Power Transmission System Analysis Against Faults and Attacks by
Power Transmission System Analysis Against Faults and Attacks by
by CRC Press
6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742
The right of Tamalika Chowdhury, Abhijit Chakrabarti, and Chandan Kumar Chanda to be identified
as the authors of the editorial material, and of the authors for their individual chapters, has been
asserted in accordance with Sections 77 and 78 of the Copyright, Designs and Patents Act 1988.
Reasonable efforts have been made to publish reliable data and information, but the author and
publisher cannot assume responsibility for the validity of all materials or the consequences of
their use. The authors and publishers have attempted to trace the copyright holders of all material
reproduced in this publication and apologize to copyright holders if permission to publish in this
form has not been obtained. If any copyright material has not been acknowledged please write and
let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced,
transmitted, or utilized in any form by any electronic, mechanical, or other means, now known
or hereafter invented, including photocopying, microfilming, and recording, or in any information
storage or retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, access www.copyright.
com or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA
01923, 978-750-8400. For works that are not available on CCC please contact mpkbookspermissions@
tandf.co.uk.
Trademark notice: Product or corporate names may be trademarks or registered trademarks and are
used only for identification and explanation without intent to infringe.
Typeset in Times
by codeMantra
xi
Preface
Large-scale disruptions of the power grid have occurred several times across the globe
confrming the existence of inherent vulnerabilities. The grid network of Switzerland
suffered a major setback due to electrical failures on 28th September 2003. North
America also faced a major blackout in 2003. Such failures affect millions of people
and cause losses of billions of dollars. Similar incidents were reported in Canada in
1998, in Europe in 2006, in United States due to Katrina, in 2007, etc. On 30th and
31st July 2012, the failure of the Indian grid affected 680 million people and loss of
billions of dollars.
To minimise the economic, social and political impacts of power system outages,
the grid must be suffciently strong to face the vulnerability. The response of the grid
against such diverse disruptions is a matter of concern. Indeed, it is clear that after
decades of human and technological growth, problems are inevitable; however, it
is important is respond to the problems. These challenges motivate research on the
aspects of vulnerability analysis of power system networks.
To assist in developing tools or metrics that could be used for early identifcation
of the zones of possible unplanned failure or attack, this book attempts to develop
methodologies to identify the vulnerable elements, vulnerability of the network and
its resiliency while encountering natural calamities or attacks at its key elements.
The modelling of power system as a complex network offers a framework to anal-
yse the response of the grid system and distribution system while the network is
subjected to the threat of failure and even the threat of cascading collapse. To achieve
this target, different mathematical and computational techniques in line with the
techniques used in complex network theory and some aspects of the concepts of
probability have been utilised in this book.
Chapter 1 introduces the vulnerability analysis of power grids from a complex
network perspective. In this chapter, the background of the work is described as
the missing link between previous studies and how these details make the study of
vulnerability analysis of power grids much more useful. A brief history of complex
networks under this research domain are also presented. Moreover, how power grid
is characterised with complex features is discussed in the chapter.
In Chapter 2, the concepts of bus admittance matrix and bus impedance matrix are
discussed in detail for assessing the vulnerability of the transmission system employ-
ing complex network theory. In this chapter, traditional fault analysis approach in
power system using symmetrical components has been utilised. Formation of Ybus
matrix as well as Zbus matrix are explained in the chapter followed by determination
of symmetrical fault current using [Zbus] inversion. Three phase balanced fault, Line
to ground (L-G) fault, Line to line (L-L) fault, Double line to ground (L-L-G) and
Open Conductor faults are analysed using [Zbus]. Line currents during fault condition
and open conductor faults are also determine.
In Chapter 3, the concept of contingency plays an important role in planning an
islanding condition during emergency. Post-switching condition (transient state) of
any component in power transmission system, any overload or overvoltage conditions
xiii
xiv Preface
are checked to predict the steady bus voltage and line currents. Hence, contingency
analysis is necessary to assess every step after addition or removal of lines along
with the use of Zbus building algorithm. This chapter depicts cases of single as well
as multiple contingencies. The concept of equivalencing of more than one network
area by using tie lines and, consequently, inter-tie contingency analysis is described.
In Chapter 4, a comprehensive description of the parameters in complex net-
work theory is presented employing a pure topological approach. The concept of
incorporating specifc electrical features of power systems is introduced in model-
ling of a power network as a complex network. Applying the mathematical concepts
of complex network theory, an extended topological methodology (betweenness,
vulnerability using global effciency and netability) is discussed, which involves
complex network theory and electrical features of power systems. Criticality assess-
ment employing electrical centrality is also discussed, and subsequently, concepts of
vulnerability indices are introduced.
In Chapter 5, vulnerability and criticality of power networks are assessed in
grid-connected power system. Commonly used power system operating param-
eters have been utilised to rank critical lines based on the magnitudes of electrical
betweenness. In the simulation, physical parameters of the power system that includes
line fow, power limits and transmission capabilities are incorporated to analyse the
vulnerability of the power network after obtaining the concept of netability using
complex network theory. A new index called Grid Vulnerability Index (GVI) has
been introduced in the context of advancing system performance.
Chapter 6 details the analysis of cascading failure and islanding in grid networks.
In this chapter, power systems are modelled for unplanned outages and attacks lead-
ing to cascading failure. The electrical betweenness of transmission lines and/or
nodes has been utilised to ascertain the criticality of transmission line(s) that might
pose a potential threat of outage.
Considering the concept of preferential load distribution among adjacent lines,
the simulation examines whether any line exceeds its ultimate capacity and becomes
an overloaded line prone to cascading failure, subsequent to dynamic redistribution
of load. The evolution of probabilistic tools along with their correlation with com-
plex parameters illustrates their strong infuence in modelling cascading failures.
Cascading failure model is analysed using preferential probability ultimately leading
to system islanding.
