Network centrality based N-k contingency scenario generation

Rodel D. Dosano, Hwachang Song, Byongjun Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Abstract

To investigate and evaluate the mechanics of how failures spread in power grids, this paper introduces a methodology for a credible list of critical N-k contingencies that would threaten the grids. The methodology is based on the concept of delta centrality. The list of critical contingencies will provide the look-ahead situation awareness for operators on any impending large power grid blackouts. We also propose novel indices which are simple to interpret and can be used to determine and identify locations of critical components caused by cascading failures. Build-ups of potentially high risk cascading failures can be monitored by these indices thus, providing wide area visibility of power system dynamics against threatening events. Results from 118 test bus system show a promising application for enhancing power system against rare and catastrophic outages.

Original languageEnglish
Title of host publicationTransmission and Distribution Conference and Exposition
Subtitle of host publicationAsia and Pacific, T and D Asia 2009
DOIs
Publication statusPublished - 2009 Dec 16
EventTransmission and Distribution Conference and Exposition: Asia and Pacific, T and D Asia 2009 - Seoul, Korea, Republic of
Duration: 2009 Oct 262009 Oct 30

Publication series

NameTransmission and Distribution Conference and Exposition: Asia and Pacific, T and D Asia 2009

Other

OtherTransmission and Distribution Conference and Exposition: Asia and Pacific, T and D Asia 2009
Country/TerritoryKorea, Republic of
CitySeoul
Period09/10/2609/10/30

Keywords

  • Catastrophic events
  • Complex network theory
  • Delta centrality
  • N-k contingencies

ASJC Scopus subject areas

  • Energy Engineering and Power Technology
  • Fuel Technology

Fingerprint

Dive into the research topics of 'Network centrality based N-k contingency scenario generation'. Together they form a unique fingerprint.

Cite this