Next Article in Journal
The Impact of Oil Price on Carbon Dioxide Emissions in the Transport Sector: The Threshold Effect of Environmental Policy Stringency
Previous Article in Journal
Evaluation Method for Voltage Regulation Range of Medium-Voltage Substations Based on OLTC Pre-Dispatch
Previous Article in Special Issue
Distribution System State Estimation Based on Power Flow-Guided GraphSAGE
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Identification and Evaluation of Vulnerable Links in a Distribution Network with Renewable Energy Source Based on Minimum Discriminant Information

1
Electric Power Research Institute, State Grid Liaoning Electric Power Co., Ltd., Shenyang 110055, China
2
State Grid Liaoning Electric Power Co., Ltd., Shenyang 110006, China
3
School of Information Science and Engineering, Northeastern University, Shenyang 110819, China
*
Author to whom correspondence should be addressed.
Energies 2024, 17(17), 4495; https://doi.org/10.3390/en17174495
Submission received: 17 July 2024 / Revised: 27 August 2024 / Accepted: 2 September 2024 / Published: 7 September 2024
(This article belongs to the Special Issue Optimizing Power Quality in Smart Grid Systems)

Abstract

With the increase in the proportion of photovoltaic and wind power access, the scale and form of distribution networks are becoming more and more complex. The traditional single distribution network vulnerability assessment method is difficult to use to identify the vulnerable links in the distribution network. Therefore, this paper proposes a method for identifying and evaluating vulnerable links in distribution networks based on minimum discriminant information. First, considering the influence of distributed grid connection, an improved probabilistic power flow calculation method is proposed, which improves the calculation efficiency and accuracy. Second, considering the correlation degree, transmission capacity, and voltage stability of branches in the distribution network, the identification index of vulnerable lines is defined. Based on power quality and operating state, the identification index of vulnerable nodes in a distribution network is defined. Finally, based on the indicators of vulnerable nodes and vulnerable lines, the vulnerable links in the distribution network are comprehensively evaluated based on the principle of minimum discriminant information, and the vulnerable links of the entire distribution network are evaluated according to different degrees of vulnerability. The rationality and effectiveness of the proposed method are verified via an example analysis of actual power grid data.

1. Introduction

With the rapid development of power systems as an important infrastructure, the economy and power quality of the power supply have been greatly improved. However, the increasing integration of renewable energy sources contributes to heightened randomness and complexity within the power system, posing significant challenges to its safe operation [1]. The current distribution network faces many challenges, including the aging of traditional infrastructure, the difficulty of integrating renewable energy and distributed generation resources, the increasing complexity of demand side management, and the increasing demand for grid protection and automation [2]. With the increasing demand for electricity and the acceleration of electrification, the reliability and resilience of distribution networks have been tested. In addition, power grid security and the ability to combat severe weather events have also become important issues. Enhancing the operational safety and disaster resilience of distribution networks is therefore crucial. Conducting effective vulnerability assessments and identifying vulnerable links for reinforcement are essential steps in achieving this goal [3].
Currently, research on grid vulnerability predominantly focuses on transmission networks both domestically and internationally, with limited exploration into distribution networks. Existing studies primarily revolve around constructing vulnerability assessment systems, developing assessment methodologies, and exploring coupled system vulnerability assessments. Complex network theory serves as a foundational approach in deriving vulnerability assessment indices for distribution networks [4,5]. Notably, indices like electrical betweenness and enhanced line betweenness are commonly used indicators in vulnerability assessments [6,7]. Reference [8] introduces metrics such as dielectric constant and power flow transfer entropy to evaluate distribution network state vulnerability, employing methods like the analytic hierarchy process (AHP) and entropy weight methods to derive comprehensive weight matrices for vulnerability indices. Reference [9] redefines electrical betweenness metrics, considering the impact of bidirectional power flow following distributed energy integration, thereby proposing a method by which to evaluate vulnerable grid lines using complex network metrics. Additionally, references [10,11,12] integrate probabilistic methods into power system analysis, enhancing understanding of system operation states through consideration of equipment failure rates and system state probabilities. Bayesian models and line betweenness metrics, as described in reference [13], are utilized to assess grid line importance. Reference [14] introduces complex network theory indices into energy storage planning for line vulnerability evaluation, pioneering new approaches for identifying vulnerable links. Reference [15] explores grid vulnerability from an overload mechanism perspective, analyzing grid fault adjacency. With the rapid increase in the proportion of renewable energy, such as wind and light energy in the modern energy system, the impact of renewable energy source on the vulnerability of the distribution network cannot be ignored [16]. Reference [17] establishes models for integrated wind/PV/storage systems, using fault mode and Monte Carlo analyses to compute reliability under various scenarios. In reference [18], the distribution network integrated with distributed energy and electric vehicles is studied, and the evaluation index and evaluation method based on the deep learning algorithm are proposed. Considering the influence of extreme weather on the distribution network, reference [19] studied and summarized the general vulnerability assessment methods of distribution networks and the enhancement of power system resilience. In reference [20], a voltage quality assessment method for distribution networks is proposed to stimulate the active/online management of voltage quality problems.
However, the current research on the vulnerability of distribution networks mainly focuses on local performance, and there is no in-depth evaluation of the effectiveness of the index system, nor does it combine the comprehensive evaluation with the local and overall network perspective. This limitation hampers efforts to capture distribution network dynamics fully and establish widely applicable evaluation standards [21]. This paper addresses these gaps by comprehensively considering node operational status, voltage violations, transformer overloads, three-phase imbalances, and new energy integration impacts. These factors are quantified into corresponding indicators to establish a model for identifying vulnerable lines. Utilizing the principle of minimum discriminant information, comprehensive index weights [22] are derived to facilitate distribution network line vulnerability assessments.
Through this study, we achieve the identification and comprehensive vulnerability assessment of vulnerable links within actual distribution networks. The contributions of this research are multifaceted.
First, we propose an improved semi-invariant probabilistic power flow calculation method to better assess distribution network risks under varying renewable energy source outputs and loads, enhancing power flow calculation efficiency and accuracy.
Second, we define identification indices for vulnerable links in distribution networks, including node and line vulnerability indices. The node vulnerability index utilizes the GWO-Elman model to predict load voltage data for the next period and establishes indices for transformer overloads, voltage violations, and three-phase imbalances to assess node vulnerability comprehensively. The line vulnerability index employs complex network theory, introducing improved branch degree and branch electrical transmission betweenness based on branch power supply matrices. Considerations of node degree and voltage stability further enhance comprehensive line vulnerability identification.
Finally, we establish an evaluation method for vulnerable links based on the principle of minimum discriminant information. This method integrates subjective weight vectors derived from the G1 order relation analysis method with objective weight vectors obtained through an enhanced entropy method. The combination of these weights using the principle of minimum discriminant information yields comprehensive weights used to assess distribution network line vulnerabilities.
The following is the structure of the remaining sections of the article. Section 2 identifies the vulnerable links of the distribution network with renewable energy source by defining the indicators of vulnerable nodes and vulnerable lines. In Section 3, the minimum discriminant information principle is used to combine the subjective and objective weights in order to obtain the comprehensive weight so as to realize the vulnerability assessment of the distribution network line. In Section 4, the power distribution data of a line in Liaoning Province are used for simulation, which verifies that the evaluation method of vulnerable links is reasonable. Section 5 provides the research conclusions and suggestions for future research.