In Chapter 7, the immunity of a power network against unplanned or designated
vulnerable attacks is defned. The concepts of complex network theory, integrated
with statistical methods, are employed to determine the criticality of damage to the
nodes and edges of topographical model of an electrical power system encounter-
ing a vulnerable attack on the power system. The capability of the network to resist
fragmentation and mitigate and overcome stresses and failures are characterised by
the resiliency of the network. Betweenness centrality of an electrical power network
being one of the prime parameters of assessment for vulnerability of that network,
computations have been conducted to obtain the moments of degree distribution of
the network. This chapter highlights the quantifcation of critical fraction of dam-
aged nodes as well as the percolation threshold of the power network and the char-
acterisation of resiliency of a typical electrical power system following a routine
Preface xv
electrical failure, outage or designated attack on that electrical power system. This
chapter assesses metrics that resist and mitigate stresses and failures of the power
system to ensure network survival in case of extreme events and natural or man-made
disasters. Probabilistic approach has been applied to determine the loss of connectiv-
ity of the networks, and hence assessment of resiliency metrics in both transmission
and distribution networks.
In Chapter 8, distributed generation is defined and described in detail includ-
ing the most widely used renewable energy sources. Solar, wind, small hydro and
tidal energy sources are discussed. The chapter explains how distributed renewable
energy sources that are a part of the power system are a better alternative. Distributed
generation has been applied to develop an effective mitigation strategy to enhance
the robustness of the distribution system. In this process, simulations are conducted
to obtain an optimal size and placement position for the distributed generation
in the complex power network using distributed energy resources. The impact of
distributed renewable energy sources on the power loss and voltage profile of sub-
transmission network at different penetration levels are worth investigating in this
chapter. This chapter shows how application of distributed renewable energy sources
can reduce the criticality of the entire network. The benefit of installing distributed
generation at the critical nodes (buses) of the same electrical power network has also
been discussed.
The authors have attempted to present the topics covered in this book in a lucid
language. Any constructive criticism and/or suggestion to further enhance the knowl-
edge related to the topics presented will be highly appreciated.
Tamalika Chowdhury
Abhijit Chakrabarti
Chandan Kumar Chanda
Kolkata, India
Acknowledgments
The authors acknowledge the motivation and support given by the management of
IIEST Shibpur and Jain College of Engineering, Belgaum, Karnataka, India. The
authors also express their sincere thanks to Dr. Debraj Sarkar for his motivation
and support in preparing the book. Dr. Tamalika Chowdhury further acknowl-
edges the blessings and love of her parents Prof. (Rtd.) Tapan Kumar Chowdhury
and Prof. Alpana Chowdhury. The authors fnally mention the criticism and queries
raised by their students and scholars while they teach the courses related to this topic.
These criticisms and queries helped the authors to re-orient the mode of presentation
of the topics covered in this book.
Tamalika Chowdhury
Abhijit Chakrabarti
Chandan Kumar Chanda
xvii
Authors
Tamalika Chowdhury Ph.D. (Engg.) is an assistant professor in Jain College of
Engineering, Belagavi. She has been a research scholar in the Department of Electrical
Engineering, Indian Institute of Engineering Science & Technology (IIEST), Shibpur
(formerly BE College Shibpur) Howrah, West Bengal, India. She pursued her Ph.D.
program under UGC-BSR Fellowship. She received her B.Tech and M.Tech degree
in electrical engineering from West Bengal University of Technology (WBUT). Her
research interests include power grid, power system vulnerability, manifestation of
renewable energy-based distributed generation in power system and assessment of
power grid resilience using complex network theory.
xix
xx Authors
degree under the supervision of Dr. Chanda. He has visited several countries includ-
ing United States, UK, Australia, Japan and China for academic purposes. He is a
senior member of IEEE (United States), member of IET (UK), Fellow of Institution
of Engineers (I), C-Engineering (I) and life-member of ISTE.
1 Introduction
Hence, one critical feature of power systems is that the production (genera-
tion) and consumption are completed almost simultaneously, and thus, the
power supply and demand need to be balanced instantaneously. If the bal-
ance is broken, the system will lose its stability, which will lead to power
outages of different scales.
ii) Large-scale power: A modern power system consists of three subsystems:
the frst system, where the energy conversion, transmission, distribution and
consumption take place. The second one is the automatic control system,
also called the secondary system, which is responsible for the secure, stable
and economic operation of the power system. And the third is the power
trading system. The secondary system usually has more components than
the primary system as, in addition to the communication equipment, a large
number of sensors are installed to monitor various states, such as voltage,
current and temperature, of the devices in the primary system. Since the
last couple of decades, the interconnection of regional power systems has
attempted to optimise the use of hydroelectric, thermal and nuclear pow-
ers together with other energy resources inviting more constraints into the
picture.
iii) Modern power system components are complex: The power system
components are not only huge and of numerous kinds but the components
have different complexities as well. Generators and motors that are based
on electromagnetic induction law and Newton’s second law are the most
common components that are used to realise the conversion between elec-
trical and mechanical energies. Others components such as boilers, pres-
sure pipes, coal mills and reactors help to convert chemical, hydraulic and
nuclear energies to mechanical energy. Post 1990s, with the rapid devel-
opment in electronic technologies, high-voltage direct current transmis-
sion (HVDC), thyristor-controlled series compensation and static VAR
compensator as well as other FACTS devices have been utilised widely,
which makes the electric components in power systems more complicated.
Different from traditional power equipment, their main functionality is to
fexibly switch the power electronic devices to control power transmission.
Loads are the most complicated class of components in power systems. The
modelling of dynamic loads has not been fully solved yet. Researchers usu-
ally classify loads into constant impedance loads, temperature-controlled
loads, compressor loads and other simplifed models. In addition, various
protections and controls are important classes of complex components in
power systems. For example, for a generator, there are usually excitation
controllers, speed controllers, low-frequency protectors, under- and over-
excitation limiters. There are also centralised control systems, such as
Automatic Generation Control and Automatic Voltage Control, located in
dispatch centres to coordinate and control the overall performance of the
entire system.
iv) Factors affecting secure operation of power grid: Climatic changes,
human activities and natural calamities such as earthquakes, lightning,
snow and storms force power systems to be constantly exposed to various
4 Power Transmission System Analysis Against Faults and Attacks
From the above four aspects, it is clear that modern power systems are large-scale
complex systems. Therefore, naturally, they become one subject in complexity
studies. Although modern power systems have complex dynamic characteristics,
their robustness and reliability are relatively high due to the implementation of
various protections and controls. However, serious losses were caused in the few
power failures reported in the past years. The interconnection between differ-
ent areas/zones brings both great social and economic benefts as well as risk
for failures, especially cascading failures and blackouts. Large-scale disruptions
of the power grid have occurred several times across the globe confrming the
existence of inherent vulnerabilities. The grid network of Switzerland suffered a
major setback due to electrical failures on 28th September 2003. North America
also faced a major blackout in 2003. Such failures affect millions of people and
cause losses of billions of dollars. Similar incidents have occurred in Canada in
1998, in Europe in 2006, in United States due to Katrina, in 2007, etc. On 30th
and 31st July 2012, the failure of Indian grid affected 680 million people and loss
of billions of dollars.
