Abstract

Failure of vulnerable lines in the power system often results in tidal shifts, and triggering chain failures and their corresponding transmission sections are concentrated manifestations of the weak links in the power system. It is very important to identify the vulnerable lines and search the transmission section to prevent the chain faults as well as to analyze the stability of the power system. Aiming at the problems of inaccurate search of vulnerable lines, difficulties adapting to the complex and changing power system as well as wrong selection and omission of transmission section search in the existing references, this paper proposes an algorithm for searching vulnerable lines and their key transmission sections based on the graph theory and PMU (phasor measurement unit) data. First, the method combines with the graph theory and PMU data to construct the grid topology map. Second, the comprehensive indicators for screening vulnerable lines are proposed by fully considering the network topology and line capacity, which combines with power exchange efficiency and energy fluctuation probability. Third, the distance matrix in the Floyd algorithm is transformed into a unit group that can store more elements, which reduces the traversal times of the algorithm and improves computational efficiency. The fast localization of transmission cross sections associated with vulnerable lines is realized. Finally, the critical transmission cross sections are screened according to the line outage distribution factor and line safety margin. The IEEE 39-bus system is selected for simulation experiments, and the simulation results show that the key transmission section search method proposed in this paper can better adapt to the variable power grid and is faster and more accurate than the other common method.

1. Introduction

Large-scale power outages have been occurring time and again, causing severe economic losses. For example, the 2012 Indian blackout affected more than 600 million people [1]. As recorded in reference [2], it was mentioned that a huge blackout occurred in Brazil when two transmission lines failed and tripped due to a mountain fire, resulting in the unraveling of the Far Northwest grid. A large proportion of such accidents were due to the tripping or disconnection of lines in the grid due to faults. As soon as a fault occurred, the protective device removed the component in question, while the current of the component was diverted to the transmission line of high correlation, leading to a chain of failures [3, 4]. In addition, the disconnection of heavy-loaded lines in the grid could also cause the current to be shifted, thus causing a chain fault. And each event in the chain of failures further weakened the power system which led to a complete grid blackout [5, 6].

Vulnerable lines in the grid are the links in the network transmission that need to be focused on. The key transmission section is a weak transmission link formed by the current transfer caused by the failure of the vulnerable lines. It is very important to quickly and accurately locate the vulnerable lines and their key transmission sections in the complex power grid. In the past, the identification of vulnerable lines was often a single consideration, and the determination of the transmission section could not be adapted to the development of variable power grids [712]. And the current power grid is developing towards digitalization and intelligence, so it is necessary to propose a data-driven fast identification method for transmission sections.

Taking DC modeling analysis as an example, researchers have proposed a variety of vulnerable line assessment methods, which can be roughly divided into two categories. One is the analysis method based on the network structure. For example, reference [7] considered the correlation between interconnected control regions decoupled by the Schur complement matrix and applied the regional decomposition method to decentralize the calculation of the total transmission capacity of the power system. As mentioned in reference [8], a multiregion line transmission calculation method based on the network decomposition method of REI (radial, equivalent, and independent)-type network equivalents was proposed, in which each region could use the REI equivalents of the external regions to calculate its total transmission capacity by continuous power flow. The other one analyzed the load from the line itself. For example, reference [9] used a DC distribution factor to calculate the thermal limit of the line and assess the line transfer capability. However, the accuracy of a single evaluation metric for an increasingly complex grid needed to be tested.

The transmission section mainly reflects the problems that occur after the occurrence of interlocking faults. Relevant researchers generally consider two aspects when solving such problems. One is the structural problem represented by topological complementary graphs. For example, a Markov tree-based chained fault assessment method was proposed in reference [10]. This type of approach tended to ignore the effect of line capacity on the results. The other one analyzed the impact of the current transfer due to faulty elements. Similarly, reference [11] identified system instability by analyzing the transfer of electrical quantities in the critical section and thus obtaining the concavity and convexity of the disturbed phase trajectory of the AC critical branch. And reference [12] screened out the critical transmission section by establishing the correlation matrix of faulty elements and tidal current transfer channels based on the open-break distribution factor. However, they all required high-level and time-consuming algorithm calculation, and the regional information under the decentralized framework could not be fully accessed, which would inevitably affect the objectivity of the assessment results.