2. Identification of Vulnerable Links in Distribution Network with Renewable Energy Source

The commonly used identification indices of vulnerable links in a distribution network include the degree index, betweenness index, path length index, aggregation coefficient, and cohesion index [23]. The identification of vulnerable links in a distribution network with renewable energy source is more complicated. Given the increasingly obvious phenomenon of voltage limit violation and power flow limit violation after distributed power access to a distribution network, this paper defines the identification indices of vulnerable links in a distribution network with renewable energy source, including the vulnerable line node index and vulnerable line identification index.

2.1. Vulnerable Node Identification

This paper primarily addresses aspects of power quality and the vulnerability analysis of power supply links in the context of integrating renewable energy source sources. Defined within are indices for identifying vulnerable nodes, including the node voltage over-limit, the transformer heavy overload, and the three-phase voltage imbalance.

2.1.1. Improved Semi-Invariant Probabilistic Power Flow Calculation

When renewable energy source sources are integrated into the distribution network, numerous uncertainties arise within the system. Traditional deterministic power flow calculations are time-consuming and may fail to provide comprehensive results. By employing probabilistic methods to address the random variables in the distribution network and utilizing a probabilistic power flow algorithm, the evaluation time can be reduced, efficiency improved, and the problem effectively resolved.
Current probabilistic power flow algorithms include analytical and simulation methods. This paper adopts an improved semi-invariant method to compute the probabilistic power flow. First, based on the Rosenblatt transform, the output power between wind farms and wind–solar farms is independently converted. Second, the semi-invariant of the independent data is calculated, and the probabilistic power flow calculation of the semi-invariant method is carried out. Finally, the output probability density function is solved by the Gram–Charlier series.
The core concept of the semi-invariant method is to simplify complex convolution operations into straightforward arithmetic operations between semi-invariants, significantly reducing calculation complexity. The semi-invariants of the input random variables are mapped to those of the output variables through the Jacobian matrix and sensitivity matrix, facilitating the transfer and transformation of the probability distribution.
The relationship between node voltage change Δ U , branch power change Δ S , and node injection power change Δ X is shown in the following formula.
{ Δ U = J 0 1 Δ X Δ S = G 0 J 0 1 Δ X ,
where J 0 and G 0 are the partial derivatives of the node injection power imbalance and the branch power to the node voltage amplitude V and phase angle δ , respectively.
Instead of relying on convolution operations, the semi-invariant property is used to convert the semi-invariant of the node injection power. This approach yields the k-order semi-invariants of the node voltage and branch power, as demonstrated in the following formula:
{ Δ U ( k ) = ( J 0 1 ) k Δ X ( k ) Δ S ( k ) = ( G 0 J 0 1 ) k Δ X ( k ) .
The cumulative probability distribution function of output variables (node voltage, branch power flow) is obtained via the Gram–Charlier series, where μ x is the expected value of the random variable, and σ x is the standard deviation. By standardizing random variables by X ¯ = X μ x σ x , we obtain its probability density function f ( x ¯ ) .
f ( x ¯ ) = φ ( x ¯ ) + 1 6 Υ 3 ( φ 2 ( x ¯ ) 1 ) + 1 24 Υ 4 ( φ 3 ( x ¯ ) 3 φ ( x ¯ ) )   1 36 Υ 3 2 ( 2 φ 3 ( x ¯ ) 5 φ ( x ¯ ) ) + ,
where φ ( x ¯ ) is the probability density function, and Υ k is the k-order semi-invariant.
In this paper, samples of wind power and photovoltaic output obtained through sampling are input into the probabilistic power flow calculation using the improved semi-invariant method. The power flow calculation results are then statistically analyzed to obtain the final probabilistic power flow outcomes. Figure 1 illustrates the flow chart of the improved semi-invariant probabilistic power flow calculation process.