To minimise the economic, social and political impacts of power system outages,
the grid must be suffciently strong to face the vulnerability. The response of the grid
against such diverse disruptions is a matter of concern. Indeed, one thing is clear that
after decades of human and technological growth, problems are inevitable; however,
it is important to respond to these problems. These challenges motivate to work on
the aspects of vulnerability analysis of power system networks.
Modern power system security is prone to unplanned outages due to natural
calamities and cyber threats that may lead to destructive consequences for the power
system network. In traditional concepts of power system security, researches restored
the power network and maintained the operation of the system against electrical con-
tingencies. However, with time and increasing complexity in the power network, the
complex power network is much more susceptible to unplanned outages as well as to
cyber-attacks and physical failures of key elements of the power system that includes
both grid and distribution systems.
To assist in developing tools or metrics that could be used for early identifcation
of the zones of possible unplanned failure or attack, the upcoming chapters state
methodologies to analyse the power system faults and contingencies in a classical
way and to identify the vulnerable elements, vulnerability of the network and its
resiliency while encountering outages due to natural calamities or attacks at its key
elements.
Introduction 5
With new advances in complex network theory, most of the complex systems in
the world can be modelled and described in the form of a complex network. Several
network models have been proposed with the intention of studying the topological
characteristics and behaviour of such complex systems. The types of networks can be
broadly classifed as regular, small-world, random and scale-free networks.
FIGURE 1.1 Different types of complex networks: (a) Regular, (b) random, (c) small word,
and (d) scale free.
Introduction 9
of the current condition of power system. Security assessment is the process whereby
any violation of the actual system operating is determined. The conventional meth-
ods for security assessment are based on load fow solution where full AC load fow
is made to run for all contingencies. Load fow constitutes the most important study
in a power system for planning, operation and expansion. The purpose of load fow
study is to compute operating conditions of the power system under steady state.
These operating conditions are normally voltage magnitudes and phase angles at
different buses, line fows (MW and MVAR), real and reactive power supplied by the
generators and power loss. The second and much more demanding function of secu-
rity assessment is contingency analysis. Operations personnel must know which line
or generation outages will cause fows or voltages to fall outside limits. To predict the
effects of outages, contingency analysis techniques are used.
Contingencies are defned as potentially harmful disturbances that occur dur-
ing the steady state operation of a power system. The contingencies are in the form
of network outage such as line or transformer outage or in the form of equipment
outage. The outage considered in transmission network are line outages. Outages
that are important from a limit violation viewpoint are branch fow for line security
or MW security and bus voltage magnitude for voltage security. The conventional
methods for security assessment are based on load fow solution where full AC load
fow is made to run for all contingencies. Contingency procedure includes failure
events one after another in sequence until “all credible outages” have been studied.
For each outage tested, the contingency analysis procedure checks all lines and volt-
ages in the network against their respective limits.
electrical contingencies. However, with time and increasing complexity in power net-
work, the complex power network has become susceptible to unplanned outages as
well as cyber-attacks and physical failures of key elements of the power system that
includes grid system and the distribution system.
A cyber attacker is an intelligent agent capable of coordinating attacks that result
in deliberate component failures, which increases the risk of low-probability, high-
impact contingency scenarios. The grid network or the distribution network is also
vulnerable while encountering unplanned contingencies during natural calamity.
The traditional physical contingency analysis tools rely on a version of the power
fow problem, which requires calculating the solution of operating parameters for all
buses in the power system. While personnel within a utility may have knowledge of
specifc bus injections and voltage magnitudes needed to solve the power fow prob-
lem, it is not uncommon that a cyber attacker plans to identify critical elements in the
power network and fulfls their evil desire in making the power system vulnerable
to attack at its critical elements. In addition, the power system faces high degree of
vulnerability when the system is subjected to unplanned electrical failures of a few
of its key elements during natural calamities.
Instances like faults at power stations, damage to electric transmission lines, sub-
stations or other parts of the distribution system, a short circuit, cascading failure,
fuse or circuit breaker operation may cause complete collapse of the power grid. In
addition to these, there has been instances of several targeted attacks on grids in
power system networks in an attempt to collapse the entire system network [33]. To
maintain the reliability of power systems, wide area monitoring systems are exploited
to obtain real-time system status, which is essential for the maintenance and control
of power systems. Most studies on security issues in smart grid have focused on
how to protect data transmission in power grid. Accordingly, the attack on the mea-
surements is called False-data Injection Attack (FIA) [26]. FIA allows attackers to
manipulate the estimated state of the power grid by changing the measurements on
a fraction of monitoring devices. When the attacker accesses the power grid com-
munication network, the attack can bypass the existing bad measurement detection.
The vulnerability assessment of power transmission networks employing com-
plexity science investigates the critical targeted vulnerable areas of such an attack.
Hence, it is a present-day requirement to be equipped with proper knowledge on
vulnerability of grid networks.
vertex
edge
Networks can be of different types: For instance, there can be networks with
similar nodes and edges or there can be networks with more than one type of nodes
and different types of edges. Further, these vertices and edges can have various
properties. For example, edges can have weights associated with them which might
represent how strongly or loosely any two nodes are connected. Such networks
are called weighted networks. Any information is transferred within the network
via the nodes using connecting links. Sometimes, the fow of this information can
only be in one direction, in which case the network is termed as directed graphs or
digraphs. These directed networks can either be cyclic containing a closed loop of
edges or acyclic containing no such loops. Then, there are undirected networks in
which fow of information can be in both directions of connections. Figure 1.3 shows
(a) (b)
(c) (d)
FIGURE 1.3 Examples of different types of networks. (a) Network with Identical nodes
and edges, (b) Network with different types of nodes and edges, (c) Network with different
weights put on to nodes and edges, (d) An example of Directed graph.