Graph theoretic methods are generally applied to solve topological problems. And facing the complex power grid structure, researchers have applied their knowledge of graph theory to simplify it topologically. A series of related studies have been further developed. For example, in the assessment of vulnerable lines in power grids, reference [13] analyzed the vulnerability of lines from the aspects of power transmission capacity and load capacity of power grids by using the topological complementary characteristics of the network to find the electrical gaps between the nodes. Reference [14] proposed a cascading fault model based on the theory of complex networks, which could intuitively reflect the resistance to damage of the high-risk nodes in the power grid. On the basis of which, reference [15] proposed a vulnerable transmission line identification method using K-shell decomposition depth, which fully took into account the dynamic characteristics of the grid and the postfault transmission capability. Reference [16] assessed the transmission network vulnerability by converting the grid with spatial information into a fault propagation map with temporal information. Reference [17] added entropy and Spearman rank correlation coefficients through a multi-metric decision-making method based on interconditional correlation, which could accurately identify the important transmission lines with topological characteristics of complex networks by utilizing the topological characteristics of complex networks. However, this kind of research still stayed in the first-level network structure. Thus, reference [18] proposed a weighted index applied to the second-level correlation network to realize the identification of vulnerable lines in the power grid. The use of graph-theoretic methods avoided errors caused by regional conditions and greatly reduced the computational burden.

For the search of transmission sections that are susceptible to the influence of the tidal shifts occurring in the vulnerable lines under chained faults, the application of graph theory methods not only improves the accuracy of the results, but more importantly, it is able to reflect the line association. For example, reference [19] proposed a fast search and identification method for weak transmission sections based on the automatic subnetwork combination technique, which automatically combined the subnets with a more intuitive expression of their structural associations. In order to further shorten the computation time and fully consider multiple topological complementary changes, reference [20] utilized a cut-set search algorithm based on graph-theoretic matrix operations and used security margins to quickly identify typical transmission sections in the grid. Reference [21] combined a key section identification method with multi-fault disturbances and a weak section identification method after multi-faults induced topological changes to analyze multiple types of lines. A key transmission section identification method considering multiple predicted faults was proposed. Reference [22] accessed the weighted network topology in an AC current model to identify critical sections in the grid using complex network centrality theory as well as line net capacity and vulnerability indicators. Reference [23] transformed complex grids into their dual graphs, utilized the improved structural hole theory and M-Burt method to rank the vulnerability of transmission lines, and designed a cascading mitigation strategy that took into account vulnerable transmission lines. Such methods simplify the tedious steps of computation and also make the correlation between lines more explicit. The above methods avoid the drawbacks of real network partitioning and the loss of information in a decentralized framework. However, they do not capture the characteristics of the new power system, thus failing to achieve timely monitoring of the grid.

Synthesizing the shortcomings of previous literature, this paper proposes a transmission section search method based on graph theory and PMU data. The main contributions of this paper are as follows.(1)Aiming at the single aspect considered in the previous evaluation indicator for vulnerable lines, a comprehensive evaluation indicator for vulnerable transmission lines is proposed. The indicator fully considers the system structure and the carrying capacity of the line itself and can more comprehensively and accurately assess the condition of the line.(2)The problems of wrong selection, omission, and long calculation time exist in the search for key transmission sections. In this paper, the Floyd algorithm is improved to improve its calculation accuracy and efficiency, which can realize an accurate and fast search of the transmission section.(3)According to the results of transmission section identification, combined with the line outage distribution factor and line safety margin indicator, the determination of key transmission sections is completed.

The rest of this paper is organized as follows. Section 2 presents the construction of power grid topology and the definition of line weight. Section 3 first introduces the vulnerability line identification method and proposes the comprehensive vulnerability determination indicator test method. Then, the search method for the first k minimum weight path is proposed. Finally, the method of searching the key transmission section is proposed. In Section 4, an IEEE 39-bus system is selected for experimental simulation, and the comparison of the operating time between the proposed method and the traditional method is given. Section 5 summarizes.