2.1.2. Node Voltage Over-Limit Identification

As the penetration of photovoltaic and wind power increases in the distribution network, one major risk to the low-voltage distribution system is the potential for node voltage to exceed acceptable limits. When a substantial amount of renewable energy source sources are integrated into the grid, the traditional radial network transforms into a multi-power network. The increased output from distributed power sources raises the access point voltage, causing the node voltage amplitude to surpass specified thresholds. Therefore, the degree of node voltage over-limit is also one of the indicators by which to identify vulnerable nodes. The voltage over-limit index based on the relevant power supply voltage quality standards given by
R v o l t = i Ω i p r o b ( V i ) s e v ( V i ) ,
where R v o l t represents the node voltage over-limit index; p r o b ( V i ) represents the probability of node i voltage exceeding the limit; s e v ( V i ) represents the voltage offset threshold of node i . s e v ( V i _ ) and s e v ( V i ¯ ) represent the severity of the upper and lower limits of the node, respectively. The expressions of s e v ( V i _ ) and s e v ( V i ¯ ) are as follows:
s e v ( V i _ ) = { V i , min V i V i , min , V i < V i , min 0 , V i V i , min ,
s e v ( V i ¯ ) = { V i , max V i V i , max , V i > V i , max 0 , V i V i , max ,
where V i is the voltage amplitude of node i , V i , min is the lower limit of node i voltage, and V i , max is the upper limit of node i voltage.

2.1.3. Transformer Heavy Overload Identification

The state with a load rate below 60% is regarded as a normal operation state, and the state with a load rate above 60% is regarded as high risk. Therefore, the heavy overload risk loss value and risk degree of the node transformer are defined as Formula (7) and Formula (8), respectively.
L b o = { L 0.3 , L > 0.6 0 , L 0.6 ,
R b o = e max ( L b o ) 1 ,
where L b o is the risk loss value of transformer heavy overload; R b o is the risk of heavy overload; L is the transformer load rate.

2.1.4. Three-Phase Voltage Imbalance Identification

The accurate calculation method of three-phase voltage unbalance is
R u b = 1 e ε 1 e 1 ,
L = U a 4 + U b 4 + U c 4 ( U a 2 + U b 2 + U c 2 ) 2 ,
ε = 1 3 6 L 1 + 3 6 L × 100 % ,
where R u b represents the three-phase voltage imbalance; and U a , U b , and U c are the voltage of the A phase, B phase, and C phase, respectively.

2.2. Vulnerable Line Identification

Based on the conditions of a distribution network line in Liaoning Province, this study defines the improved node degree, improved line degree, improved branch electrical transmission betweenness, and the line voltage stability index. These metrics are used to rank the vulnerability of the distribution network lines, thereby enabling the identification of the most vulnerable lines.

2.2.1. Node Degree Identification Based on Improved Branch Power Supply Matrix

The degree index is typically utilized for node analysis and evaluation. It examines the number of side roads connected to a node by introducing the branch power supply correlation matrix for analysis. In the branch power supply correlation matrix, the column represents each node in the network, and the row represents each side road. Corresponding to the number of all the “1”s in each column, the connection of each node can be known. The degree of the node can be obtained by counting the number of “1”s in each column. A higher number indicates a more critical power supply role for the node in the network. By incorporating the branch power supply correlation matrix, an improved node degree formula is proposed, as demonstrated in Formula (12):
N b i = d i d ¯ 2 Σ l N b i d l ,
where N b i is the set of all edge paths connected by i nodes; and d i is the node degree of i node.

2.2.2. Branch Degree Identification Based on Improved Branch Power Supply Matrix

The node plays the role of transit in the power supply line. When describing the branch of the power system, the influence of the node on the line cannot be ignored. For a single-loop radial distribution network, node failure may cause subsequent lines to fail to supply power normally. In addition, the distributed power supply can form an island power supply form, or there is a tie line that can cut off the off-supply node and transfer it to the adjacent branch to ensure normal power supply. Therefore, this paper considers both the branch degree and the influence of the node degree and proposes an improved branch degree index. The formula is shown in Formula (13):
R l b i = | Z i j l i j | d ¯ N b i N b j ,
where R l b i is the branch degree index; Z i j is the unit line impedance of the wire or cable between node i and node j and the value of the unit line impedance of different wires is different; l i j is the line length between node i and node j ; | Z i j l i j | is the line impedance modulus between node i and node j , and | Z i j l i j | = R i j 2 + X i j 2 l i j .

2.2.3. Identification of Branch Electrical Transmission Betweenness

With the integration of a large number of renewable energy source sources, the main risk impact on the low-voltage distribution network is not only the node voltage exceeding the limit but also the line power flow exceeding the threshold. Due to the access of renewable energy source, the line power flow may change from one-way flow to two-way flow, and the traditional concept of betweenness is no longer applicable. Therefore, based on the combination of active power flow and reactive power flow, this paper proposes the definition of electrical transmission betweenness to better describe the problem of power flow in power system.
Therefore, the improved branch electrical transmission betweenness is defined as Formula (14):
R χ i j = ρ P × E χ P i j 2 + ρ Q × E χ Q i j 2 E χ P i j 2 + E χ Q i j 2 ,
where R χ i j is the branch electrical transmission betweenness index; ρ P is the weight of the active power flow transmission factor; and ρ Q is the weight of the active power flow transmission factor. When ρ P = 1 and ρ Q = 0 , the system focuses on active power flow transmission; when ρ P = 0.5 and ρ Q = 0.5 , the system attaches the same importance to active power flow transmission and reactive power flow transmission; and when ρ P = 0 and ρ Q = 1 , the system focuses on reactive power flow transmission.

2.2.4. Line Voltage Stability Identification in the Distribution Network

In the process of line identification, voltage stability is also a factor that we need to consider. Therefore, the line voltage stability index is defined as one of the indicators for the assessment of vulnerable links, as shown in Formula (15):
R v s = 4 Q k | Z i k | 2 ( X i k cos θ k + R i k sin θ k ) 2 U i 2 ,
where R v s is the voltage stability index; Q k is the reactive power of the terminal node; Z i k is the line impedance between node i and node k ; X i k is the line reactance; R i k is the line resistance; U i is the voltage amplitude of the head node i ; and θ k is the power factor angle of the terminal node k . The line voltage stability index can use distribution information to accurately identify the voltage stability of the 10 kV bus through the index. When the evaluation index 0 R v s 1 , the distribution network line voltage is in a stable operating state. When R v s > 1 , the distribution network line voltage is unstable.

