A TOPSIS-Based Vulnerability Assessment Method of Distribution Network Considering Network Topology and Operation Status
Vulnerability assessment is one of the effective ways to prevent cascading failures of a distribution network (DN). Considering topological structure and operation status, a comprehensive assessment method based on the technique for order preference by similarity to ideal solution (TOPSIS) is propos...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2023-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/10231086/ |
_version_ | 1797688485166972928 |
---|---|
author | Juan Wen Siyu Lin Xing Qu Qiankang Xiao |
author_facet | Juan Wen Siyu Lin Xing Qu Qiankang Xiao |
author_sort | Juan Wen |
collection | DOAJ |
description | Vulnerability assessment is one of the effective ways to prevent cascading failures of a distribution network (DN). Considering topological structure and operation status, a comprehensive assessment method based on the technique for order preference by similarity to ideal solution (TOPSIS) is proposed to accurately identify the vulnerable parts of the DN. In the method, the improved structural vulnerability indices based on complex network theory are defined, such as degree and network efficiency. And the electrical betweenness and power flow transfer entropy are established to evaluate the state vulnerability of a DN. Combining the analytic hierarchy process (AHP) and the entropy weight method, a comprehensive weight matrix of each vulnerability index is obtained. Based on the weighted vulnerability indices, the TOPSIS method is proposed to calculate the comprehensive vulnerability of each node and line in the DN. Moreover, the obtained comprehensive vulnerability results are corrected by the grey correlation degree to accurately identify vulnerable parts in the DN. In addition, the system transmission efficiency index is established to describe the degree of system performance degradation of the DN under different attack strategies. The simulation results of IEEE 33-bus test case show that the proposed method can effectively identify vulnerable nodes and lines in the DN. |
first_indexed | 2024-03-12T01:32:38Z |
format | Article |
id | doaj.art-cad14951f8264177a173d17498b6d434 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-03-12T01:32:38Z |
publishDate | 2023-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-cad14951f8264177a173d17498b6d4342023-09-11T23:01:47ZengIEEEIEEE Access2169-35362023-01-0111943589437010.1109/ACCESS.2023.330918810231086A TOPSIS-Based Vulnerability Assessment Method of Distribution Network Considering Network Topology and Operation StatusJuan Wen0https://orcid.org/0000-0002-8215-0824Siyu Lin1https://orcid.org/0009-0002-3217-2459Xing Qu2https://orcid.org/0000-0002-1943-0081Qiankang Xiao3https://orcid.org/0009-0002-6489-5993School of Electrical Engineering, University of South China, Hengyang, ChinaSchool of Electrical Engineering, University of South China, Hengyang, ChinaSchool of Electrical Engineering, University of South China, Hengyang, ChinaSchool of Electrical Engineering, University of South China, Hengyang, ChinaVulnerability assessment is one of the effective ways to prevent cascading failures of a distribution network (DN). Considering topological structure and operation status, a comprehensive assessment method based on the technique for order preference by similarity to ideal solution (TOPSIS) is proposed to accurately identify the vulnerable parts of the DN. In the method, the improved structural vulnerability indices based on complex network theory are defined, such as degree and network efficiency. And the electrical betweenness and power flow transfer entropy are established to evaluate the state vulnerability of a DN. Combining the analytic hierarchy process (AHP) and the entropy weight method, a comprehensive weight matrix of each vulnerability index is obtained. Based on the weighted vulnerability indices, the TOPSIS method is proposed to calculate the comprehensive vulnerability of each node and line in the DN. Moreover, the obtained comprehensive vulnerability results are corrected by the grey correlation degree to accurately identify vulnerable parts in the DN. In addition, the system transmission efficiency index is established to describe the degree of system performance degradation of the DN under different attack strategies. The simulation results of IEEE 33-bus test case show that the proposed method can effectively identify vulnerable nodes and lines in the DN.https://ieeexplore.ieee.org/document/10231086/Distribution networkvulnerability assessmentTOPSIS methodcomplex network theoryattack strategy |
spellingShingle | Juan Wen Siyu Lin Xing Qu Qiankang Xiao A TOPSIS-Based Vulnerability Assessment Method of Distribution Network Considering Network Topology and Operation Status IEEE Access Distribution network vulnerability assessment TOPSIS method complex network theory attack strategy |
title | A TOPSIS-Based Vulnerability Assessment Method of Distribution Network Considering Network Topology and Operation Status |
title_full | A TOPSIS-Based Vulnerability Assessment Method of Distribution Network Considering Network Topology and Operation Status |
title_fullStr | A TOPSIS-Based Vulnerability Assessment Method of Distribution Network Considering Network Topology and Operation Status |
title_full_unstemmed | A TOPSIS-Based Vulnerability Assessment Method of Distribution Network Considering Network Topology and Operation Status |
title_short | A TOPSIS-Based Vulnerability Assessment Method of Distribution Network Considering Network Topology and Operation Status |
title_sort | topsis based vulnerability assessment method of distribution network considering network topology and operation status |
topic | Distribution network vulnerability assessment TOPSIS method complex network theory attack strategy |
url | https://ieeexplore.ieee.org/document/10231086/ |
work_keys_str_mv | AT juanwen atopsisbasedvulnerabilityassessmentmethodofdistributionnetworkconsideringnetworktopologyandoperationstatus AT siyulin atopsisbasedvulnerabilityassessmentmethodofdistributionnetworkconsideringnetworktopologyandoperationstatus AT xingqu atopsisbasedvulnerabilityassessmentmethodofdistributionnetworkconsideringnetworktopologyandoperationstatus AT qiankangxiao atopsisbasedvulnerabilityassessmentmethodofdistributionnetworkconsideringnetworktopologyandoperationstatus AT juanwen topsisbasedvulnerabilityassessmentmethodofdistributionnetworkconsideringnetworktopologyandoperationstatus AT siyulin topsisbasedvulnerabilityassessmentmethodofdistributionnetworkconsideringnetworktopologyandoperationstatus AT xingqu topsisbasedvulnerabilityassessmentmethodofdistributionnetworkconsideringnetworktopologyandoperationstatus AT qiankangxiao topsisbasedvulnerabilityassessmentmethodofdistributionnetworkconsideringnetworktopologyandoperationstatus |