups of line for a given network model, thereby providing a technique for identifying at risk (or critical) clusters. This paper addresses both parts of the vulnerability question.","PeriodicalId":380801,"journal":{"name":"2012 45th Hawaii International Conference on System Sciences","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"27","resultStr":"{\"title\":\"Determining the Vulnerabilities of the Power Transmission System\",\"authors\":\"B. Carreras, D. Newman, I. Dobson\",\"doi\":\"10.1109/HICSS.2012.208\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Determining the vulnerabilities in power transmission systems requires two distinct steps because most large blackouts have two distinct parts, the triggers/initiating event followed by the cascading failure. Finding the important triggers for large blackouts is the first and standard step. Next, the cascading part of the extreme event (which can be long or short) is critically dependent on the \\\"state\\\" of the system, how heavily the lines are loaded, how much generation margin exists, and where the generation exists relative to the load. However, during large cascading events there are some lines whose probability of overloading is higher that the others. Statistical studies of blackouts using the OPA code allow the identification of such lines or groups of line for a given network model, thereby providing a technique for identifying at risk (or critical) clusters. This paper addresses both parts of the vulnerability question.\",\"PeriodicalId\":380801,\"journal\":{\"name\":\"2012 45th Hawaii International Conference on System Sciences\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-01-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"27\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 45th Hawaii International Conference on System Sciences\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/HICSS.2012.208\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 45th Hawaii International Conference on System Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HICSS.2012.208","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Determining the Vulnerabilities of the Power Transmission System
Determining the vulnerabilities in power transmission systems requires two distinct steps because most large blackouts have two distinct parts, the triggers/initiating event followed by the cascading failure. Finding the important triggers for large blackouts is the first and standard step. Next, the cascading part of the extreme event (which can be long or short) is critically dependent on the "state" of the system, how heavily the lines are loaded, how much generation margin exists, and where the generation exists relative to the load. However, during large cascading events there are some lines whose probability of overloading is higher that the others. Statistical studies of blackouts using the OPA code allow the identification of such lines or groups of line for a given network model, thereby providing a technique for identifying at risk (or critical) clusters. This paper addresses both parts of the vulnerability question.