3. Vulnerable Link Assessment Based on the Principle of Minimum Discriminant Information

Utilizing defined metrics for vulnerable nodes and lines, corresponding weights are assigned. Vulnerable links in the distribution network are identified using the minimum discriminant information principle. Commonly employed subjective and objective weighting methods include the analytic hierarchy process, fuzzy comprehensive evaluation method, G1 order relationship analysis method, and entropy weight method. Among these, the G1 order relationship analysis method stands out for its simplicity and intuitive nature, significantly reducing computational complexity and improving speed. Not requiring a judgment matrix eliminates the need for consistency testing and imposes no limits on the number of elements per level, ensuring the order of each element [24]. The entropy weight method determines the index weights based on variation degrees of index values, mitigating human bias but potentially diverging from expected results, thus overlooking decision makers’ subjective intentions. Therefore, this study integrates the strengths and weaknesses of both methods, utilizing the G1 order relationship analysis method for subjective weighting and the entropy weight method for objective weighting, and ultimately applying the minimum discriminant information principle to compute comprehensive weights.
The vulnerability objective function, guided by the principle of minimum discriminant information, is formulated in Formula (16):
{ min F ( ω ) = i = 1 m ( ω i ln ω i ω z g i + ω i ln ω i ω k g i )   s . t . i = 1 m ω i = 1 , ω i 0 , i = 1 , 2 , , m ,
where F ( ω ) is the objective function to make the comprehensive weight ω i as close to the subjective and objective weight as possible; ω i is the comprehensive weight of the i index; and ω z g i is the subjective weight coefficient of the i index and the calculation formulae are as follows:
ω z g i = ( 1 + Σ i = 2 m Π k = i m r k ) 1 ,
ω z g i = r i + 1 ω z g i + 1 ,
r i = ω z g i ω z g i + 1 .
The r i values are 1, 1.2, 1.4, 1.6, and 1.8. The larger the r i value, the greater the importance of index i than index i + 1 .
ω k g i is the objective weight coefficient of the i index, and the calculation formulae are as follows:
ω k g i = Σ i = 1 n h i + 3 m 2 3 m h i Σ i = 1 n ( Σ i = 1 n h i + 3 m 2 3 m h i ) ,
h i = 1 ln n ( i = 1 m y i ln y i ) ,
ϕ i = 1 h i i = 1 n ( 1 h i ) , ϕ i [ 0 , 1 ] ,
where ω k g i satisfies Σ ω = 1 ; m is the number of indicators; and h i is the entropy of the index and satisfies 0 h i 1 .
The vulnerability objective function based on the Lagrange function is solved as follows. To determine the optimal solution for the problem at hand, we construct the Lagrangian function.
L = i = 1 m ( ω i ln ω i ω z g i + ω i ln ω i ω k g i ) + λ ( i = 1 m ω i 1 ) .
Let L / ω i = 0 , L / λ = 0 , then
{ L ω i = 2 ln ω i + 2 ln ω z g i ω k g i + λ = 0 L λ = i = 1 m ω i 1 = 0 .
The comprehensive weight is obtained from Formula (25):
ω i = ω z g i ω k g i e .
By substituting the indicators of vulnerable nodes and vulnerable lines, the comprehensive evaluation results of vulnerable links in the distribution network can be obtained.
R v u l = ω i R i ,
where R v u l is the comprehensive evaluation value of vulnerable links; and R i is the value of each index, and R i { R b o , R v o l t , R u b , R l b i , R χ i j , R v s } . The larger the value of R v u l , the higher the vulnerability caused by the quality of the power supply.
The identification and evaluation process of vulnerable links in the distribution network with renewable energy source is shown in Figure 2.
First, before proceeding with data utilization, it is imperative to perform preprocessing to maximize data authenticity. Incomplete datasets are processed accordingly to ensure data integrity.
In the identification of vulnerable nodes, empirical mode decomposition is employed to denoise the voltage signal, thereby reducing noise interference and aligning predictions more closely with actual development trends. Subsequently, the grey wolf algorithm (GWO) optimizes the parameters of the Elman neural network, enabling the GWO-Elman model to forecast load voltage data [25]. Additionally, an adaptive kernel density estimation method establishes a wind–solar output model. Finally, criteria such as transformer heavy overload, voltage limits exceeding, and three-phase voltage imbalance are defined to pinpoint vulnerable nodes.
In the identification of vulnerable lines, the relationship between nodes and branches in the directed graph is established by using the correlation matrix method of graph theory. Then, the branch power supply matrix is derived via matrix derivation. Second, the concept of degree and betweenness of a complex network is adopted to integrate electrical parameters into a complex network to better describe the correlation degree, power transmission, and voltage stability of branches in the distribution network. Then, all lines are analyzed and compared using vulnerable line identification, and then, vulnerable lines are sorted according to different vulnerabilities.
Finally, leveraging indicators from both vulnerable nodes and lines, the G1 sequence relation analysis method is applied to determine subjective weight values, while an enhanced entropy weight method calculates objective weight values. These are combined using the principle of minimum discriminant information to compute comprehensive weights, facilitating a thorough assessment of vulnerable links in the distribution network.

4. Example Analysis

This paper utilizes distribution and consumption data from a distribution network line located in Liaoning Province for the example analysis. The Maiwang line spans a total length of 13.097 km and encompasses 805 nodes, including 243 distribution transformers. The combined capacity of these transformers is 23.245 MVA, with the main transformer reaching a peak load rate of 51.5%. Nodes 182 and 386 serve as photovoltaic access points, while nodes 610 and 710 serve as wind power access points. The installed capacity of the photovoltaic power station is 500 KW, and the total area of the photovoltaic module is A = 800   m 2 . The Homer version 2.81 software is used to generate the light intensity sequence of China’s Liaoning region (118°53′ E, 38°43′ N). The shape parameters α = 0.6579 and β = 1.7263 of the Beta distribution and the photoelectric conversion efficiency η = 0.13 are calculated. The wind speed data are also taken from the Weibull distribution with the scale parameter of 7.39 and the shape parameter of 3 in Liaoning area. The cut-in wind speed is 3 m/s, the constant power wind speed is 10 m/s, the cut-out wind speed is 23 m/s, and the rated power of each wind turbine is 500 KW. Figure 3 shows the local branch diagram of the 10 kV Maiwang line.

