Identifying Weak Transmission Lines in Power Systems with Intermittent Energy Resources and DC Integration

: Nowadays, intermittent energy resources, such as wind turbines, and direct current (DC) transmission have been extensively integrated into power systems. This paper proposes an identifying method for weak lines of novel power systems with intermittent energy resources and DC lines integration, which aims to provide decision making for control strategies of novel power systems and prevent system blackouts. First, from the perspective of power system safety and stability, a series of risk indicators for the risk assessment of vulnerable lines is proposed. Then, lines in the system are tripped one by one. The calculation method for the proposed risk indicators is introduced. The impact of each line outage on system safety and stability can be fairly evaluated by these proposed risk indicators. On this basis, each risk assessment indicator is weighted to obtain a comprehensive risk assessment indicator, and then the risk caused by each line outage on the system can be quantified efficiently. Finally, the test system of a modified IEEE-39 bus system with wind farms and DC lines integration is used to verify the applicability of the proposed method, and the effectiveness of the proposed method is also demonstrated by comparing with existing methods.


Introduction
Recently, power system blackouts have occurred frequently around the world, causing huge economic losses and serious social impact [1][2][3].Research shows that catastrophic blackouts are usually initiated by failure of one or several components [4][5][6].These components can be called weak components or vulnerable components [7], including transmission lines, transformers, etc.Meanwhile, intermittent energy resources, such as wind turbines, and DC transmission have been extensively integrated into power systems, which makes the dynamic characteristics and operation mode of power systems more complex [8,9].The safe and stable operation of novel power systems is facing severe challenges due to their own development [10].In this case, once weak components of a novel power system fail, blackout accidents could be further exacerbated, and the system may face higher operation risk.To this end, identifying weak components of the novel power system with intermittent energy resources and DC integration is of great significance, which contributes to maintaining secure system operation and preventing system blackout.
Much research has been conducted on identifying the weak components of power systems.There are mainly two types of methods in the research field.The first type of research is based on complex network theory.This type of method uses the concept of degree and betweenness and combines with electrical characteristics to identify the weak components of power systems.The authors in [11] indicated that degree centrality methods The above research can fairly identify the vulnerable components of power systems but mainly focuses on traditional power systems.Nowadays, intermittent energy resources and DC transmission have been extensively integrated into novel power systems.The stochastic characteristic induced by intermittent energy output and the operational characteristic of DC transmission change the system operation mode overwhelmingly.The above vulnerable component identification method is not well applicable to novel power systems.Therefore, the integration of intermittent energy resources and their impact on vulnerable component identification has gradually become a hot topic.In [34], an electrical LeaderRank method is proposed to identify the important nodes in power grids, considering the renewable energy uncertainties and transmission power flow.In [35], a method for identifying vulnerable lines based on the theory of topological potential is proposed, which can consider wind power uncertainty.The proposed index comprehensively considers the in-degree and out-degree topological potentials of nodes and uses the entropy weight method for weight allocation.
In summary, the current weak component identification research of novel power systems with renewable energy and DC integration is relatively lacking.Moreover, rarely has the literature considered the impacts of renewable energy and DC on power system vulnerable component identification simultaneously.The stochastic characteristic of renewable energy output and the operational characteristic of DC transmission need to be considered synchronously.Furthermore, the current research method based on power system operation condition mainly uses the tool of power flow calculation to identify vulnerable components, which focuses on the steady state of the system.The dynamic characteristic of the system is less considered, which makes it hard to reflect the impacts of vulnerable components on power systems comprehensively.
Therefore, a novel identifying method for weak components of novel power systems with intermittent energy sources and DC integration is proposed in this paper, which aims to prevent novel power system blackouts.It is worth mentioning that references to vulnerable components in this paper mainly refer to vulnerable lines.Firstly, a series of risk assessment indexes consisting of power system security and stability is proposed, which can quantify the system risk due to vulnerable line outage in a comprehensive fashion.Then, a comprehensive weight method based on game theory is adopted.A comprehensive risk assessment indicator can be obtained by weighting each risk assessment indicator, which can determine the vulnerability of each line in power systems.Finally, the proposed method is tested in an improved IEEE 39 bus system with wind farms and AC/DC interconnection.
The rest of this paper is organized in the following manner.Section 2 proposes an overall risk assessment index system for the vulnerable lines.Section 3 details the calculation process of the proposed risk assessment index system.In Section 4, a comprehensive risk assessment index of vulnerable lines is proposed based on game theory.In Section 5, a modified IEEE 39 bus system which is integrated into wind farms and DC is used to test the proposed method.The software Matlab 2020b is used to test the proposed method.Section 6 concludes the whole paper.