Introduction 13
simple examples of various types of networks. Figure 1.3a shows a network with
identical nodes and edges, Figure 1.3b shows different types of vertices and con-
nections, Figure 1.3c represents a network in which nodes and edges have differ-
ent weights associated with them and Figure 1.3d shows an example of a directed
network.
To represent the power grid as a complex network, an unweighted and undirected
graph composed of nodes and edges needs to be built frst. Using metrics from graph
theory and modern complex networks analysis, the results provide insight into the
properties of power grids, considering only topological information. In summary, the
goal of this model is to characterise the topological structure of the power transmis-
sion grid.
To study power grids with this model, some simplifcations are necessary. In
the undirected graphs, each node represents a bus. It is important to note that
in the physical grid, these buses can have different electrical properties; how-
ever, in this chapter, nodes are assumed to be homogeneous. This model ignores
whether generators, loads, transformers or transmission lines connect to the bus.
In the same manner, all transmission lines are modelled as edges with equal
weight. Physical length and electrical impedance are ignored in the undirected
graph representation.
The graph theory is the basic concept from which complex network theory has
been derived. The power grid can be abstracted into the complex network with undi-
rected graph G = {V, E}. It consists of two sets V and E, where the elements of
V = {v1, v2, …, vN} are the nodes (or vertices, or buses) of the graph G, while the ele-
ments E = {e1, e2,…, eL} are its links (or edges or lines). The total number of nodes
and links of the graph are N and L, respectively. The association of nodes with each
other can be shown using adjacency matrix. If an edge eij exits between two nodes i
and j, then the adjacency matrix A having order N × N whose entry aij becomes one
and zero otherwise. Adjacency matrix is a N × N binary matrix in which the value of
[i, j]th cell is 1 if there exists an edge originating from ith vertex and terminating to jth
vertex, otherwise the value is 0.
A power system can be considered a large complex network with nodes and
edges. The generators, bus bars and loads can be identifed as the nodes and the
connecting transmission lines can be modelled as the edges or links. Let us con-
sider a sample network consisting of fve buses and seven lines modelled as an
undirected graph.
Figure 1.4 shows the undirected graph of a system with fve nodes and seven
edges. It can be modelled using the principles defned above and mathematically
represented as a matrix shown below:
° 0 0 1 1 0 ˙
˝ 0 0 1 0 1 ˇ
˝ ˇ
A=˝ 1 1 0 1 1 ˇ
˝ 1 0 1 0 1 ˇ
˝ ˇ
˛˝ 0 1 1 1 0 ˇˆ
14 Power Transmission System Analysis Against Faults and Attacks
1 2
4 5
1 5
0 2
Example 1.1
Problem Statement: Consider a graph given in Figure 1.5 below. Find the adja-
cency matrix for the network.
Solution
1 5
0 2
In the directed graph, an edge is represented by an ordered pair of vertices (i, j), in
which edge originates from vertex i and terminates on vertex j.
Example 1.2
Problem Statement: Consider the same sample network in Example 1.1 but as
directed graph, as shown in Figure 1.6. Find the adjacency matrix.
Solution
Furthermore, we can add weights to the connecting links which could be a mea-
sure of electrical or topological property depending on the application. In that
case, the 1’s will be replaced by the respective weights of the links. This will be
further illustrated through various examples in this section.
WEIGHTED GRAPH
A graph is called a weighted graph when it has weighted edges, which means
there are some “value” associated with each edge in the graph. For example, con-
sider Figure 1.7 where there are weights associated with each edge.
16 Power Transmission System Analysis Against Faults and Attacks
2
1 3
4 7
4
5
0 2 5
4
3 6
2 4
Example 1.3
Consider an undirected weighted graph as shown in the Figure 1.8 and fnd its
adjacency matrix.
4
1 2
5 3
3 4
6 4 3
1
2
5 4
3
Solution
˜ 0 4 0 3 0 5 ˝
˛ 4 0 3 4 4 0 ˆ
˛ 0 3 0 2 0 0 ˆ
A=˛ ˆ
˛ 3 4 2 0 3 0 ˆ
˛ 0 4 0 3 0 1 ˆ
˛° 5 0 0 0 1 0 ˆ˙
Example 1.4
Consider a directed weighted graph as shown in the Figure 1.9 and fnd its adja-
cency matrix.
Solution
The adjacency matrix for this directed weighted graph will be:
˜ 0 4 0 0 0 0 ˝
˛ 0 0 0 4 0 0 ˆ
˛ 0 3 0 0 0 0 ˆ
A=˛ ˆ
˛ 3 0 2 0 3 0 ˆ
˛ 0 4 0 5 0 1 ˆ
˛° 5 0 0 0 0 0 ˆ˙
4
1 2
5 3
3 4
6 4 3
1
2
3
5 4
p=0 p=1
increased randomness
FIGURE 1.10 Relationship between network models and randomness. (a) Regular, (b) small
word, and (c) random.
Introduction 19
obtained from some standard power engineering methods, which suggested that
scale-free network models are applicable for estimating aggregate electric grid
reliability [33].
power grid that the loss of a single substation can lead to a 25% loss of transmission
effciency caused by an overload cascade in the network. A systematic study of the
damage caused by the loss of vertices suggested that 40% of the disrupted transmis-
sion substations may lead to cascading failures. While the loss of a single vertex
can exacerbate primary substantial damage, the subsequent removals only make the
situation worse.
Large-scale blackouts can be triggered by the failure of vertices with high loads.
Perhaps it is because some highly connected vertices may not be necessarily involved
in a high number of paths. A counterintuitive result was found that the attack on the
vertices with the lowest loads is more harmful than the attack on the ones with the
highest loads.
Within the framework of cascading failures in power grids using a dynamical
fow model based on simple conservation and distribution laws, the role of the tran-
sient dynamics of the redistribution of loads towards the steady state after the failure
of network edges was studies. It was found that considering only load fows in the
steady state gives a best case estimate of the robustness; the worst case of robust-
ness can be determined by the instantaneous dynamic overload failure model. The
results of Norwegian high-voltage power grid showed that the size distribution of
power blackouts in Norwegian power grid seems to follow a power law probability
distribution.
an attacker can inject false data into a state estimator, they can alter the result of a
security constrained optimal dispatch application, which can lead to the generator
redispatching that results in uneconomic operation of a system and/or an insecure
operating state [42]. Research activities have been pursued to develop more robust
bad data detection algorithms that can detect a state estimator FIA [43].
