Research Article
Key Transmission Section Search Based on Graph Theory and PMU Data for Vulnerable Line Identification in Power System
Table 1
Sorting of vulnerable lines.
| Sort | Branch | | p(k) | |
| 1 | 2-3 | 0.04571 | 0.0228 | 0.0343 | 2 | 6–11 | 0.04475 | 0.0227 | 0.0337 | 3 | 16-17 | 0.04392 | 0.0226 | 0.0333 | 4 | 16–19 | 0.04325 | 0.0226 | 0.0329 | 5 | 3-4 | 0.04240 | 0.0225 | 0.0325 | 6 | 25-26 | 0.04133 | 0.0225 | 0.0319 | 7 | 5-6 | 0.04095 | 0.02245 | 0.0317 | 8 | 10-11 | 0.04064 | 0.02245 | 0.0316 | 9 | 2–25 | 0.03983 | 0.0224 | 0.03111 | 10 | 10–13 | 0.03980 | 0.0224 | 0.0311 | 11 | 16–24 | 0.03745 | 0.02235 | 0.0299 | 12 | 15-16 | 0.03689 | 0.02235 | 0.0296 | 13 | 16–21 | 0.02859 | 0.02235 | 0.0255 | 14 | 4–14 | 0.0250 | 0.0223 | 0.0237 | 15 | 17–27 | 0.02230 | 0.0223 | 0.0223 |
|
|