Risk Assessment Index System of Vulnerable Lines
The security and stability of power systems are always the important indexes to evaluate the operation state of the system.Therefore, this paper proposes six risk indicators to evaluate the vulnerability of each line from the perspective of safety and stability of system operation for a novel power system.Among them, the safety indicators include the bus voltage violation index (VVI), line overload index (LOI), and static security index (SSI).The stability indexes consist of static frequency stability (SFS), static rotor angle stability (SRAS), and static voltage stability (SVS).These risk indexes are shown in Figure 1.The security indicators defined in this paper are mainly used to evaluate whether the bus voltage and line transmission power of the system are within the security constraints after each line outage.If these security indicators exceed their security constraints, the system will be at high risk.Therefore, it is necessary to define such indicators to evaluate the impact of each line outage on system security.The stability indexes defined in this paper mainly focus on the static stability of the system, that is, the stable operation ability of the system under small disturbance after each line outage.The power system is constantly suffering from small disturbances.Therefore, ensuring the stable operation of the system under small disturbances is the most basic operating premise that the system should meet at all times.Once the system cannot achieve stable operation under small disturbances, the system will collapse and be difficult to recover.As for the stable operation ability under a large disturbance, it is not considered in this paper.The reason is that the system has basic stable operation ability when it meets stable operation under a small disturbance.If a large disturbance occurs, it can also be dealt with in time by stability control measures, such as generator/load shedding control [36] and DC modulation [37].Therefore, although it is very meaningful to check the stable operation ability under a large disturbance, it is not an index that must be checked compared with the stability under a small disturbance.In order to comprehensively evaluate the influence of each line outage on the system stability, this paper establishes three small disturbance stability indexes, i.e., frequency stability, rotor angle stability, and voltage stability.With the access to a high proportion of renewable energy and DC, these three stability problems are more prominent.If any stability index does not meet stability constraints, the system will have a high risk of losing stability.Therefore, it is necessary to verify these three stability indexes at the same time to better apply them to the risk assessment of vulnerable lines for the novel power system.

Bus Voltage Violation and Line Overload Index
The bus voltage violation and line overload risk of the novel power system with renewable energy and DC injection after a line outage can be obtained by power flow calculation.Therefore, it is necessary to study the power flow calculation method for the novel power system with renewable energy and DC access.The power flow equation of the AC/DC interconnected system needs to be augmented on the basis of the traditional power flow equation of the AC system [38]: where S is the power injection vector of each bus including the active and reactive power injection of each bus; X is the bus state vector, including the phase angle and voltage amplitude of each bus; d is the DC converter equation, DC network equation, and DC control equation; D = [Vd, Id, KT, cosθd, φd] T is the relevant parameters of the DC side, including DC voltage, DC current, control angle, converter transformer ratio, and converter power factor angle; JD is the Jacobian matrix of the AC/DC interconnected system; J is the The security indicators defined in this paper are mainly used to evaluate whether the bus voltage and line transmission power of the system are within the security constraints after each line outage.If these security indicators exceed their security constraints, the system will be at high risk.Therefore, it is necessary to define such indicators to evaluate the impact of each line outage on system security.The stability indexes defined in this paper mainly focus on the static stability of the system, that is, the stable operation ability of the system under small disturbance after each line outage.The power system is constantly suffering from small disturbances.Therefore, ensuring the stable operation of the system under small disturbances is the most basic operating premise that the system should meet at all times.Once the system cannot achieve stable operation under small disturbances, the system will collapse and be difficult to recover.As for the stable operation ability under a large disturbance, it is not considered in this paper.The reason is that the system has basic stable operation ability when it meets stable operation under a small disturbance.If a large disturbance occurs, it can also be dealt with in time by stability control measures, such as generator/load shedding control [36] and DC modulation [37].Therefore, although it is very meaningful to check the stable operation ability under a large disturbance, it is not an index that must be checked compared with the stability under a small disturbance.In order to comprehensively evaluate the influence of each line outage on the system stability, this paper establishes three small disturbance stability indexes, i.e., frequency stability, rotor angle stability, and voltage stability.With the access to a high proportion of renewable energy and DC, these three stability problems are more prominent.If any stability index does not meet stability constraints, the system will have a high risk of losing stability.Therefore, it is necessary to verify these three stability indexes at the same time to better apply them to the risk assessment of vulnerable lines for the novel power system.