Moreover, of interest is the vulnerability of Supervisory Control and Data
Acquisition (SCADA) systems to cyber-attacks. While SCADA systems tend to be
isolated from public communication networks, features such as remote vendor and
engineering access into substation networks for legitimate purposes have created an
attack surface from which a skilled attacker can obtain unauthorised entry into a
SCADA system [44].
REFERENCES
1. I. Dobson, B. Carreras, V. Lynch, and D. Newman, “Complex systems analysis of
series of blackouts: Cascading failure, critical points, and selforganization”, Chaos: An
Interdisciplinary Journal of Nonlinear Science, vol. 17, pp. 26–103, 2007.
2. A. Wildberger, “Complex adaptive systems: Concepts and power industry applications”,
IEEE Control Systems Magazine, vol. 17, no. 6, pp. 77–88, 2002.
3. F. Heylighen, “Five questions on complexity”, Arxiv preprint online, 2007.
4. G. Chaitin, Information, Randomness and Incompleteness: Papers on Algorithmic
Information Theory, Singapore: World Scientifc Singapore, 1997.
5. S. Manson, “Simplifying complexity: A review of complexity theory”, Geoforum, vol.
32, no. 3, pp. 405–414, 2001.
6. D.L. Harris, M. Mitchell Waldrop: Complexity-the Emerging Science at the Edge of
Order and Chaos, New York: Simon and Schuster Inc., 1992.
7. Lewin, R., Complejidad. El caos como generador del orden, Barcelona: Tusquets
Editores, 1995.
8. R.V. Solé and S.C. Manrubia, Orden y caos en sistemas complejos, Barcelona: Edicions
UPC, 1996.
9. R. Solé and B.C. Goodwin, Signs of Life: How Complexity Pervades Biology, New
York: Basic Books, 2001.
10. P. Érdi, Complexity Explained, Heidelberg: Springer-Verlag, 2008.
11. J. Singh, Great Ideas in Information Theory, Language and Cybernetics, New York:
Dover Publications Inc., 1966.
12. S. Kauffman, At Home in the Universe, New York: Oxford University Press, 1995.
13. S. Wolfram, A New Kind of Science, Champaign, IL: Wolfram Media, 2002.
14. S.H. Strogatz, “Exploring complex networks”, Nature, vol. 410, pp. 268–276, 2001.
15. V. Latora and M. Marchiori, “Effcient behaviour of small-world networks,” Physical
Review Letters, vol. 87, no. 19, p. 198701, 2001.
16. P. Erdos and A. Renyi, “On the evolution of random graphs,” Publications of the
Mathematical Institute of the Hungarian Academy of Sciences, vol. 5, pp. 17–61, 1960.
17. R. Albert, H. Jeong, and A.L. Barabasi, “Error and attack tolerance of complex net-
works,” Nature, vol. 406, pp. 378–382, 2000.
18. D.J. Watts and S.H. Strogatz, “Collective dynamics of ‘small-world’ networks,” Nature,
vol. 393, no. 6684, pp. 440–442, 1998.
19. D.J. Watts, Small Worlds: The Dynamics of Networks between Order and Randomness,
Princeton, NJ: Princeton University Press, pp. 11–40, 1999.
20. M. Mitchell, “Complex systems: Network thinking,” Artifcial Intelligence, vol. 170, pp.
1194–1212, 2006.
22 Power Transmission System Analysis Against Faults and Attacks
21. A.L. Barabasi and R. Albert, “Emergence of scaling in random networks,” Science, vol.
286, no. 5439, pp. 509–512, 1999.
22. http://cs.wikipedia.org/wiki/Multiagentn%C3%AD_modelov%C3%A1n%C3 %AD.
23. L. Luo and P. Di Torino, Power system vulnerability and performance: Application
from complexity scienze and complex network, Doctoral Thesis, March 2014.
24. T.A. Ernster, Power system vulnerability analysis: A centrality based approach utilizing
limited information, Washington State University, Master of Science Thesis, August
2012.
25. http://web.ecs.baylor.edu/faculty/lee/ELC4340/Lecture%20note/Chapter9_GSO5.pdf.
26. H. Zhong, D. Du, C. Li, and X. Li, “A novel sparse false data injection attack method in
smart grids with incomplete power network information”, Complexity, vol. 2018, no. 2,
pp. 1–16, 2018.
27. A. Dwivedi, Vulnerability analysis and fault location in power systems using complex
network theory, Doctoral Thesis, RMIT University, March 2011.
28. D.J. Watts and S.H. Strogatz, “Collective dynamics of ‘small-world’ networks”, Nature,
vol. 393, pp. 440–442, 1998.
29. R. Albert, et al., “Error and attack tolerance of complex networks”, Nature, vol. 406, pp.
378–382, 2000.
30. L.A.N. Amaral, et al., “Classes of small-world networks”, Proceedings of the National
Academy of Sciences of the United States of America, vol. 97, pp. 11149–11152, 2000.
31. R. Albert, et al., “Structural vulnerability of the North American power grid”, Physical
Review E, vol. 69, pp. 25103–25106, 2004.
32. M. Rosas-Casals, S. Valverde, and R. Sol_e, “Topological vulnerability of the European
power grid under errors and attacks”, International Journal of Bifurcation and Chaos,
vol. 17, no. 7, pp. 2465–2475, 2007.
33. D.P. Chassin and C. Posse, “Evaluating North American electric grid reliability
using the Barabasi-Albert network model”, Physica A-Statistical Mechanics and Its
Applications, vol. 355, pp. 667–677, 2005.
34. P. Crucitti, et al., “Locating critical lines in high voltage electrical power grids”,
Fluctuation and Noise Letters, vol. 5, pp. L210–L208, 2005.
35. V. Rosato, et al., “Topological properties of high-voltage electrical transmission net-
works”, Electric Power Systems Research, vol. 77, pp. 99–105, 2007.
36. R. Solé, et al., “Robustness of the European power grids under intentional attack”,
Physical Review E, vol. 77, p. 26102, 2008.
37. A. Motter and Y. Lai, “Cascade-based attacks on complex networks”, Physical Review
E, vol. 66, p. 65102, 2002.