4.1. Calculation Results and Analysis of 10 kV Side Power Flow

Figure 4 illustrates the power flow calculations for the Maiwang line, different colored lines in the figure represent different moments. The figure indicates that in certain instances, the voltage level on the 10 kV side meets the specified requirements; while in most instances, it remains in a state close to the lower limit. The power supply capacity from some nodes to the end branch is insufficient. If the load rate is too large, the current in the line will be too large, so the line loss of the main line will rise sharply. The calculation result of the line loss of the Maiwang line based on the power correction module is shown in Figure 5. The main line closer to the PowerPoint will lead to too large a line loss in the interval due to too large a current. On the contrary, the line diameter of the end node is too small, and the current is relatively small compared with the node close to the substation, so the loss is relatively small.

4.2. Identification and Analysis of Vulnerable Nodes

Figure 6 depicts the operational status of the system, with node data collected at 15-min intervals, totaling 96 data points daily. Figure 7 presents voltage data for the subsequent moment, derived from processed data using GWO-Elman neural network predictions. Singular value decomposition is then applied to determine periodic singular values, followed by entropy theory to calculate singular value entropy. Evaluating the system’s operational state is based on maximum and minimum entropy values; lower entropy values indicate greater stability and less variation. As shown in Figure 6, the degree values for each node hover around 0.7, indicating a state of stable operation. Vulnerable nodes are evaluated based on the operation status of the distribution network system.
The heavy overload degree of the transformer is obtained by the transformer heavy overload index R b o , that is, Formula (8). Figure 8 shows the degree of heavy overload of the transformer at 18:00, which is also the moment when the number of heavy overloads is the largest throughout the day. The degree of heavy overload of the transformer is obtained by the load rate undertaken by the transformer.
From the three-phase imbalance index R u b , the three-phase imbalance degree of the node is obtained. Figure 9 displays the degree of three-phase imbalance for nodes on the Maiwang line. The figure illustrates that the number of nodes experiencing significant three-phase imbalance is minimal, indicating minimal impact on the system.
From the voltage over-limit index R v o l t , the node voltage over-limit degree is obtained. In Figure 10, the node voltage over-limit degree for the Maiwang line is depicted. It is observed that during daytime hours, there is a notable occurrence of nodes exceeding voltage limits, predominantly located at the line’s terminus. This is attributed to increased load rates during daytime hours, leading to compromised power quality at these end nodes. Therefore, it is imperative to implement appropriate measures to ensure uninterrupted electricity supply for end node users.

4.3. Identification and Analysis of Vulnerable Lines

The node degree is the number of edge paths connected by the node. The higher the number of edges, the more important the power supply role of the node in the network. Figure 11 presents the evaluation results for node degrees along the Maiwang line. Nodes located on the main line exhibit higher importance, reflected in their higher node degrees. Similarly, branch line nodes, which also carry significant responsibilities, demonstrate higher node degrees compared to end nodes.
From the branch degree index R l b i , the branch degree evaluation result is obtained. Figure 12 displays the assessment outcomes regarding the branching degree of the Maiwang line. It is evident from the figure that branch 483 exhibits a higher degree, with a length measuring 1554 m and a conductor model of LGJ00035. In terms of electrical parameters, the branch conductor is characterized by excessive length and thinness, which adversely impacts the power supply to subsequent nodes, thereby justifying its higher branching degree.
From the transmission betweenness index R χ i j , the evaluation result of branch transmission betweenness is obtained. Figure 13 shows the evaluation results of the transmission betweenness of the Maiwang line branch. The transmission betweenness of the main line and the branch line is relatively high because these lines are closely related to the nodes and other branches. The branch connected by the end node has a small number of connected nodes, so the transmission betweenness of such branches is small.
From the voltage stability index R v s , the evaluation results of branch voltage stability are obtained. Figure 14 presents the assessment results regarding the voltage stability of branches on the Maiwang line. Specifically, branches 172 and 649 exhibit poor stability. Branch 172 is linked to a specialized distribution transformer serving the quarry, while branch 649 is connected to a specialized distribution transformer serving the Hexi farm. Both the quarry’s heavy equipment and the farm’s aquaculture equipment consume substantial electrical energy and are sensitive to the start–stop cycles of large loads in their respective environments, contributing to voltage instability along these branches. Additionally, the figure illustrates that voltage instability is prevalent at the line’s terminus, likely due to undersized wiring and some degree of line aging. When the load rate increases, the loss shows a nonlinear change, which leads to the instability of the line voltage. According to the actual field investigation, the users at the end of the line are in a low voltage state for a long time, which makes the household appliances unable to work normally or even operate, which is very inconvenient for production and life. However, the voltage stability of most branches of the line does not exceed 0.1, and the voltage is relatively stable under normal operation.

4.4. Vulnerable Link Assessment Results of the Distribution Network

In terms of subjective evaluation, the six groups of indicators are ranked based on frontline operators’ experience. The order of importance is as follows: branch voltage stability, node voltage over-limit degree, node transformer heavy overload degree, node three-phase imbalance, branch electrical transmission betweenness, and branch degree. For objective weighting, the improved entropy weight method is employed. This method determines index weights based on each index’s variation, thereby mitigating biases introduced by subjective human judgment. Hence, the objective weighting method selects the improved entropy weight method for comprehensive analysis and evaluation. Table 1 presents the subjective weight values obtained through the G1 order relation method for each index, while Table 2 shows the objective weight values derived from the improved entropy weight method.
By calculating the comprehensive weight based on the principle of minimum discriminant information and substituting each index of vulnerable nodes and vulnerable lines, the comprehensive evaluation results of vulnerable links in the distribution network can be obtained, as shown in Figure 15. The diagram indicates the Maiwang line’s overall stable operation, with a few nodes exhibiting anomalies. Table 3 details links identified with higher vulnerability.