Bus Voltage Violation and Line Overload Index
The bus voltage violation and line overload risk of the novel power system with renewable energy and DC injection after a line outage can be obtained by power flow calculation.Therefore, it is necessary to study the power flow calculation method for the novel power system with renewable energy and DC access.The power flow equation of the AC/DC interconnected system needs to be augmented on the basis of the traditional power flow equation of the AC system [38]: where S is the power injection vector of each bus including the active and reactive power injection of each bus; X is the bus state vector, including the phase angle and voltage amplitude of each bus; d is the DC converter equation, DC network equation, and DC control equation is the relevant parameters of the DC side, including DC voltage, DC current, control angle, converter transformer ratio, and converter power factor angle; J D is the Jacobian matrix of the AC/DC interconnected system; J is the Jacobian matrix of the traditional AC system; A, C, and F are the corresponding augmented Jacobian matrix elements after increasing the DC related variables.The calculation process of specific parameters in (1) is detailed in [38].
Then, the probabilistic AC/DC power flow calculation with renewable energy is studied.The most direct probabilistic power flow calculation method is the Monte Carlo method (MCS).This method has high accuracy, but the calculation is time-consuming [39].The risk assessment method of vulnerable lines proposed in this paper aims to provide decision making for preventive control.The vulnerability of all lines in the system needs to be evaluated before the risk really occurs.Although the time required is relatively abundant, it still needs to ensure a certain rapidity in calculation efficiency.Therefore, this paper proposes an analytical-method-based probabilistic AC/DC power flow calculation method, which can greatly improve the computational efficiency of risk assessment while satisfying the calculation accuracy.One of the difficulties in probabilistic power flow calculation based on an analytical method is how to establish a probabilistic model that can accurately describe the randomness of renewable energy.In this paper, the Gaussian mixture model (GMM) is used to establish the probability model of renewable energy injection.GMM can accurately model the probability distribution of random variables through the convex combination of multiple Gaussian distributions: where W is the vector composed of the output power of w wind farms; f (W) is the probability density function of W; N m (W) is the probability density function of the mth Gaussian component; M is the number of Gaussian components; ω m , µ m , and Σ m are the weight coefficient, mean vector, and covariance matrix of each Gaussian component, respectively, which are usually solved by the maximum expectation algorithm [40].By linearizing the line power flow equation at the reference operating point, the linear expression between the line transmission power and the injected power of each bus can be obtained: where Z is the line power flow column vector, including the active and reactive power of a transmission line; the subscript 0 represents the base operating point.Equations ( 1) and ( 4) are linear expressions between bus state variables, line transmission power variables, and bus injection power, respectively.For ease of the following description, the two equations are simplified to a general linear expression: where the element in Y represents the bus state variable and branch power flow variable, which contains y variables; K 1 and B 1 represent the corresponding coefficient matrices.The output of wind farms in S has been modeled by GMM, which is weighted by multiple Gaussian distributions with a mean of µ m and a variance of Σ m .The random variables that obey the Gaussian distribution still obey the Gaussian distribution after linear transformation [40].Thus, it can be obtained from linear Equation ( 5) that each Gaussian component of the variable Y obeys the Gaussian distribution with a mean of K 1 µ m + B 1 and a variance of From the total probability in Equation ( 7), the cumulative probability distribution function of multiple subcomponents is weighted according to the weight calculated by (3).Finally, the probability distribution function of random variables in Y is obtained as follows: where P(Y) is the probability of occurrence of the state variable corresponding to the mth subcomponent.For the novel power system with renewable energy and DC access, when there is a line outage, it may cause the bus voltage or line power to exceed their limits.
In order to quantify these risks, the probability distribution of wind farm output can be obtained by GMM.Then, through the above process, the probability distribution function of each bus state variable and line power variable of the system after the line outage can be quickly solved.By setting the critical values of voltage violation and line overload, the probability of voltage violation of each bus and overload of each line after there is a line outage can be obtained by (8).Then, the severity of voltage violation and the severity of line overload are defined as follows: where U max i and U min i are the upper and lower limits of the voltage amplitude of bus i; U i is the most serious value of bus i voltage amplitude during the fluctuation of renewable energy which can be calculated by probabilistic AC/DC power flow.P ij,max is the transmission power limit of line ij.P ij is the maximum value of the transmission power of the line ij with the fluctuation of the renewable energy output, which can also be calculated by the probabilistic AC/DC power flow.Both indicators take the most serious situation when defining the severity.Therefore, the risk of bus voltage violation and line overload caused by a line outage can be obtained as follows: where n 1 is the number of system buses; n 2 is the number of rest lines after a line outage; P(U i ) is the probability of voltage exceeding limits; P(L i ) is the probability of line overload.