38. R. Kinney, et al., “Modeling cascading failures in the North American power grid”,
European Physical Journal B, vol. 46, pp. 101–107, 2005.
39. M. Govindarasu, A. Hann, and P. Sauer, “Cyber-physical systems security for smart
grid,” PSERC, Publication 12-02, February 2012.
40. C. Tranchita, N. Hadjsaid, and A. Torres, “Overview of the power systems security with
regard to cyberattacks,” Fourth International Conference on Critical Infrastructures,
ISGT Latin America, Medellin, Colombia, pp. 1–8, 27 March 2009 to 30 April 2009.
41. O. Kosut, L. Jia, R.J. Thomas, and L. Tong, “On malicious data attacks on power sys-
tem state estimation,” 45th International Universities Power Engineering Conference,
Cornell University, USA, pp. 1–6, 31 August to 3 September 2010.
42. Y. Yuan, Z. Li, and K. Ren, “Modeling load redistribution attacks in power systems,”
IEEE Transactions on Smart Grid, vol. 2, no. 2, pp. 382–390, 2011.
43. O. Kosut, L. Jia, R.J. Thomas, and L. Tong, “Malicious data attacks on smart grid
state estimation: Attack strategies and countermeasures,” First IEEE International
Conference on Smart Grid Communications, Gaithersburg, Maryland, pp. 220–225,
4–6 October 2010.
Introduction 23
2.1 INTRODUCTION
Usually, a power system operates under balanced conditions. However, electrical
fault may appear in the system leading to unbalanced system operation. Out of com-
mon electrical faults, the line fault is the most common. Much less common are the
faults on cables, generators, motors and transformers. The most common faults are
the single line-to-ground fault (L-G) followed by line-to-line (L-L), double line-to-
ground (L-L-G) and three-phase balanced (L-L-L-G) faults.
It is important to study the system under fault condition to provide necessary
system protection. In this chapter, the concept of symmetrical components [1] is
introduced and different types of faults are analysed using symmetrical component
theory so that the fault current and the voltages at different buses can be computed.
Line currents have also been obtained for different fault conditions. Once the fault
currents are determined at any part of the network, it becomes convenient for setting
protective relays for electrical protection of power systems.
25
26 Power Transmission System Analysis Against Faults and Attacks
(a)
G1 G2
ZA ZB
1 2
V1 V2
ZD
ZE ZC
V3
3
(b)
Reference Bus
0
I1 YA I2 YB
1 2
V1 V2
YD
YE YC
V3
3
FIGURE 2.1 (a) A three-bus power network. (b) Norton equivalent circuit of the three-bus
power network.
Analysis of Faults in Power System 27
˛ I1 ˆ ˛ V1 ˆ
˙ ˘ ˙ ˘
i.e. ˙ I 2 ˘ = [YBUS ] ˙ V2 ˘. (2.7c)
˙ 0 ˘ ˙ ˘
˝ ˇ ˝ V3 ˇ
Here Y11 = (YA +YD +YE ), Y12 = −YD , Y13 = −YE , and so on.
[YBUS ] is called bus admittance matrix where Y11, Y22 and Y33 are the diagonal ele-
ments and Y12, Y13, Y21, Y23 , Y31 and Y32 are the off-diagonal elements of the bus admit-
tance matrix. The diagonal elements are also termed as self-admittances, and each
of the elements is the summation of all the admittance connected to the respective
bus, while the off-diagonal elements are termed as transfer admittances, with each
representing the admittances connected between the concerned bus and other buses.
Obviously,
n
Yii = ˜y ij
j=0
j ˛i
For the power networks, [YBUS ] is a square matrix of order n × n, n being the number
of buses. Moreover, it may be noted that [YBUS ] is symmetrical as yij = y ji . Because
28 Power Transmission System Analysis Against Faults and Attacks
the elements of [YBUS ] matrix are complex numbers in power networks, [YBUS ]
matrix itself is complex. In addition, Yij (i ˛ j ) = 0 if the i th bus is not connected to
bus j through a line. In real-life power system, several interconnections do not exist
between a number of buses, and hence the [YBUS ] matrix becomes highly sparse (con-
taining a number of zero elements in the matrix). This saves a lot of computer storage
and memory requirements.
Example 2.1
Solution
1
y12 = = − j2 p.u. = y21
j0.5
1
y13 = = − j1.25 p.u. = y31
j0.8
1
y23 = = − j2.5 p.u. = y32
j0.4
Y11 = y12 + y13 = − j3.25 p.u.; Y12 = −y12 = j2 p.u. = Y21; Y13 = −y13 = j1.25 p.u. = Y31
Y22 = y21 + y23 = − j4.5 p.u.; Y23 = −y23 = j2.5 = Y32 ; Y33 = y31 + y32 = − j3.75 p.u.
1 2
j0.5
j0.8 j0.4
Example 2.2
A three-bus power system is shown in Figure 2.3 indicating the p.u. line reactances
of each line. Find the bus admittance matrix.
Solution
1 1
˜ y10 = = = − j10 p.u.
Z10 j0.1
1 1
y12 = = = − j5p.u. = y21
Z12 j0.2
1 1
y23 = = = j20 p.u. = y32
Z 23 − j0.05
1 1
y30 = = = − j10 p.u.
Z 30 j0.1
1 2 3
j0.2 -j0.05
j0.1 j0.1
It may be noted for this problem, in the given data, the reactance between buses 1
and 2 is (j0.2) p.u. while that between buses 2 and 3 is (−j0.05) p.u. It indicates that
the reactance between buses 1 and 2 is inductive, while the reactance between
buses 2 and 3 is capacitive. Moreover, there is no reactance value given between
bus 2 at the reference bus. This makes y20, the admittance between bus 2 and the
reference bus, zero.
Primary voltage
i Vj j
Vi Vpri=aVj(=V'i)
Si yij
I'i Sj
Ii Ij
Ij / a*
yi0 yj0 Secondary voltage
Vsec=Vj
(a:1)
FIGURE 2.4 Representation of a regulating transformer along with the line model.