4.5. Comparison of Evaluation Methods

The link with the comprehensive vulnerability ranking in the top 5 is selected and compared with the results of scheme 1 and scheme 2, as shown in Table 4.
Scheme 1 is to use the general degree, betweenness, path length, aggregation coefficient, and cohesion index to evaluate the vulnerable links of the distribution network.
Scheme 2 is based on complex network theory and risk theory. The node and line vulnerability indices are proposed, and the analytic hierarchy process is used to sum the weights of each index to obtain the comprehensive vulnerability index and evaluate the vulnerable links.
Compared with scheme 1, the method in this paper identifies four vulnerable links, and the identification results are basically similar, but the ranking is slightly different. The reason is that there are differences in the indicators considered by the two evaluation methods. Link 14 is the vulnerable link identified in this paper rather than the vulnerable link identified in scheme 1, and link 285 is the vulnerable link identified in scheme 1 rather than the vulnerable link identified in this paper. Although the vulnerability of link 14 in node degree is lower than 285, the transmission betweenness and voltage stability of link 14 branch are higher than those of link 285. Therefore, considering the above factors, the vulnerability of link 14 is higher than that of link 285.
Compared with scheme 2, the method in this paper identifies four vulnerable links, and the identification results are basically similar, but the ranking is slightly different. The reason is that there are differences in the comprehensive weighting methods considered by the two evaluation methods. Link 49 is the vulnerable link identified in this paper rather than the vulnerable link identified in scheme 2, and link 483 is the vulnerable link identified in scheme 2 rather than the vulnerable link identified in this paper. Although the vulnerability of link 49 in branch degree evaluation is lower than that of link 483, the node degree evaluation and voltage stability of link 49 are higher than those of link 483. Therefore, considering the above factors, the vulnerability of link 49 is higher than that of link 483.

5. Conclusions

The research goal of this paper is to propose a method for evaluating the vulnerable links of the distribution network with renewable energy source, which can quantify the risk of the distribution network and then identify the vulnerable links of the distribution network in combination with the grid structure information of the distribution network. It is helpful to monitor and warn, in a timely manner, of the risk of the distribution network after the distributed power supply is connected to the grid and provide theoretical support for system planning and scheduling operation. In this paper, the combination of theoretical modeling and simulation analysis is used to evaluate the vulnerable links of the distribution network with renewable energy source and identify the vulnerable links. The main results are as follows:
  • When dealing with a distribution network with a high proportion of distributed energy, the traditional probabilistic power flow calculation method has problems such as low accuracy and long calculation time, which need to be improved and optimized. Therefore, considering the random output characteristics of renewable energy source and load, this paper proposes an improved semi-invariant probabilistic power flow calculation method, which improves the efficiency and accuracy of power flow calculation and can more accurately evaluate the safety and stability of power system.
  • The evaluation index system of vulnerable links in a distribution network with renewable energy source is established. The reliability indices of traditional distribution network at home and abroad are extracted. These indices reflect the power supply capacity of the distribution network for a long time and lack the investigation of node voltage and line power flow in the distribution network. With the access of a high proportion of renewable energy source, the identification of vulnerable links in a distribution network is more complicated. In view of the increasingly obvious phenomenon of voltage over-limit and power flow over-limit after the access of distributed generation to a distribution network, this paper defines the identification index of vulnerable links in a distribution network with renewable energy source, including vulnerable line node index and vulnerable line identification index, which improves the traditional reliability index system and considers it more comprehensively.
  • Aiming at the comprehensive evaluation of the vulnerable links of the distribution network, this paper uses the subjective and objective weighting method to analyze each index subjectively and objectively. Then, the comprehensive weighting method based on the minimum discriminant information theory is adopted to evaluate the vulnerable links of the distribution network comprehensively, which makes the evaluation results more reasonable. The distribution and utilization information of the Maiwang line is used for example analysis. From the simulation results, it can be seen that the overall operation of the Maiwang line is relatively stable, and the evaluation of vulnerable links is more reasonable. Some theoretical calculation methods and governance strategies have been applied in actual projects, and the feasibility of theoretical research has been further verified by actual results.
In addition, this paper does not consider the impact of electric vehicle clusters and network attacks on the vulnerability of distribution networks. With the rapid development and popularization of electric vehicles, the impact of electric vehicle access on the distribution network is becoming more and more obvious. In the future, large-scale electric vehicle access to the distribution network will be considered, the distribution of vehicle-network energy flow will be analyzed, and the vulnerability assessment of the distribution network will be carried out.

Author Contributions

Conceptualization, Z.D. and K.S.; methodology, Y.T.; software, T.W.; validation, H.L., P.Y. and Z.D.; formal analysis, K.S.; investigation, K.S.; resources, Z.D.; data curation, H.L.; writing—original draft preparation, Z.D.; writing—review and editing, K.S.; visualization, P.Y.; supervision, Y.T.; project administration, T.W.; funding acquisition, Y.T. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China under Grants 62173082, U22B20115, and the National Key R&D Program of China (2022YFB4100803).

Data Availability Statement

The original study’s contributions are included in the article, and any further inquiries can be directed to the corresponding authors.