Static Security Index
The static security analysis of power systems refers to the application of the N − 1 principle.Each line needs to be tripped one by one without fault to check whether line overload and voltage violation occur.Then, the structural strength and operation mode of power systems can be checked.In the risk assessment of vulnerable lines in this paper, when there is a line outage, the N − 1 principle is used to trip remaining lines one by one without fault.Equations ( 11) and ( 12) are used to solve the bus voltage violation risk and line overload risk, respectively.Finally, the two risk results are added, as there is a risk of losing the static security of the system after a line outage, shown as follows: Energies 2024, 17, 3918 7 of 18

Static Frequency Stability Index
The eigenvalue analysis method based on the power system linearization model and electromechanical transient simulation are two common tools for small signal frequency stability calculation [41].In order to improve computational efficiency, this paper will use the eigenvalue analysis method and propose a calculation method of static frequency stability eigenvalues based on an analytical method.
There is a certain function between the eigenvalues of the power system and the output of renewable energy.However, the function is generally nonlinear and difficult to clarify.Because it is a small disturbance analysis, a linear expression can be used to approximately characterize the function [42].It is assumed that there are K eigenvalues in the novel power system, and the kth eigenvalue is λ k = ξ k + jω k .The function between the system eigenvalue and the output power of the wind farm can be linearized at the reference operating point, and then the linear relationship is shown as follows: where W i denotes the output power of the ith wind farm; ∂λ k /∂W i is the sensitivity of the kth eigenvalue of the system to the output power of the ith wind farm, which can be solved by numerical method: The linear relationship between the eigenvalue of the system and the output power of the wind farms is established by (14) and (15).The probability distribution of the output power of wind farms has been modeled by GMM, which is weighted by multiple Gaussian distributions with a mean value of µ m and a variance of Σ m .Similar to the derivation in Section 3.1, since the Gaussian distribution still obeys the Gaussian distribution after linear transformation, each Gaussian subcomponent of the eigenvalue probability distribution should obey the Gaussian distribution with a mean value of K 2 µ m + B 2 and a variance of , where K 2 and B 2 are the coefficient matrices of the linear expression obtained by (15), respectively.Thus, the cumulative distribution function of the Gaussian subcomponent is shown in (16).Then, through the total probability in Equation ( 7), the probability distribution function expression of the novel power system eigenvalue can be obtained as follows: When the real part of the eigenvalue is greater than 0, the system's static frequency will lose stability.Therefore, the probability P(SFS) of the static frequency instability can be obtained by (17).When static frequency instability occurs, the severity Sev(SFS) is defined as 1, and then the risk of static frequency instability of the system after a line outage can be defined as follows: R SFS = P(SFS) × Sev(SFS) Energies 2024, 17, 3918 8 of 18

Static Rotor Angle Stability Index
Similar to the analysis in Section 3.3, there is also a non-explicit function between the static stability power limit of any generator and the output power of wind farms.Because it is a small disturbance analysis, the function relationship can be linearized at the reference operating point, and the linear expression of the static stability power limit of any generator and the output power of a wind farm can be obtained: where P max,i is the static power limit of the ith generator; W k represents the output power of the kth wind farm; ∂P max,i /∂W k is the sensitivity of the static stability power limit of the ith generator to the output power of the kth wind farm.Similarly, the sensitivity can be calculated by numerical method: The linear relationship between the static stability power limit of generators and the output power of wind farms is established by (19) and (20).Similar to the derivation in Section 3.3, the probability distribution of the output power of wind farms has been modeled by GMM.After the linear transformation of (19), each Gaussian subcomponent of the probability distribution of the static stability power limit of the generator should obey the Gaussian distribution with a mean of K 3 µ m + B 3 and a variance of K 3 Σ m K 3 T , where K 3 and B 3 are the coefficient matrices of the linear expression obtained by (20).Then, using the total probability in Equation ( 7), the final probability distribution of the static stability power limit of each generator can be obtained as follows: The Chinese standard [41] stipulates that the static power angle stability reserve coefficient should not be less than 10% after fault.The equation is as follows: where P 0,i is the output power of the ith generator under normal operation; K P,i is the static rotor angle stability reserve coefficient of the ith generator.Through Equation ( 22), the minimum value of the static stability power limit satisfying the standard can be obtained.Then, through the probability distribution function (21) of the static stability limit power, the probability P(K P,i ) of the static rotor angle stability reserve coefficient of less than 10% can be obtained.The severity of static rotor angle instability is defined as follows: where K P,i,min is the minimum value that the static stability limit power of ith generator may reach during the power fluctuation of wind farms, i.e., the most serious situation is considered as the severity of static rotor angle instability.Therefore, when there is a line outage, the static rotor angle instability risk of the system is defined as follows: where n 3 is the number of generators.