2. Network Model and Identification Indicators

2.1. Graph Theory and Model

The cascading failure of power systems can be studied by using the topology of complex power grids. The topology diagram can directly reflect the coupling relationship of power systems. This paper mainly uses similarity theory to construct the topological graph. This will facilitate the use of spatial weighting ideas to assign weights to lines. This will facilitate the use of spatial weighting ideas to assign weights to lines. This process greatly preserves the structural characteristics of the original network and provides convenience for subsequent calculations. Considering the structural characteristics of the power grid and the status characteristics of the line, the topological map is constructed as shown in Algorithm 1.

Input: Grid Node Information
(1)Obtain spatial weighted matrix C.
(2)Construct the nonweighted graph.
(3)Normalize the value in matrix C.
(4)Convert to a similarity matrix S. The value in matrix S represents the grid connection strength.
(5)Give the topology weight.

As shown in Figure 1, this paper uses IEEE 9-bus to illustrate. Layer A represents the original network structure, and layer B reflects the topological relationship. The node in B is the location of the line in A, and it is also the location of PMU data.

The spatial weighting matrix C can be interpreted as a network that contains connections between measurement points and PMUs, and it also contains an observation [24]. Matrix C is a pairwise Euclidean distance coefficient cij that reflects the relationship between nodes. Matrix C is denoted as follows:where cij and pij are the distance and the shortest path from node i to node j, respectively. Generally, the values in C are normalized so that the range is 0∼1.

Similarity matrix S can be defined as follows [25]:andwhere . dij is the similarity between lines. ln is the n-dimensional vector of all elements 1. The superscript T represents the transpose. The value range of the similarity coefficient is from 0 to 1. The larger the value is, the higher the mild connection will be.

2.2. Line Weight

Let [x1, x2, …, xm] denote a set of system voltage data measured at position [1, 2, …, m], and let xi denote unknown data at unmonitored position xi in a study area, as shown in Figure 2. The location of PMUs is random. Then, when a set of measurement data is given at time tj, the estimated value xi of a random process of an unobserved part of can be obtained by the weighted average of sampling points [26].

In (4), i is the estimated position. l is the sensor position. m is the number of PMUs around the measurement value that affects the position i. ωil is the unknown prediction weight between the measurement point l and the sampling point i.

Weights can be divided into two categories, including realistic physical weights represented by electrical distances and abstract weights described by conductance ratios to represent the strength of the line interaction. This paper is based on the latter weight selection; it is more in line with this article for vulnerable lines related to the key transmission section search requirements. When studying the actual power grid and considering the multidimensionality of the network structure, the concept of spatial similarity can be used to represent the degree of interaction between lines; then, the weight ωil between the monitoring point l and the sampling point i can be defined as follows [27]:andwhere s(xi, xl) is a similarity coefficient based on a set of measurements, which is used to quantify the similarity between site i and site l. aik is a set of changing temporal patterns; φik is an orthonormal basis vector describing the spatial structure of these patterns.

After calculating the weights, the system behavior estimate for the unsampled points can be calculated according to (4), such as

3.1. Power Exchange Efficiency

The power transmission distribution factor (PTDF) in the power grid reflects the influence of power variation between nodes on other lines. Applying PTDF to the topology structure diagram can reflect the relationship between the mapped lines. The performance of the topology graph greatly retains the characteristics of the original network, which facilitates us to analyze the line relationship of the original grid from the perspective of structure. The flow direction in long-distance high-voltage transmission lines can be approximated as a DC distribution. This is because the phase difference between the nodes is very small, and the branch reactance value xij is much larger than the resistance value rij. So, PTDF can be calculated as follows:where ΔPkm and ΔPij are the amounts of power variation from the supply point to the load point , and on the line lij under the influence of ΔPkm, respectively. Xjk is the element in the reactance matrix.

