Professional Documents
Culture Documents
Abstract—In this paper, by applying complex network theory, dents such as component failure, intentional attack or natural
the invulnerability analysis of distribution network is studied disasters, and so on.
based on topological structure. Based on complex network theory, Complex network is the common abstraction and description
the invulnerability evaluation and analysis method of distribution
network is studied. Not only can we get the invulnerability of for complex system and it emphasizes the topology character
the whole network, but also the importance of each node, so we of system. For example, power networks can be described as
can compare the importance of these nodes with each other. On a network model, which can be transformed into complex
this basis, the invulnerability of a regional distribution network network theory for research. Since the discovery of small-
is studied by using the obtained method, and the results are world effect [3] and scale-free characteristics [4] of complex
analyzed.
Index Terms—Invulnerability, Distribution network, Topology networks, the study of complex networks has penetrated
structure, Complex network, Node importance into economics, medicine, sociology, ecology and computer
fields [5], [6], [7], [8]. In particular, it brings new analyzing
I. I NTRODUCTION method for distribution network of power system through pure
topological metrics [9], [10], [11], [12]. From the point of
Distribution network [1], [2], as the terminal link of power view of complex network, the application of complex net-
system, receives electric energy from transmission network work invulnerability analysis method to distribution network
or regional power plants and distributes it to various users topology structure analysis is of great practical significance for
of different voltage levels through distribution facilities, thus finding network structure defects, improving network security
to provide users with safe and high-quality power supply and reliability, and guiding power grid construction planning.
services. According to statistics, most users’blackouts are Up to now, only a few papers have considered the application
caused by the distribution links in the power system. Because of complex network approaches for analyzing modern distri-
of the reasons of excessive consideration of economy and bution networks.
unreasonable planning in the early construction of distribu- In this paper, the structural invulnerability of distribution
tion network in China, the distribution network in China is network has been studied by using purely topological ap-
relatively fragile in many aspects. proaches. This paper focuses on the overall topology analysis
Under the background of building a strong smart grid, it of distribution network. Analysis has been done by modeling
is becoming more and more important to select a distribution power grid as a complex network and applying the concepts
network topology with high security, high technology and high from graph theory.
power quality, to improve the anti-destruction performance
of distribution network and to enhance the sustained power II. M ODEL AND ANALYSIS APPROACH
supply capability of distribution network under emergencies. Now, we can represent an distribution network as a con-
The invulnerability of distribution network directly affects the nected undirected network G = (V, E), to analyze its inherent
overall robustness of the power grid. A simple component structure feature.
failure may cause cascades of failures across the power grid A concrete network G = (V, E) can be regarded as a graph
and lead to a large blackout. A number of recent large composed of point set V and edge set E. In a network graph G,
blackouts in Europe, North America and India have empha- V is a collection of all nodes in a graph, and E is a collection
sized the importance of understanding the structure feature of all directly connected edges between nodes in a graph.
of the distribution network. Therefore, the evaluation of the Suppose G has n node points, i.e., V = {v1 , v2 , · · · , vn }.
invulnerability of distribution network based on topological We first give a brief review on some basic theoretical con-
structure has become an urgent task to be solved. cepts about graph G. If the node pair (vi , vj ) ∈ E and the node
The invulnerability of distribution network refers to the pair (vj , vi ) ∈ E correspond to the same edge, the network
ability of power distribution network to provide continuous corresponding to the graph is called undirected network. A
and reliable power supply to users through its own regulation graph G is said to be connected, if for every pair of nodes
when some components become invalid due to sudden acci- there exists a path between them. In a connected networks,
331
Authorized licensed use limited to: UNIVERSITY OF BIRMINGHAM. Downloaded on May 11,2020 at 11:03:58 UTC from IEEE Xplore. Restrictions apply.
Node number Network
1 1.4286
2 2.1429
3 1.9048
4 2.1905
5 2.2381
6 2.1905
7 1.8571
8 1.9524
9 2.1905
10 2.1429
11 2.8095
12 2.6667
13 2.5238
14 2.1429
15 2.6190
16 2.6190
17 2.7619
18 2.7143
19 2.8095
20 3.0476
21 2.8571
characteristic path length 2.3719
332
Authorized licensed use limited to: UNIVERSITY OF BIRMINGHAM. Downloaded on May 11,2020 at 11:03:58 UTC from IEEE Xplore. Restrictions apply.
Sequence number Newly added edge New invulnerability Algorithm 1 Procedure of distribution network planning
1 (v3 , v7 ) 0.0742
2 (v1 , v15 ) 0.0733 1: Set E = E0 , j = 1;
3 (v1 , v16 ) 0.0733
4 (v1 , v13 ) 0.0732
5 (v3 , v16 ) 0.0732
2: Traverse all the edges l ∈ Ē \ Ej−1 , define El = Ej−1 ∪ l
and Gl = (V, El );
TABLE IV: The invulnerability after adding one new edge in
the network 3: Calculate the network invulnerability N I(Gl ) for all l ∈
Ē \ E and assume lj = argmaxl∈Ē\E N I(Gl );
333
Authorized licensed use limited to: UNIVERSITY OF BIRMINGHAM. Downloaded on May 11,2020 at 11:03:58 UTC from IEEE Xplore. Restrictions apply.
Node number Network
1 9.0000
2 0.9767
3 4.3235
4 0.9333
5 0.9333
6 0.9545
7 4.4545
8 2.1538
9 1.4318
10 0.9767
11 0.3962
12 0.8400
13 1.3125
14 1.4318
15 1.2857
16 1.2857
17 0.4038
18 0.8235
19 0.7368
20 0.9333
21 1.4318
Sum of nodes importance 37.0198
Network invulnerability 0.0839
334
Authorized licensed use limited to: UNIVERSITY OF BIRMINGHAM. Downloaded on May 11,2020 at 11:03:58 UTC from IEEE Xplore. Restrictions apply.