Research on Identification Technology of Weak Links in Power Grid Based on Risk Index Under Extreme Ice Disaster

[1]  Cheng Lin Power system short-term operational reliability evaluation considering weather forecast , 2010 .

[2]  Cheng Li Application and Fast Simulation of Cascading Outage Based on Genetic Algorithms , 2015 .

[3]  Wu Weijie Weak Part Identification and Reliability Improvement Analysis of Guangdong Power Grid , 2011 .

[4]  L. Soder,et al.  Modelling of Ice Storms and their Impact Applied to a Part of the Swedish Transmission Network , 2007, 2007 IEEE Lausanne Power Tech.

[5]  Xie Shaoyu Wind and Ice Loading Risk Model and Fuzzy Forecast for Overhead Transmission Lines , 2011 .

[6]  Xie Yunyu Space-time Evaluation for Impact of Ice Disaster on Transmission Line Fault Probability , 2013 .

[7]  Sun Yuanzhang An Outage Rate Model and System Adequacy Assessment Based on Adverse Weather Conditions , 2009 .

[8]  Quan Chen,et al.  Composite Power System Vulnerability Evaluation to Cascading Failures Using Importance Sampling and Antithetic Variates , 2013, IEEE Transactions on Power Systems.

[9]  Yi Dexin Probabilistic Prediction of Transmission Line Fault Resulted from Disaster of Ice Storm , 2012 .

[10]  Wu Cheng-wen Research on ice disaster risk evaluation model of power system considering multi-factors , 2012 .

[11]  Wan Xiao-jing Present Research Situation of Icing and Snowing of Overhead Transmission Lines in China and Foreign Countries , 2008 .

[12]  Antanas Kudzys Safety of power transmission line structures under wind and ice storms , 2006 .

[13]  Chuangxin Guo,et al.  Design of Weak Link Identification System for Power Grid Based on Topology Analysis and Association Set Decomposition , 2018, 2018 IEEE Power & Energy Society General Meeting (PESGM).

[14]  Sun Yuanzhang Cascading Failure Probabilistic Assessment of Power Systems Based on Operational Reliability Model for Transmission Lines , 2011 .

[15]  Xinghuo Yu,et al.  A Maximum-Flow-Based Complex Network Approach for Power System Vulnerability Analysis , 2013, IEEE Transactions on Industrial Informatics.