Conflicts of Interest

Authors Kejian Shi, Ye Tian, and Haifeng Li were employed by the company Electric Power Research Institute, State Grid Liaoning Electric Power Co., Ltd. Ting Wang and Zikuo Dai were employed by the company State Grid Liaoning Electric Power Co., Ltd. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

References

  1. Luo, Y.; Hao, H.; Yang, D.; Zhou, B. Multi-objective optimization of integrated energy systems considering ladder-type carbon emission trading and refined load demand response. J. Mod. Power Syst. Clean Energy 2024, 12, 828–839. [Google Scholar] [CrossRef]
  2. Luo, Y.; Yuan, H.; Hu, Z.; Yang, D.; Zhang, H. Optimal scheduling of micro-energy grid based on pareto frontier under uncertainty and pollutant emissions. IEEE Trans. Smart Grid 2024, 15, 368–380. [Google Scholar] [CrossRef]
  3. Luo, L.; Pagani, G.A.; Rosas-Casals, M. Spatial and performance optimality in power distribution networks. IEEE Syst. J. 2016, 12, 2557–2565. [Google Scholar] [CrossRef]
  4. Yu, A.; Wang, N.; Wu, N. Scale-free networks: Characteristics of the time-variant robustness and vulnerability. IEEE Syst. J. 2020, 15, 4082–4092. [Google Scholar] [CrossRef]
  5. Liu, N.; Hu, X.; Ma, L.; Yu, X. Vulnerability assessment for coupled network consisting of power grid and EV traffic network. IEEE Trans. Smart Grid 2021, 13, 589–598. [Google Scholar] [CrossRef]
  6. Bompard, E.; Pons, E.; Wu, D. Extended topological metrics for the analysis of power grid vulnerability. IEEE Syst. J. 2012, 6, 481–487. [Google Scholar] [CrossRef]
  7. Bompard, E.; Wu, D.; Xue, F. Structural vulnerability of power systems: A topological approach. Electr. Power Syst. Res. 2011, 81, 1334–1340. [Google Scholar] [CrossRef]
  8. Wen, J.; Lin, S.; Qu, X.; Xiao, Q. A TOPSIS-Based Vulnerability Assessment Method of Distribution Network Considering Network Topology and Operation Status. IEEE Access 2023, 11, 94358–94370. [Google Scholar] [CrossRef]
  9. Bompard, E.; Wu, D.; Xue, F. The concept of betweenness in the analysis of power grid vulnerability. In Proceedings of the 2010 Complexity in Engineering, Roma, Italy, 22–24 February 2010; IEEE: Piscataway, NJ, USA, 2010; pp. 52–54. [Google Scholar]
  10. Wei, J.J.; Ren, J.W. Transmission Section Search for Vulnerable Line Based on Power Transfer Distribution Factor. Adv. Mater. Res. 2014, 986, 643–647. [Google Scholar] [CrossRef]
  11. Yang, S.; Chen, W.; Zhang, X.; Liang, C.; Wang, H.; Cui, W. A graph-based model for transmission network vulnerability analysis. IEEE Syst. J. 2019, 14, 1447–1456. [Google Scholar] [CrossRef]
  12. Wei, X.; Gao, S.; Huang, T.; Bompard, E.; Pi, R.; Wang, T. Complex network-based cascading faults graph for the analysis of transmission network vulnerability. IEEE Trans. Ind. Inform. 2018, 15, 1265–1276. [Google Scholar] [CrossRef]
  13. Liu, L.M.; Liu, J.; Wei, Z.B.; Shang, C.N.; Zhu, G.J.; Dai, S.L. Security analysis of large power grid based on complex network theory and Bayesian network model. In Proceedings of the 2014 International Conference on Power System Technology, Chengdu, China, 20–22 October 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 270–274. [Google Scholar]
  14. Qiu, Z.; Dai, R.; Peng, Y.; Cai, W.; Zhu, W.; Zhu, P.; Guo, Q. Distributed Energy Storage Planning Considering Active Distribution Network Vulnerability. In Proceedings of the 2022 9th International Forum on Electrical Engineering and Automation (IFEEA), Zhuhai, China, 4–6 November 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 657–661. [Google Scholar]
  15. Zang, T.; Gao, S.; Huang, T.; Wei, X.; Wang, T. Complex network-based transmission network vulnerability assessment using adjacent graphs. IEEE Syst. J. 2019, 14, 572–581. [Google Scholar] [CrossRef]
  16. Luo, Y.; Hao, H.; Yang, D.; Yin, Z.; Zhou, B. Optimal operation strategy of combined heat and power system considering demand response and household thermal inertia. IEEE Trans. Consum. Electron. 2023, 69, 366–376. [Google Scholar] [CrossRef]
  17. Li, S.; Luo, C.; Wu, H.; Bi, R.; Han, P.; Ding, M. Node vulnerability assessment of active distribution network accounting for topological structure, operational characteristics. Sustain. Energy Technol. Assess. 2024, 64, 103675. [Google Scholar] [CrossRef]
  18. Yang, L.; The, J. Review on vulnerability analysis of power distribution network. Electr. Power Syst. Res. 2023, 224, 109741. [Google Scholar] [CrossRef]
  19. Mujjuni, F.; Betts, T.R.; Blanchard, R.E. Evaluation of Power Systems Resilience to Extreme Weather Events: A Review of Methods and Assumptions. IEEE Access 2023, 11, 87279–87296. [Google Scholar] [CrossRef]
  20. Forcan, M.; Simović, A.; Jokić, S.; Forcan, J. A Zonal Approach for Wide-Area Temporary Voltage Quality Assessment in a Smart Grid. Energies 2024, 17, 2475. [Google Scholar] [CrossRef]
  21. Nie, X.; Zheng, Y.; Zhang, Y.; Chen, Z.; Wang, B. Diagnosis of Critical Risk Sources in the Operation Safety of the Central Route Project of South-to-North Water Diversion Based on the Improved FMEA Method. Wirel. Commun. Mob. Comput. 2022, 2022, 2096477. [Google Scholar] [CrossRef]
  22. Wu, Q.; Tian, D.; Lan, R.; Li, M. A large-scale MAGDM model based on SKNN and weighted clustering under incomplete information. Eng. Appl. Artif. Intell. 2023, 122, 106158. [Google Scholar] [CrossRef]
  23. Yang, L.; Li, C. Identification of vulnerable lines in smart grid systems based on improved agglomerative hierarchical clustering. IEEE Access 2023, 11, 13554–13563. [Google Scholar] [CrossRef]
