Análisis preliminar de la vulnerabilidad de un sistema de potencia mediante interdicción determinista multiobjetivo

Translated title of the contribution: Power system vulnerability screening using multiple-objective deterministic interdiction

Claudio Rocco, José Ramírez-Márquez, Daniel Salazar, César Yajure

    Research output: Contribution to journalArticlepeer-review

    1 Scopus citations

    Abstract

    This paper introduces a new approach for the analysis of the vulnerability of power systems based on a hybrid model: an efficient multi-objective optimization evolutionary approach (MOEA) and the use of deterministic network interdiction concepts (DNIP). The paper analyzes the interaction between the power system's component outages, due to external attacks or random failures and the system load shedding and considers that multiple prospective solutions could be selected, based on the preference of the decision-maker. A simple but powerful evolutionary algorithm can be used to address this multi-objective perspective. To illustrate the proposed approach, classical systems from literature are studied (IEEE 30-Bus and IEEE-RBTS) along with a simplified version of the Italian power system. As presented, the approach can be used as an initial straightforward screening approach to identify severe system disturbances and, to reproduce and/or significantly improve upon the results presented in previous studies.

    Translated title of the contributionPower system vulnerability screening using multiple-objective deterministic interdiction
    Original languageSpanish
    Pages (from-to)61-69
    Number of pages9
    JournalRevista de la Facultad de Ingenieria
    Volume25
    Issue number1
    StatePublished - Mar 2010

    Keywords

    • Contingency screening
    • Interdiction
    • Multi-objective evolutionary optimization
    • Power system security
    • Vulnerability

    Fingerprint

    Dive into the research topics of 'Power system vulnerability screening using multiple-objective deterministic interdiction'. Together they form a unique fingerprint.

    Cite this