Analysis of Faults in Power System 31
Vi°
= a = a ˝˜
Vj
Also, when input power is equal to output power for the transformer, we have,
Vi˜I ˜i*= V j I *j
Vi˜ I*
or, = a = j*
Vj I˜i
Ij
I˜i*= (2.9)
a*
Next, we consider the current balance at two buses by the following two equations,
Si*
Ii = = Vi yi0 + (Vi − aV j ) yij = Vi y0 + (Vi − aV j ) yij (2.10)
Vi*
Ij Si*
and = = aV j y j 0 + ( aV j − Vi ) yij = aV j y0 + ( aV j −Vi ) yij
a* ( aV j )*
[assuming yi0 = y j0 = y0 ]
˛ I j = (−a* yij ) Vi + aa* ( y0 + yij ) V j (2.11)
Let us now rewrite Equations (2.10) and (2.11) in pair form as follows,
I i = ( y0 + yij ) Vi + (−ayij ) V j
˛ Ii ˆ ˛ y0 + yij −ayij ˆ˛ ˆ
˙ ˘=˙ ˘ ˙ Vi ˘ (2.12)
˙˝ I j ˘ˇ ˙˝ −ayij aa* ( y0 + yij ) ˘ ˙˝ V j ˘ˇ
ˇ
or, [ I ] = [Y ] [V ]
32 Power Transmission System Analysis Against Faults and Attacks
˘ y0 + yij −ayij
where, [Y ] = (2.13)
−ayij aa* ( y0 + yij )
It may be noted that if (a) is complex, then [Y ] is not symmetric. If (a) be a real quan-
tity, that is, (a) = (kV)base/(kV)tap, then
˘ y0 + yij −ayij
[Y ] = (2.14)
−ayij a 2 ( y0 + yij )
i.e., V j˜ = aVi
I˜j* 1
=
I i* a
I i = a* I °j (2.16)
Primary voltage
Secondary voltage Vj
Vi Vpri=Vi
i j
Vsec=V'j=aVi
Ij / a*
Si
I'j yij Sj
Ij
Ii
Ij / a*
yi0 yj0
(1:a)
FIGURE 2.5 Inclusion of a regulating transformer with off-nominal tap ratio (1:a) in the
line model.
Analysis of Faults in Power System 33
At bus i
Also, at bus j
aa* ( y0 + yij ) −a* yij
˙ [Y ] = (2.20)
−ayij y0 + yij
˘
a 2 ( y0 + yij ) −ayij
[Y ] = (2.21)
−ayij y0 + yij
(a) Yse=ayij
i j
(b) Yse=ayij
i j
Ysh2=a2y0+a(a-1)yij Ysh2=y0+(1-a)yij
yj0
FIGURE 2.6 (a) Equivalent circuit model with transformer having off-nominal turns ratio
(a:1). (b) Equivalent circuit model with transformer having off-nominal turns ratio (1:a).
The [YBUS ] matrix can be modifed for inclusion of line with transformer with revised
form of its self (diagonal) and transfer (off-diagonal) elements as given below:
where Yii (old), Y jj (old) and Yij (old) are the elements of [YBUS ] formed without considering
line transformers.
Example 2.3
(a)
1 2
z12
V2
V'3
z31 z23
(b)
1 2
z12
z31
(c) Yse
2 3
Ysh1 Ysh2
FIGURE 2.7 (a) A three-bus three-line power system with transformer in line (23). (b) System
before considering the line with transformer. (c) “Pi” model of the line with transformer.
Line no. From Bus To Bus R (in p.u.) X (in p.u.) Off-nominal Tap Ratio of
Transformer
1 1 2 0.05 0.15 -
2 1 3 0.05 0.15 -
3 2 3 0 0.5 1:1.02
36 Power Transmission System Analysis Against Faults and Attacks
Solution
1
˛ y12 = y13 = = ( 2 − j6) p.u.
0.05 + j0.15
˘
(4 − j12) (−2 + j6) (−2 + j6)
[YBUS ] = (−2 + j6) (2 − j6) (0 + j0) p.u.
(−2 + j6) (0 + j0) (2 − j6)
1
Here, y23 = = − j2
j0.5
(4 − j12) (−2 + j6) (−2 + j6)
˙ [YBUS ] M = (−2 + j6) (2 − j8.0808) ( j2.04) p.u.
(−2 + j6) j2.04 (2 − j8)
[YBUS ] M represents the modifed [YBUS ] with the transformer included in line
between buses 2 and 3.
Analysis of Faults in Power System 37
(a) Va (b)
Vc1 Va1
120 0
1200 1200
Vc
Vb
Vb1
(c) (d)
Vb2 Va2
120 0
120 0 120 0
FIGURE 2.8 (a) Unbalanced phasors, (b) positive-sequence components of the phasors,
(c) negative-sequence components of the phasors, and (d) zero-sequence components of the
phasors.
38 Power Transmission System Analysis Against Faults and Attacks
˜ Va1 , Va2 , Va 0 are known as the symmetrical components or, more specifcally, the
positive-sequence component, negative-sequence component and zero-sequence
component, respectively, of Va, and similarly Vb1 , Vb2 , Vb0 for Vb and Vc1 , Vc 2 , Vc 0 for Vc .