  24. Bai, H.; Miao, S. Hybrid flow betweenness approach for identification of vulnerable line in power system. IET Gener. Transm. Distrib. 2015, 9, 1324–1331. [Google Scholar]
  25. Luo, Y.; Cheng, Q.; Yan, S.; Yang, D. Situation awareness method of the distribution network based on EMD-SVD and Elman neural network. Energy Rep. 2022, 8, 632–639. [Google Scholar] [CrossRef]
Figure 1. Flow chart of probabilistic power flow calculation via the semi-invariant method.
Figure 1. Flow chart of probabilistic power flow calculation via the semi-invariant method.
Energies 17 04495 g001
Figure 2. Identification and evaluation process diagram of vulnerable links in the distribution network.
Figure 2. Identification and evaluation process diagram of vulnerable links in the distribution network.
Energies 17 04495 g002
Figure 3. Local branch diagram of the 10 kV Maiwang line.
Figure 3. Local branch diagram of the 10 kV Maiwang line.
Energies 17 04495 g003
Figure 4. Power flow calculation results of the Maiwang line based on power correction module.
Figure 4. Power flow calculation results of the Maiwang line based on power correction module.
Energies 17 04495 g004
Figure 5. Line loss of the Maiwang line based on power correction module.
Figure 5. Line loss of the Maiwang line based on power correction module.
Energies 17 04495 g005
Figure 6. System operation state.
Figure 6. System operation state.
Energies 17 04495 g006
Figure 7. Prediction voltage of transformer in platform area of the Maiwang line.
Figure 7. Prediction voltage of transformer in platform area of the Maiwang line.
Energies 17 04495 g007
Figure 8. 18:00 overload degree of node transformer on the Maiwang line.
Figure 8. 18:00 overload degree of node transformer on the Maiwang line.
Energies 17 04495 g008
Figure 9. Three-phase unbalanced degree of nodes of the Maiwang line.
Figure 9. Three-phase unbalanced degree of nodes of the Maiwang line.
Energies 17 04495 g009
Figure 10. The degree of node voltage exceeding the limit of the Maiwang line.
Figure 10. The degree of node voltage exceeding the limit of the Maiwang line.
Energies 17 04495 g010
Figure 11. The evaluation result of the node degree of the Maiwang line.
Figure 11. The evaluation result of the node degree of the Maiwang line.
Energies 17 04495 g011
Figure 12. The evaluation result of the branch degree of the Maiwang line.
Figure 12. The evaluation result of the branch degree of the Maiwang line.
Energies 17 04495 g012
Figure 13. The evaluation result of transmission parameters on the branch of the Maiwang line.
Figure 13. The evaluation result of transmission parameters on the branch of the Maiwang line.
Energies 17 04495 g013
Figure 14. Evaluation results of voltage stability of the Maiwang line branch.
Figure 14. Evaluation results of voltage stability of the Maiwang line branch.
Energies 17 04495 g014
Figure 15. Assessment results of vulnerable links on the Maiwang Line.
Figure 15. Assessment results of vulnerable links on the Maiwang Line.
Energies 17 04495 g015
Table 1. Subjective weight value based on G1 order relation method.
Table 1. Subjective weight value based on G1 order relation method.
IndexBranch Voltage StabilityDegree of Node Voltage Over-LimitTransformer Heavy Overload DegreeNode Three-Phase UnbalanceBranch Electrical Transmission BetweennessBranch Degree
Subjective weights0.26060.21050.1770.12920.11650.1062
Table 2. Objective weight value based on improved entropy weight method.
Table 2. Objective weight value based on improved entropy weight method.
IndexBranch Voltage StabilityDegree of Node Voltage Over-LimitTransformer Heavy Overload DegreeNode Three-Phase UnbalanceBranch Electrical Transmission BetweennessBranch Degree
Objective weights0.19250.12390.17670.17120.15950.1762
Table 3. Assessment of fragile links on the Maiwang Line.
Table 3. Assessment of fragile links on the Maiwang Line.
Link172649111449
Evaluation result0.6790.4110.3700.2800.224
Table 4. Comparison of evaluation results of vulnerable links in the distribution network.
Table 4. Comparison of evaluation results of vulnerable links in the distribution network.
Ranking of Vulnerable LinksMethod of This ArticleScheme 1Scheme 2
1172172172
264964911
31111649
4144914
549285483
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Shi, K.; Wang, T.; Dai, Z.; Tian, Y.; Yang, P.; Li, H. Identification and Evaluation of Vulnerable Links in a Distribution Network with Renewable Energy Source Based on Minimum Discriminant Information. Energies 2024, 17, 4495. https://doi.org/10.3390/en17174495

AMA Style

Shi K, Wang T, Dai Z, Tian Y, Yang P, Li H. Identification and Evaluation of Vulnerable Links in a Distribution Network with Renewable Energy Source Based on Minimum Discriminant Information. Energies. 2024; 17(17):4495. https://doi.org/10.3390/en17174495

Chicago/Turabian Style

Shi, Kejian, Ting Wang, Zikuo Dai, Ye Tian, Pu Yang, and Haifeng Li. 2024. "Identification and Evaluation of Vulnerable Links in a Distribution Network with Renewable Energy Source Based on Minimum Discriminant Information" Energies 17, no. 17: 4495. https://doi.org/10.3390/en17174495

APA Style

Shi, K., Wang, T., Dai, Z., Tian, Y., Yang, P., & Li, H. (2024). Identification and Evaluation of Vulnerable Links in a Distribution Network with Renewable Energy Source Based on Minimum Discriminant Information. Energies, 17(17), 4495. https://doi.org/10.3390/en17174495

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop