Please use this identifier to cite or link to this item: https://ah.lib.nccu.edu.tw/handle/140.119/59447
題名: 基於圖形理論的電網脆弱性分析及抵禦連鎖性失效之安全策略
Graph-based vulnerability analyses on power grid and associated protection strategies against cascading failures
作者: 易敬剛
Yi, Ching Kang
貢獻者: 蕭又新
Shiau, You Hsien
易敬剛
Yi, Ching Kang
關鍵詞: 電力網路
複雜網路
連鎖性失效行為
脆弱分析
安全策略
power grid
complex network
cascading failure
vulnerability
protection strategy
日期: 2012
上傳時間: 2-Sep-2013
摘要: 於歷史事件中我們知道電力網路中些許的傷害會導致大停電事件的發生,而電力網路的安全是學者們一直以來關心的議題,複雜網路發展至今,已有不少研究人員利用複雜網路的方法來分析電力網路,本論文即利用複雜網路的分析方法,分析台灣電力網路脆弱性,並提出一新穎的保護策略。\r\n 文章中引用三種分析方法分析台灣電力網路的脆弱性,第一為根據網路效率(efficiency of complex network),第二為根據靜態負載的連鎖性失效(static load cascading failure),第三為根據動態負載的連鎖性失效(dynamic load cascading failure),三種脆弱性分析的方法得到結果的交集處,在文中被認為是電力網路中最具風險的變電站。根據靜態負載的連鎖性失效的結果,我們在不改變網路結構和整體網路的負載量之下,提出一新穎的安全策略,試圖降低靜態負載時連鎖性失效帶來的傷害,並分析此安全策應用至ER隨機網路(ER random network)、BA無尺度網路(BA scale-free network)和台灣電力網路,且量化其結果。\r\n 三種脆弱分析的結果皆有共通的部份,表示台灣電力網路在拓樸分析下並不堅固,其結果顯示此安全策略是有效的。本篇論文分析的網路均是無權重也無方向性的網路,如此,未來在網路脆弱性與安全策略的研究還有進一步的研究空間。
From blackout events in history, we know the damage of a few substations or transmission lines can lead to a big blackout, and the robustness of power grids are always a great concern. Recently the topological analyses of power grid network have developed rapidly and its achievements have become a center of attention. This thesis aims to investigate the vulnerability of Taiwan’s power grid through topological analyses and propose a novel protection strategy. \r\n This thesis introduces three methods to investigate the vulnerability of Taiwan’s power grid. The first method is based on efficiency of complex network. The second method is based on static load cascading failure. The third method is based on dynamic load cascading failure. The common results of the three results are considered the high risks in Taiwan’s power grid. According to the static load cascading failure, we propose a protection strategy against cascading failure without changing the structure of network and the whole load of the network, and then demonstrate the effectiveness of this strategy on an ER random network, a BA scale-free network and Taiwan’s power grid numerically. \r\n The three methods having the common results, one may say Taiwan’s power grid isn’t robust under the topological analyses, and our protection strategy may be useful for decreasing the damage after cascading failure.
參考文獻: Barabäsi, A. L. and R. Albert (1999). \"Emergence of Scaling in Random Networks.\" Science 286: 509-512.\r\n \r\nBrandes, U. (2001). \"A Faster Algorithm for Betweenness Centrality.\" Mathematical Sociology 25(2): 163-177.\r\n \r\nCrucittia, P., et al. (2004). \"Error and attack tolerance of complex networks.\" Physica A 340: 388-394.\r\n \r\nErdős, P. and A. Rényi (1960). \"On The Evolution Of Random Graphs.\" PUBLICATION OF THE MATHEMATICAL INSTITUTE OF THE HUNGARIAN ACADEMY OF SCIENCES.\r\n \r\nEusgeld, I., et al. (2009). \"The role of network theory and object-oriented modeling within a framework for the vulnerability analysis of critical infrastructures.\" Reliability Engineering and System Safety 94: 954-963.\r\n \r\nGlanz, J. and R. Perez-Pena (2003). That Left Tens of Millions of People in the Dark. New York Times. 26.\r\n \r\nGoh, K. I., et al. (2001). \"Universal Behavior of Load Distribution in Scale-free Networks.\" Physical Review Letters 87.\r\n \r\nHolme, P. and B. J. Kim (2002). \"Attack vulnerability of complex networks.\" Physical Review E 65.\r\n \r\nLatora, V. and M. Marchiori (2001). \"Efficient Behavior of Small-World Networks.\" Physical Review Letters 87.\r\n \r\nLiu, Y. H. (2012). Computational large-scale complex networks : competition network and power grid. Applied Physics, National Chengchi University.\r\n \r\nMotter, A. E. (2004). \"Cascade control and defense in complex networks.\" Physical Review Letters 93.\r\n \r\nMotter, A. E. and Y.-C. Lai (2002). \"Cascade-based attacks on complex networks.\" Physical Review E 66(065102).\r\n \r\nNewman, M. (2010). Networks: An Introduction. New York, Oxford University Press \r\n \r\nNg, A. K. S. and J. Efstathiou (2006). Structural Robustness of Complex networks. Engineering Science, Oxford.\r\n \r\nPahwa, S., et al. (2010). Topological Analysis of the Power Grid and Mitigation Strategies Against Cascading Failures. 2010 4th Annual IEEE Systems Conference. San Diego, CA, Systems Conference, 2010 4th Annual IEEE: 272-276.\r\n \r\nSimonsen, I., et al. (2008). \"Transient Dynamics Increasing Network Vulnerability to Cascading Failures.\" Physical Review Letters 100.\r\n \r\nStrogatz, S. H. (2001). \"Exploring complex networks.\" Nature 410: 268-276.\r\n \r\nWang, I. W. and L. L. Rong (2009). \"A model for cascading failures in scale-free networks with a breakdown probability.\" Physica A 388: 1289-1298.\r\n \r\nWang, J. (2013). \"Robustness of complex networks with the local protection strategy against cascading failures.\" Safety Science 53: 219-225.\r\n \r\nWang, J. W. and L. L. Rong (2011). \"Robustness of the western United States power grid under edge attack strategies due to cascading failures.\" Safety Science 49: 807-812.\r\n \r\nWang, W.-X. and G. Chen (2008). \"Universal robustness characteristic of weighted networks against cascading failure.\" Physical Review E 77.\r\n \r\nWong, J. J. (2007). Study of Preventive and Remedial Strategies based on Simulations and Analyses of 729 Blackout in Taiwan Power System. Electrical Engineering, National Chung Cheng University.\r\n \r\nYong, S. S. (2004). \"Revelation of America and Europe Great Blackout in 2003.\" Electrical Equipment 5(2).\r\n \r\nZhu, Y., et al. (2012). Load Distribution Vector Based Attack Strategies against Power Grid Systems. Globecom 2012 - Communication and Information System Security Symposium. Anaheim, CA, Global Communications Conference (GLOBECOM), 2012 IEEE: 935 - 941.
描述: 碩士
國立政治大學
應用物理研究所
100755006
101
資料來源: http://thesis.lib.nccu.edu.tw/record/#G0100755006
資料類型: thesis
Appears in Collections:學位論文

Files in This Item:
File SizeFormat
index.html115 BHTML2View/Open
Show full item record

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.