The PTDF quantifies the power transfer of the branch circuit between the supply nodes and load nodes and reflects the degree of association between node pairs. The line vulnerability can be evaluated according to the PTDF modulus, which can be calculated by the PTDF matrix MPTDF.

The total power exchange efficiency of the lines is expressed as follows:

The value of the line is positively correlated with the criticality of the line. The proposed power exchange efficiency is analyzed using the node reactance matrix. The topological nodes reflect the line characteristics of the original network, which means that the analysis does not involve the influence of power flow propagation. This will improve the stability of parameter analysis.

3.2. Tidal Transfer Entropy Analyzed from the Energy Perspective

This section mainly introduces the tidal transfer entropy. Different from the traditional transfer entropy, it is considered from the perspective of energy. The main voltage parameters are directly measured by PMUs at a sampling rate of 0.02 s. When the transmission system is faced with high penetration of renewable energy generation, the initial power flow of the system needs to be updated with the current situation. Figure 3 shows the model diagram of the acquisition system. The voltage matrix A(t) measured by PMU can be obtained directly from the system. Each element in the voltage matrix is the voltage measurement value of the PMU at a certain time node. The number of PMUs is selected to cover each power grid line; that is, matrix A(t) can be regarded as a data network map, which is defined as follows:where .

For a certain time t, the energy of the line is defined as follows:

After obtaining the energy of the line, in order to intuitively reflect the results of parameter comparison, the energy fluctuation probability pk(t) of the evaluation indicator is proposed. It is the proportion of the total energy of the line in a certain period of time in the total energy of the system, which can be calculated by the following formula (13):

The average energy fluctuation probability is further calculated, and the lines larger than this indicator will be defined as the lines that should be focused on.

The greater the value of pk(t), the greater the line load, and the more vulnerable to the negative impact of power flow will transfer. It is worth noting that pk(t) is a dynamic indicator, and its value changes with the real-time measurement results of PMUs.

3.3. Comprehensive Judgment Indicator of Line Vulnerability

When assessing the vulnerability of the system line, a single aspect of the analysis is not reliable. In this paper, the comprehensive evaluation indicator Гij of line vulnerability is proposed based on the above two indicators [28]. It is considered from two aspects: structure and power tidal, and more in line with the actual grid operation.

In (15), α is a weight coefficient that balances the relationship between complex grid structures and line flow impacts.

3.4. Flow Transfer Section Search Based on the Floyd Algorithm

The simple work on the identification of vulnerable transmission lines in the power grid has been discussed in detail by us in reference [28]. For further study, the main topic of this paper is how to search for the set of transmission lines that are susceptible to the shifting of the developing currents after the failure of vulnerable lines, which can be helped by the Floyd algorithm. Therefore, the research questions and motivations of the two papers are quite different. The traditional Floyd algorithm is used to search for the shortest line between two points. Its computational complexity is low, and the computation time has certain superiority. In this paper, the Floyd algorithm is improved, and the spatial similarity is used as the weight to weigh the line topology graph. Searching for the first k minimum weight path of the power grid is to find the power flow transfer section of the system. The improved algorithm can store all the power flow-influencing lines. The improvement of the Floyd algorithm based on the graph theory method mentioned above ensures that the flow section corresponding to each vulnerable line can be well selected. In addition, the overall computation time of the algorithm has also been greatly improved. The specific steps are shown in Algorithm 2.

Input: W, weight matrix
(1)Replace distance matrix D with matrix W.
(2)Remove the edges k=i, k=j and ωij = ∞.
(3)Use Floyd algorithm to find the shortest path and distance.
(4)Update distance matrix D and routing matrix R.
(5)If ωij < 0, stop.
(6)Else if k=n, stop.
(7)End if
(8)End if
(9)Eliminate the same number in each element of matrix R.
(10)Traverse all elements in matrix R. If the element in R is a unit group, traverse all elements in the unit group, and generate the shortest path corresponding to the number of elements. In this way, until all the shortest paths are generated.
Output: all shortest paths

For Step 2, assuming that there is no negative weight loop, the diagonal elements of the weight matrix W are all 0. If k = i or j, Wik+Wki = Wij is constant. If ωij = ∞ is not ruled out, then Wik+Wki ≡ Wij ≡ ∞. This holds for any equality and adds all k to the set without getting the desired result.