Static Voltage Stability Index
The static voltage stability calculation can be solved by gradually increasing loads to estimate the critical point of voltage instability of the current operating point.The static voltage stability reserve coefficient is shown as follows: where K U,i is the static voltage stability reserve coefficient of the ith bus; U 0,i is the voltage amplitude of the ith bus under normal operation; U cr,i is the critical point of voltage instability at the ith bus.
For the novel power system with renewable energy and DC access, when there is a line outage, this paper will gradually increase the load of each bus and calculate the probability distribution of the critical point of voltage instability of each bus through the probabilistic AC/DC power flow of ( 6)- (8).The Chinese standard stipulates that the static voltage stability reserve should not be less than 8% at the post-fault operation mode [41].Through the probability distribution of the critical voltage of each bus and ( 25), the probability P(K U,i ) that the static voltage stability reserve coefficient of the system does not meet the operation requirements can be solved.Then, the severity function of static voltage instability is defined as follows: where K U,i,min is the minimum value that the static voltage stability reserve coefficient may reach during the fluctuation of renewable energy output, i.e., the most serious situation deviating from the security constraint is used as the severity of the index.Therefore, the risk of static voltage instability caused by a line outage can be defined as follows:

Comprehensive Risk Assessment Index of Vulnerable Lines
In this paper, six risk assessment indexes are defined to identify vulnerable lines from the perspective of system security and stability for the novel power system.When there is a line outage, the vulnerability of the line is evaluated by calculating the six indicators, respectively.On this basis, in order to comprehensively evaluate the vulnerability of each line, it is necessary to integrate these assessment indicators.In this paper, the comprehensive weight method based on game theory is used to weight these risk indicators.
Firstly, the magnitude and dimension of the six indicators need to be unified, and then they need to be weighted.The comprehensive risk evaluation index R c of vulnerable lines is obtained by weighting each index.
Here, α 1 to α 6 are the weights of each risk index; the upper line represents the normalized risk index.The weight calculation process using the comprehensive weighting method based on game theory is as follows [43]: (1) The subjective weight B 1 of each risk index is obtained based on the analytic hierarchy process, and the objective weight B 2 of each risk index is obtained based on the entropy weight method.The weights of the two methods are linearly combined to obtain the weight B = β 1 B 1 + β 2 B 2 of the comprehensive weighting method, where β 1 and β 2 are the comprehensive weight combination coefficients.
(2) In order to minimize the deviation between the comprehensive weight and each basic weight, it is necessary to establish the corresponding optimization objective to optimize the coefficient β 1 and β 2 .
(3) According to the differential properties of matrices, Equation ( 29) can be transformed into: The comprehensive weights β 1 and β 2 can be obtained by substituting the solved weights B 1 and B 2 into (30), and then the comprehensive weight B obtained by the comprehensive weighting method based on game theory can be solved by the linear combination in step (1).
Based on the above analysis, for the novel power system, each line in the system is tripped one by one, and each risk assessment index defined is calculated separately.All risk indicators are weighted by the comprehensive weighting method to obtain a comprehensive risk assessment index.The vulnerability of each line is assessed according to the level of the comprehensive risk assessment index.When there is a line outage, the higher the comprehensive risk assessment index, the greater the system risk caused by the line outage, the more important the line in the system, and the more vulnerable the line.

Simulation Tests
An improved IEEE 39 bus system with wind farms and DC access was used as a test system to verify the applicability of the method proposed in this paper.The system structure is shown in Figure 2. The original synchronous generators of busses 32, 34, and 38 are replaced by wind farms.It is assumed that the installed capacity of each wind farm is 650 MW, 500 MW, and 450 MW, respectively, and the total permeability of renewable energy is about 33%.The original AC line L3-18 is replaced by the LCC-HVDC line, in which bus 3 is the rectifier station and bus 18 is the inverter station.The constant ratio and constant current control are used for rectifiers, and the constant ratio and constant control angle are used as inverters.The constant power model is used in the simulation test, and the total load power of the system is 6150 MW.The wind turbine is regarded as a power source.All synchronous generators apply the classical model with a first-order governor model.Firstly, the probabilistic AC/DC power flow calculation method based on the analytical method proposed in this paper is used to calculate the bus voltage violation and line overload risk after each line outage.Taking line L1-2 as an example, when it is tripped, the probability distribution of each bus voltage and each line power can be determined by using the probabilistic AC/DC power flow calculation method proposed in this paper.The probability distribution of the bus voltage amplitude of bus 22 and the probability distribution of the active power on line L16-19 are shown in Figure 3.At the same time, the probabilistic AC/DC power flow is also calculated by MCS to verify the accuracy of the proposed probabilistic power flow method.In Figure 3, the red curve is the result obtained by MCS, and the blue curve is t result obtained by the analytical method proposed in this paper.It can be seen that t results obtained by the two methods are very close.In terms of calculation time, the pr posed method takes 0.43 s and MCS takes 97 s, indicating that the proposed meth greatly improves the calculation efficiency while satisfying the calculation accuracy.
Based on the probability distribution of the bus voltage and line power, the risk system voltage violation and line overload after each line outage can be obtained by ( 9) (12), as shown in Figures 4 and 5.
In Figure 4, the risk of bus voltage violation and line overload occur after some lin are tripped.According to the risk level, the top 10 lines that cause voltage violation ri and line overload risk are selected, respectively, as shown in Table 1.In Figure 3, the red curve is the result obtained by MCS, and the blue curve is the result obtained by the analytical method proposed in this paper.It can be seen that the results obtained by the two methods are very close.In terms of calculation time, the proposed method takes 0.43 s and MCS takes 97 s, indicating that the proposed method greatly improves the calculation efficiency while satisfying the calculation accuracy.

