Power System Connectivity Monitoring Using a Graph Theory Network Flow Algorithm

A method of applying network flow analyses during real time power system operation, to provide better network connectivity visualization, is developed and presented. Graph theory network flow analysis is capable of determining the maximum flow that can be transported between two nodes within a directed graph. These network flow algorithms are applied to a graphical representation of a power system topology to determine the minimum number of system branches needed to be lost in order to guarantee disconnecting the two nodes in the system that are selected. The number of system branches that are found serves as an approximate indicator of system vulnerabilities. The method used in these connectivity analyses makes use of well known graph theory network flow maximum flow algorithms, but also introduces a new algorithm for updating an old network flow solution for the loss of only a single system branch. The proposed new algorithm allows for significantly decreased solution time that is desired in a real-time environment. The value of using the proposed method is illustrated by using a detailed example of the 2008 island formation that occurred in the Entergy power system. The method was applied to a recreation of the 2008 event using a 20,000-bus model of the Entergy system to show both the proposed method's benefits as well as practicality of implementation.

[1]  Haibo He,et al.  Supplementary File : Revealing Cascading Failure Vulnerability in Power Grids using Risk-Graph , 2013 .

[2]  Réka Albert,et al.  Structural vulnerability of the North American power grid. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[3]  Massimo Marchiori,et al.  LOCATING CRITICAL LINES IN HIGH-VOLTAGE ELECTRICAL POWER GRIDS , 2005, The Random and Fluctuating World.

[4]  Massimo Marchiori,et al.  Vulnerability and protection of infrastructure networks. , 2005, Physical review. E, Statistical, nonlinear, and soft matter physics.

[5]  Robert E. Tarjan,et al.  Network Flow Algorithms , 1989 .

[6]  Floyd Galvan,et al.  Phasor Measurement Units (PMU) instrumental in detecting and managing the electrical island created in the aftermath of Hurricane Gustav , 2009, 2009 IEEE/PES Power Systems Conference and Exposition.

[7]  Robin Wilson,et al.  Modern Graph Theory , 2013 .

[8]  Steven Skiena,et al.  The Algorithm Design Manual , 2020, Texts in Computer Science.

[9]  Mark Thomas,et al.  Island formation in entergy power grid during Hurricane Gustav , 2009, 2009 IEEE Power & Energy Society General Meeting.

[10]  Fei Xue,et al.  Structural vulnerability of power systems: A topological approach , 2011 .

[11]  J. R. Dondeti,et al.  Experiences with Contingency Analysis in reliability and market operations at MISO , 2012, 2012 IEEE Power and Energy Society General Meeting.

[12]  S Arianos,et al.  Power grid vulnerability: a complex network approach. , 2008, Chaos.

[13]  T. J. Overbye,et al.  Multiple Element Contingency Screening , 2011, IEEE Transactions on Power Systems.

[14]  Frances M. T. Brazier,et al.  Structural vulnerability assessment of electric power grids , 2013, Proceedings of the 11th IEEE International Conference on Networking, Sensing and Control.

[15]  Herbert S. Wilf,et al.  Algorithms and Complexity , 1994, Lecture Notes in Computer Science.