Note that for Step 3 and Step 4, as shown in Figure 4. If Wik+Wki<Wij occurs, let Wij = Wik+Wki and update the distance matrix to R(i, j) =R(i, k). For Wik+Wki = Wij, their weights are the same, so just update the routing matrix R. The resulting R is a unit group rather than a matrix, and the corresponding matrix changes are shown in Figure 5.

For Step 10, the number of elements in the first traversal unit group is denoted as ①, and the number of elements in the second traversal unit group is denoted as ②. According to this analogy, and until the end of the traversal, the shortest path number is ① × ② ×…

3.5. Key Transmission Section Screening

To judge whether the power flow transfer section is a key section, the influence degree of any branch disconnection on the remaining lines should be considered. Overloads or fault lines in power system are prone to power flow transfer and cascading failure when they are cut off. For line l, its active power can be calculated as follows:where Pl is the power before breaking; is the power variation after breaking; and is the line outage distribution factor and it is used to measure the proportion of line power flow transfer. can directly reflect the influence degree of power flow between lines. The greater its value, the more serious the impact. Its calculation formula is in reference [29].where is the mutual impedance between node k and node l, and is the self-impedance of node l. xk and xl are the elements of the reactance matrix X, which represents the reactance value of the line. Mk and Ml are the correlation matrices of the node.

To filter out branches with a great influence on power flow and obtain the LODF transmission section, the threshold is set to filter out the branches larger than the threshold in the first k minimum weight path.

The value of Dset is generally set according to expert experience, and the general value range is between 0.2 and 0.3 [30].

Select the transmission section with a small safety margin as a key section using the grid security margin. The calculation formula for the grid safety margin Mij is as follows:where Pij is the transmission power of the line and Pijmax is the power transmission limit of the line. Usually, the value of Mset is also determined by expert experience. When the safety margin of the line is less than the threshold, it means that the line is easily affected by the power flow transfer.

3.6. Key Section Identification Algorithm

Based on the above proposed vulnerable line search method and key transmission section screening method, the complete steps of the vulnerable line identification and key transmission section search method based on PMU data and graph theory are shown in Algorithm 3.

Input: PMU data and initial power flow
(1)Construct a grid topology diagram.
(2)Calculate the PTDF and its modulus.
(3)Calculate the power transmission efficiency .
(4)Construct an observation data matrix A(t) from PMU data.
(5)Calculate the total energy Ek(t) and energy fluctuation probability pk(t).
(6)Calculate the comprehensive evaluation indicator .
(7)Sort the vulnerable lines.
(8)Use the improved Floyd algorithm to search flow transfer section
(9)Calculate line outage distribution factor .
(10)Filter out the branch of .
(11)Calculate the safety margin Mij.
(12)Filter out the branches of Mij < 0.6.
Output: all key transmission sections.

4. Case Analysis

4.1. Vulnerable Line Identification

This paper selects an IEEE 39-bus system to verify the effectiveness of the method. System parameters are shown in reference [31]. The system has 39 bus bars and 46 transmission lines, and its structural topology is shown in Figure 6. The white points are generator nodes, and the black points are load nodes, and it is indicated that the initial power flow direction is calculated by matpower7.0. The computer configuration used in this paper is the Intel (R) core (TM) i7 with 8G memory, 128G SSD+1TB HDD. The operating system is Windows 10 64 bit, and all programs are run by using the Matlab R2020a.

According to the parameters of all nodes and branches in the IEEE 39-bus system, the PTDF value is calculated. The results of the line vulnerability assessment are shown in Figure 7. According to the above method and the data measured by PMU, the energy fluctuation probability of the line is calculated as shown in Figure 8.