Cumulative distribution function (CDF)
Based on the probability distribution of the bus voltage and line power, the risk of system voltage violation and line overload after each line outage can be obtained by ( 9) to (12), as shown in Figures 4 and 5.In Figure 4, the risk of bus voltage violation and line overload occur after some lines are tripped.According to the risk level, the top 10 lines that cause voltage violation risk and line overload risk are selected, respectively, as shown in Table 1.In Figure 5, the outage of each line has impacts on the static security of the syste According to the risk level, the top 10 lines are ranked as shown in Table 2.Among the L25-26, L9-39, and L8-9 are the top three lines, indicating that these lines have the greate impact on the static security of the power system once there is an outage.They are t most vulnerable lines in the static security index.The risk of static frequency instability of the system after each line outage is assesse Through ( 14)-( 17), the probability distribution of system eigenvalues during the fluctu tion of wind farm outputs can be obtained, respectively.Then, the static frequency inst bility risk of the system after each line outage can be obtained by (18), as shown in Figu 6.From Figure 6, only when there is an outage in L25-26, the system will have the ri  In Table 1, the risk of voltage violation caused by the outage of L15-16, L25-26, and L9-39 is 0.1556, 0.1371, and 0.1046, respectively, ranking the top three in all lines.If these lines are attacked and tripped, the system will have a high risk of voltage violation.In the line overload risk index, the outage of L25-26 and L20-34 is more likely to cause an overload of other lines in the system, indicating that these lines are more important and vulnerable in the line overload risk index.After there is an outage in some lines, such as L1-2 and L16-24, the risk of bus voltage violation and line overload is zero, indicating that these lines are not important lines in the system under these two indicators.Even if they are attacked, they will not cause the risk of voltage violation and line overload.
The static security of the system after each line outage is assessed.When there is an outage in each line, the remaining lines are tripped one by one by using the N − 1 principle.The static security risk of the system after each line outage is solved by (13), as shown in Figure 5.
In Figure 5, the outage of each line has impacts on the static security of the system.According to the risk level, the top 10 lines are ranked as shown in Table 2.Among them, L25-26, L9-39, and L8-9 are the top three lines, indicating that these lines have the greatest impact on the static security of the power system once there is an outage.They are the most vulnerable lines in the static security index.
The risk of static frequency instability of the system after each line outage is assessed.Through ( 14)-( 17), the probability distribution of system eigenvalues during the fluctuation of wind farm outputs can be obtained, respectively.Then, the static frequency instability risk of the system after each line outage can be obtained by (18), as shown in Figure 6.The risk of static frequency instability of the system after each line outage is assessed.Through ( 14)-( 17), the probability distribution of system eigenvalues during the fluctuation of wind farm outputs can be obtained, respectively.Then, the static frequency instability risk of the system after each line outage can be obtained by (18), as shown in Figure 6.From Figure 6, only when there is an outage in L25-26, the system will have the risk of static frequency instability, indicating that L25-26 is the most vulnerable line in the From Figure 6, only when there is an outage in L25-26, the system will have the risk of static frequency instability, indicating that L25-26 is the most vulnerable line in the static frequency stability risk index.When the line is attacked, it is prone to causing static frequency instability of the system.
The risk of static rotor angle instability of the system after each line outage is evaluated.Through ( 19)-( 21), the probability distribution of the static stability limit of each generator after each line outage can be obtained, and then through ( 22)-( 24), the risk that the static rotor angle stability reserve coefficient of the system does not meet the operation requirements is determined, as shown in Figure 7.
Energies 2024, 17, x FOR PEER REVIEW 14 of 19 static frequency stability risk index.When the line is attacked, it is prone to causing static frequency instability of the system.The risk of static rotor angle instability of the system after each line outage is evaluated.Through ( 19)-( 21), the probability distribution of the static stability limit of each generator after each line outage can be obtained, and then through ( 22)-( 24), the risk that the static rotor angle stability reserve coefficient of the system does not meet the operation requirements is determined, as shown in Figure 7.In Figure 7, the outage of some lines leads to insufficient static rotor angle stability reserve in the system.The top 10 lines are shown in Table 3.Among them, lines such as L15-16, L2-25, and L9-39 are the most vulnerable lines in the static rotor angle stability index.When they are attacked, the system is prone to static rotor angle instability.In Figure 7, the outage of some lines leads to static rotor angle stability reserve in the system.The top 10 lines are shown in Table 3.Among them, lines such as L15-16, L2-25, and L9-39 are the most vulnerable lines in the static rotor angle stability index.When they are attacked, the system is prone to static rotor angle instability.The risk of static voltage instability in the system after each line outage is evaluated.By tripping each line of the system one by one, the probability distribution of the critical value of voltage instability for each bus is assessed by probabilistic power flow.Then, the risk of static voltage instability is calculated by ( 25)-( 27), as shown in Figure 8.In Figure 7, the outage of some lines leads to insufficient static rotor angle stability reserve in the system.The top 10 lines are shown in Table 3.Among them, lines such as L15-16, L2-25, and L9-39 are the most vulnerable lines in the static rotor angle stability index.When they are attacked, the system is prone to static rotor angle instability.The risk of static voltage instability in the system after each line outage is evaluated.By tripping each line of the system one by one, the probability distribution of the critical value of voltage instability for each bus is assessed by probabilistic power flow.Then, the risk of static voltage instability is calculated by ( 25)-( 27), as shown in Figure 8. From Figure 8, the static voltage stability reserve of the system does not meet the operation requirements due to the outage of some lines, and there is a certain risk of static voltage instability.Taking the top 10 risk lines as shown in Table 4, the outages of L2-25, L25-26, and other lines have the greatest impact on static voltage stability.When they are attacked, they are very likely to cause static voltage instability in the system.Through the above simulation results, the influence of line outage on system security and stability is evaluated.The vulnerability of each line under each risk assessment index is obtained.In order to finally obtain the vulnerability of each line, the gametheory-based comprehensive weighting method is used to weight multiple indicators to form a comprehensive risk index to evaluate the vulnerability of each line.Firstly, the results of each index are normalized, and the subjective weight B 1 = [0.0859,0.0650, 0.1508, 0.2790, 0.2097, 0.2097] of each index is solved by analytic hierarchy process.The objective weight B 2 = [0.1823,0.1657, 0.0430, 0.3637, 0.1603, 0.0849] of each index is obtained by entropy weight method, and β 1 = 0.2945, β 2 = 0.7597 is obtained by (30).Then, the comprehensive weight of each index is B = [0.1638,0.1450, 0.0771, 0.3585, 0.1836, 0.1263].The normalized risk assessment index results are weighted according to the comprehensive weight B. Finally, the comprehensive risk of each line outage on the system's security and stability can be obtained as shown in Figure 9.
index are normalized, and the subjective weight B1 = [0.0859,0.0650, 0.1508, 0.2790, 0.2097, 0.2097] of each index is solved by analytic hierarchy process.The objective weight B2 = [0.1823,0.1657, 0.0430, 0.3637, 0.1603, 0.0849] of each index is obtained by entropy weight method, and β1 = 0.2945, β2 = 0.7597 is obtained by (30).Then, the comprehensive weight of each index is B = [0.1638,0.1450, 0.0771, 0.3585, 0.1836, 0.1263].The normalized risk assessment index results are weighted according to the comprehensive weight B. Finally, the comprehensive risk of each line outage on the system's security and stability can be obtained as shown in Figure 9.In Figure 9, the top 10 risk lines are shown; they are shown in Table 5 according to the risk ranking.From the perspective of system security and stability, L25-26 has the highest importance in the system.When there is an outage, it has the greatest impact on system security and stability, and it is the most important and vulnerable line in the system.Compared with L25-26, the importance of lines such as L9-39, L8-9, L15-16, and L2-25 is second, but they are also relatively vulnerable lines in the system.Once they experience an outage, it will also have a great impact on the security and stability of the system.In Figure 9, the top 10 risk lines are shown; they are shown in Table 5 according to the risk ranking.From the perspective of system security and stability, L25-26 has the highest importance in the system.When there is an outage, it has the greatest impact on system security and stability, and it is the most important and vulnerable line in the system.Compared with L25-26, the importance of lines such as L9-39, L8-9, L15-16, and L2-25 is second, but they are also relatively vulnerable lines in the system.Once they experience an outage, it will also have a great impact on the security and stability of the system.By assessing the vulnerable lines in the system, it can provide a decision-making basis for the control strategy that can prevent power systems from blackouts.For example, in the simulation test, the defense of vulnerable lines such as L25-26 and L9-39 can be strengthened.From the perspective of power system operation, corresponding control measures and contingency plans can be formulated and implemented according to these vulnerable lines, so that the system can still maintain safe operation even if these vulnerable lines experience an outage.
In order to further demonstrate the effectiveness of the proposed method, the method proposed in [25] is used to compare with the proposed method in this paper.The authors in [25] also identified the weak lines of the system by defining a variety of vulnerability indicators, such as topology indexes based on network structure and indexes based on power flow calculation.Moreover, these indexes proposed in [25] are also weighted to form a comprehensive index to identify vulnerable lines of power systems.Therefore, [25] could be regarded as representative enough to compare with the proposed method in this paper.The vulnerable lines that rank in the top 10 obtained by the proposed method in this paper and [25] are shown in Table 6.From Table 6, the method in this paper is the same as the method proposed in [25] to identify a total of five lines in the set of vulnerable lines.The most vulnerable line obtained by [25] is L16-19, which is the same as the results obtained by the proposed method.The indexes proposed in [25] contain power transfer characteristics.Thus, lines that are prone to inducing line overload after an outage such as L25-26, L22-35, and L2-30 are more vulnerable than other lines.Meanwhile, the indexes proposed in [25] also contain topology connectivity.Some lines such as L2-30, L22-35, and L10-32 are more vulnerable than other lines since the outage of these lines will make some generators split from the system, which damages the topology connectivity of the system.This paper assumes that the generator on the swing bus has enough capacity.Although these line outages will unbalance the system power, the swing bus will regulate the power to keep the system power balanced.Therefore, in this paper, the outage of these lines does not cause severe problems (such as static rotor angle instability, etc.) other than triggering overloading of the lines connected to the swing bus.These lines are not the most vulnerable lines in this paper.Furthermore, for L9-39, its vulnerability ranks second in this paper but does not rank in the top 10 in [25], indicating that the line is not vulnerable after identification in [25].However, although the impact of L9-39 outage on line overload is small, its outage will cause static rotor angle instability and static voltage instability in this paper, which will cause severe operation issues for power systems.However, it cannot be well reflected by [25].In contrast, the indicators proposed in this paper can assess the security and stability of the system simultaneously.These indexes are always the most important indexes for power systems, which can give more comprehensive and effective identification for vulnerable lines than existing methods.

