Research Article
Key Transmission Section Search Based on Graph Theory and PMU Data for Vulnerable Line Identification in Power System
Table 2
Comparison of vulnerable lines.
| Sort | The method in this paper | Reference [32] | Reference [33] |
| 1 | 2-3 | 2-3 | 2-3 | 2 | 6–11 | 6–11 | 16–19 | 3 | 16-17 | 16–19 | 16-17 | 4 | 16–19 | 25-2 | 15-16 | 5 | 3-4 | 16-17 | 4–14 | 6 | 25-26 | 13-14 | 25-2 | 7 | 5-6 | 15-16 | 3-4 | 8 | 10-11 | 26-27 | 25-26 | 9 | 25-2 | 10–13 | 14-15 | 10 | 10–13 | 16–21 | 16–24 |
|
|