The weight coefficient α of this paper is selected as 0.5. Actual values can be adjusted according to different situations. By the vulnerable line search method mentioned above, the system line vulnerability ranking is obtained. Table 1 shows the judgment indicators of the top 15 lines.

The top ten in Table 1 are the vulnerable transmission lines located in this paper. To prove the reliability of this method, the results of reference [32] and reference [33] are compared. Reference [32] uses the source load relationship and the line fault power overload to judge the vulnerability of the line from the two aspects of structure and state. In reference [33], the two types on the information on the kinetic energy of the branch potential energy are extracted for normalization, which are defined as transient vulnerability indicators. But there is no problem analysis in conjunction with the big data features of the grid in reference [32] and reference [33]. Table 2 shows the comparison results.

From the analysis of Table 2, the results of this method are basically consistent with those in reference [32] and reference [33], including seven lines 2-3, 16-17, 16–19, 3-4, 25-2, 25-26, 6–11, which indicates that this method is reasonable. Structurally, these branches are all located in the important transmission channels of the system. This paper considers line 2-3 as the most important transmission line, because it undertakes the main power transmission of generator 37 and generator 38. And also it involves the power transmission between node 3 and node 4. If overload protection occurs in line 2-3, generator 30 and load node 3 will be isolated, which will cause large-scale power flow transfer problem.

In addition, lines 5-6 and lines 10-11 are from the system topology. If disconnected, the normal operation of generator node 31 and node 32 will be affected. So they are judged as vulnerable lines. From the above results, the method mentioned in this paper is superior to the previous method in calculation accuracy. The uncertainty problem of the single indicator evaluation result is solved.

4.2. Key Transmission Section Search

According to the proposed method, the branch with comprehensive importance greater than 0.03 is selected to form the expected fault set. The lines are disconnected separately, and the corresponding top k least weight paths are found. In this paper, Dset is 0.3 and Mset is 0.6. Combined with the branch break distribution factor, the initial transmission section composed of lines greater than the set threshold is selected. Finally, the safety margin of the line in the section is calculated, and the key section is selected. The specific parameter results are shown in Table 3.

From Table 3, it shows that the tidal transfer sections corresponding to each vulnerable line are complex, and the branch connections in the sections are very high, which makes it easy to cause chain reaction when the fault occurs. Therefore, it is necessary to find the transmission section by identifying vulnerable lines. Using the power grid safety margin to screen out the transmission section can effectively exclude relatively safe lines and further screen key transmission sections. For example, for lines 7-8, the line outage distribution factor is large, indicating that its position in the grid structure is also relatively important. But its own safety margin is relatively large, indicating that the line-carrying capacity is strong. Therefore, it can be eliminated. For lines 19-20, the safety margin is 0.669, which is higher than the set threshold. But its power flow increment is 39.25 MW, and its correlation degree is not high in structure, which can be eliminated by the line outage distribution factor. Therefore, setting up multiple screening methods can effectively find lines with high correlation and vulnerability to the influence of tidal increments and ensure the good selection of key transmission sections.

Through the method of this paper, vulnerable power grid lines are found. The corresponding tidal transfer section is searched, and the lines in the section are further screened. Finally, it is found that the lines form the cut-off set of the power system with the vulnerable lines in the cross form the key transmission section. Table 4 shows the search results for key transmission sections. The key transmission section is represented by dotted lines, and its topology is shown in Figure 9.

From Figure 9, we can distinguish the position of each transmission section in the network. Combined with Table 4, it can be seen that disconnecting any of the lines will lead to a substantial increase in the load of other lines, resulting in serious cascading failures of the lines. In addition, when the working load of the system is large, the line in the key transmission section may also fail. Therefore, the key transmission section must be strictly monitored.