Conclusions
This paper proposes an identification method for weak transmission lines of power systems with intermittent energy resources and DC integration, which aims to provide a decision-making basis for control strategies and contingency plans.Firstly, this paper proposes a series of risk assessment index systems from the perspective of the security and stability of the novel power system.In terms of security, the influences of outages in each line on the electrical quantities such as bus voltage and line power are evaluated.In terms of stability, from the perspective of system static stability, three risk indicators of static rotor angle stability, static voltage stability, and static frequency stability are defined, respectively.The proposed risk assessment indicators aim at comprehensively quantifying the impact of each line outage on system stability.Then, the game-theory-based comprehensive weighting method is used to weight the results of each risk index to form a comprehensive risk evaluation index to evaluate the impact of each line outage on the system.Finally, the effectiveness of the proposed method is tested by the improved IEEE-39 bus system with renewable energy and DC lines integration.Meanwhile, the proposed method is compared with the current method.The simulation test results show that vulnerable lines of novel power systems can be evaluated effectively by the proposed method.

Figure 4 .
Figure 4. Risk of voltage violation and line overload after each line outage: (a) bus voltage viola risk; (b) line overload risk.

Figure 4 .
Figure 4. Risk of voltage violation and line overload after each line outage: (a) bus voltage violation risk; (b) line overload risk.

Figure 5 .
Figure 5. Static security after each line outage.

Figure 6 .
Figure 6.Static frequency stability after each line outage.

Figure 5 .
Figure 5. Static security after each line outage.

Figure 6 .
Figure 6.Static frequency stability after each line outage.

Figure 6 .
Figure 6.Static frequency stability after each line outage.

Figure 7 .
Figure 7. Static rotor angle stability after each line outage.

Figure 7 .
Figure 7. Static rotor angle stability after each line outage.

Figure 7 .
Figure 7. Static rotor angle stability after each line outage.

Figure 8 .
Figure 8. Static voltage stability after each line outage.

Figure 9 .
Figure 9. Comprehensive index after each line outage.

Figure 9 .
Figure 9. Comprehensive index after each line outage.

Table 1 .
Risk sorting for voltage violation and line overload.
Risk of bus voltage violation

Table 2 .
Risk sorting for static security.

Table 1 .
Risk sorting for voltage violation and line overload.

Table 2 .
Risk sorting for static security.

Table 2 .
Risk sorting for static security.

Table 3 .
Risk sorting for static rotor angle stability.

Table 3 .
Risk sorting for static rotor angle stability.

Table 3 .
Risk sorting for static rotor angle stability.

Table 4 .
Risk sorting for static voltage stability.

Table 5 .
Sorting for comprehensive assessment index.