4.3. Comparison of Algorithm Calculation Time

The traditional key transmission section search method based on the graph theory generally adopts a traversal algorithm [34]. It uses the adjacency matrix of topological graph by the graph theory to identify the most serious transmission section through a simple matrix operation. But now, the new power grid structure is more complex; it will lead to inaccurate identification results, and the traversal time is also greatly increased. After fully considering the characteristics of the new power grid, the proposed method reconstructs the topology map. We set up a new shortest path search method, which significantly improves the traversal accuracy and time. The computation time of the algorithm is compared with reference [34] by performing tests on six different IEEE systems using the operating environment mentioned in Section 4.1, and the results are shown in Table 5 and Figure 10.

Analysis of the results in Table 5 and Figure 10 shows that the complexity of the system will greatly affect the computation time of the algorithm. For the system with more buses, the calculation time of the method proposed in reference [34] is obviously increased, and even a long unfinished calculation occurs when testing the IEEE 118-bus system. This method has obvious advantages and can quickly identify the key transmission section. The analysis of the proposed method is more comprehensive, and the improvement of the algorithm also greatly saves the calculation time. The characteristics of combining PMU also make the method more in line with online monitoring.

4.4. IEEE 14-Bus System Analysis

In order to demonstrate the applicability of the methodology of this paper, the IEEE 14-bus system is selected for the discussion, and its system structure is shown in Figure 11. The parameters of the system’s initial power flow are configured by matpower 7.0 simulation tool.

Based on the methodology mentioned in Section 2 and Section 3 of this paper, the results of the identified parameters of the vulnerable transmission line are obtained as shown in Figure 12 and Figure 13, and the detailed results are presented in Table 6.

According to the identification results of vulnerable transmission lines, their corresponding transmission sections and related parameters are calculated as shown in Table 7.

Based on the results of Table 7, the results of key transmission cross sections are screened with reference to (18) and (19), which are shown in Table 8.

In summary, it can be seen that the method of this paper can search the vulnerable transmission lines with their key transmission cross sections in different systems, which indicates that the method of this paper has a head of certain universality.

5. Conclusion

The structure of interconnected power systems is becoming more and more complex, and accurately locating the vulnerable transmission lines and their corresponding critical transmission sections can be of great help in preventing chain failures in power system. In this paper, a multilevel method for identifying key transmission sections in power systems is proposed, and the following conclusions are obtained.(1)The discrimination of vulnerable lines in the power system needs to fully consider the network topology and the carrying capacity of the lines themselves. Therefore, this paper proposes the first layer method: Constructing the grid topology map from the perspective of spatial visualization of PMU data. On this basis, two indicators, power transmission efficiency and energy fluctuation probability, are proposed to comprehensively assess the line vulnerability. The comprehensive indicators fully consider the two factors, making the results more accurate.(2)Transmission section is a collection of lines affected by chain faults caused by current transfer after the failure of vulnerable lines. In this regard, the second layer method of this paper is as follows: For the previous transmission cross-section mis-selection and leakage detection and long time-consuming problems, this paper improves the Floyd algorithm, which greatly improves the computational efficiency and algorithmic accuracy and realizes the precise positioning of the transmission cross-section corresponding to the vulnerable lines.(3)The key transmission section is the set of lines that should receive the most focused attention in the tidal shift section. In this paper, the third layer of the method: selecting the key transmission section based on two indicators: line tidal current distribution factor and line safety margin, which can give more accurate results.

The construction method of the grid topology diagram proposed in this paper has more advantages, and it can directly obtain the corresponding parameters, which can be used as a reference for the analysis of line power flow. The vulnerable transmission lines and their key transmission sections in this paper have certain significance for the analysis of power grid fault types and the transmission capacity of lines. In the future, a deep learning method can be introduced into the search of transmission sections to meet the section identification under multifault types.

Data Availability

Data used to support the findings of this study are made available upon reasonable request to the corresponding author.

Conflicts of Interest

The authors declare that there no conflicts of interest.

Acknowledgments

The work was supported by the Shandong University Key Laboratory of Power System Intelligent Dispatch and Control, Ministry of Education; Pyramid Talent Training Project of Beijing University of Civil Engineering and Architecture (JDYC20200324); Cultivation project Funds for Beijing University of Civil Engineering and Architecture under Grant (X23050); and National Natural Science Foundation of China (51407201).