OQ = OP × a = a ∙ OP
OR = OP × a × a = a2 ∙ OP
a 4 = a 3 × a = (−0.5+ j0.866)
Q
P'
120 0
P
ref
120 0
120 0
a 5 = a 3 × a 2 = (−0.5 − j0.866)
1 + a + a 2 = 0 = 0 + j0
a − a 2 = j1.732 = j 3 = 3˛90°
a + a 2 = −1
1 + a = ( 0.5+ j0.866) = −a 2
˛ Va ˆ ˛ 1 1 1 ˆ˛ V ˆ ˛ Va0 ˆ
˙ ˘ ˙ ˘ ˙ a0 ˘ ˙ ˘
˙ Vb ˘=˙ 1 a2 a ˘ ˙ Va1 ˘ = [ A] ˙ Va1 ˘ (2.25a)
˙ Vc ˘ ˙ a2 ˘ ˙ Va2 ˘ ˙ Va2 ˘
˝ ˇ ˝ 1 a ˇ˝ ˇ ˝ ˇ
˝ 1 1 1 ˇ
ˆ
where [ A] = ˆ 1 a2 a
ˆ 1 a a2
˙ ˘
Similar to Equation (2.25a), the unbalanced phase sequence can also be represented
in terms of sequence components (Equation 2.25b)
˜ I ˝ ˜ 1 1 1 ˝˜ I ˝
˛ a ˆ ˛ ˆ ˛ a0 ˆ
˛ Ib ˆ=˛ 1 a2 a ˆ ˛ I a1 ˆ (2.25b)
˛ Ic ˆ ˛ a2 ˆ ˛ Ia2 ˆ
° ˙ ° 1 a ˙° ˙
˛ Va0 ˆ ˛ Va ˆ
˙ ˘ −1 ˙ ˘
˙ Va1 ˘ = [ A] ˙ Vb ˘ (2.26a)
˙ Va2 ˘ ˙ Vc ˘
˝ ˇ ˝ ˇ
˝ 1 1 1 ˇ
1ˆ −1
where, [ A] = ˆ 1 a a2
3ˆ
˙ 1 a2 a ˘
˛ I a0 ˆ ˛ Ia ˆ
˙ ˘ −1 ˙ ˘
˙ I a1 ˘ = [ A] ˙ I b ˘ (2.26b)
˙ I a2 ˘ ˙ Ic ˘
˝ ˇ ˝ ˇ
1
˛ Va0 = (Va + Vb + Vc ) (2.27)
3
Analysis of Faults in Power System 41
Also,
1
˛ Va2 =
3
(Va + a2Vb + aVc ) (2.28)
and, Va + aVb + a 2Vc = Va1 (1+ a 3 + a 3 ) +Va 2 (1+ a 2 + a 4 ) +Va 0 (1+ a + a 2 ) = 3Va1
1
˛ Va1 =
3
(Va + aVb + a2Vc ) (2.29)
1
Va1 =
3
(Va + aVb + a2Vc )
1
Va2 =
3
(Va + a2Vb + aVc ) (2.30a)
1
Va0 = (Va + Vb + Vc )
3
1
I a1 =
3
( I a + aI b + a2 Ic )
1
Ia2 =
3
( I a + a2 I b + aIc ) (2.30b)
1
I a0 = ( I a + I b + I c )
3
From Equation (2.30a), it follows that there will be no zero-sequence component
of voltage when the phasor sum Va + Vb + Vc = 0. Moreover, there will be no zero-
sequence component of current when the phasor sum I a + I b + I c = 0. Because the
phasor sum of the line-to-line voltages in a three-phase balanced system is always
zero, there will be no zero-sequence component of the line voltages for a three-phase
balanced system. Also, because the phasor sum of all the three-line currents in the
three-wire three-phase system is zero, there will also be no zero-sequence compo-
nent of the line current for a three-phase three-wire system.
Zero-sequence components may, however, be present in the phase voltages of a
star-connected circuit or in the phase currents in a delta-connected circuit. In a star-
connected circuit, the zero-sequence components of the phase voltages are all in
phase. The line voltage being the phasor difference of two respective phase voltages,
the zero-sequence components cancel out when line voltages are determined. In a
42 Power Transmission System Analysis Against Faults and Attacks
delta-connected circuit, the zero-sequence components of the phase currents are all
in phase and form a local circulating current inside the delta. Therefore, there is no
zero-sequence component in the delta line currents.
(a)
Va Vb Vc
Zn In
(b)
Reference Bus Reference Bus Reference Bus
- Zog
Va Va1 Z2=Xd" Va2 Z0 Va0
3Zn
+ Ia1
Ia2 Ia0
FIGURE 2.10 (a) Equivalent circuit of a generator; (b) sequence network of generator
impedances: (i) positive sequence, (ii) negative sequence, (iii) zero sequence.
HV LV
Figure 2.11 represents the phase shift of 30° for the secondary currents. As per
the ANSI standard, for positive sequence quantities for Y − ° or ˜ −Y transformers,
the positive-sequence voltage to neutral on the H.V. side always leads the positive-
sequence voltage to neutral on the low voltage side by 30°. Thus, when stepping up
from the low-voltage side to the high-voltage side of a ˜ −Y or a Y − ° transformer,
we need to advance the positive-sequence voltages (and currents) by 30° and retard
44 Power Transmission System Analysis Against Faults and Attacks
the negative-sequence voltages (and currents) by 30° as the negative sequence is the
reverse sequence rotation of the positive-sequence quantities.
The zero-sequence impedance of a transformer differs from the positive- and
negative-sequence impedances. For an ungrounded neutral system, there is no fow
of current to ground. Thus, for ungrounded star or delta-connected transformer,
Z 0 ˜ °. Figure 2.12 represents the zero-sequence impedance of common trans-
former connection types.
( ) =∞
( ) =∞
( )
( ) =∞
( )
( ) =∞
( ) =∞
( ) =∞
* T *
° Ir ˝ ° Vr ˝ ° I ˝
˝ ˆˆ I y ˇ ˆ ˇ ˆ r ˇ
i.e. S = ° Vr Vy Vb ˇ = ˆ Vy ˇ ˆ Iy ˇ (2.32)
˛ ˙
ˆ I ˇ ˆ ˇ ˆ I ˇ
˛ b ˙ ˛ Vb ˙ ˛ b ˙
However,
˛ V ˆ ˛ Vr 0 ˆ
˙ r ˘ ˙ ˘
˙ Vy ˘ = [ A] ˙ Vr1 ˘ (2.33)
˙ V ˘ ˙ ˘
˝ b ˇ ˝ Vr 2 ˇ
46 Power Transmission System Analysis Against Faults and Attacks
˝ 1 1 1 ˇ
ˆ
where, [ A] = ˆ 1 a2 a
ˆ 1 a a2
˙ ˘
˛ I ˆ ˛ Ir 0 ˆ
˙ r ˘ ˙ ˘
and, ˙ I y ˘ = [ A] ˙ I r1 ˘ (2.34)
˙ I ˘ ˙ Ir 2 ˘
˝ b ˇ ˝ ˇ
T *
˝ Vr 0 ˇ ˝ Ir 0 ˇ
Tˆ *ˆ
S = [ A] ˆ Vr1 [ A] ˆ I r1 (2.35)
ˆ ˆ
˙ Vr 2 ˘ ˙ Ir 2 ˘
˝ 1 0 0 ˇ
ˆ
[u ] = ˆ 0 1 0
ˆ˙ 0 0 1 ˘
*
˛ Ir 0 ˙
˜ S = 3 ˝˛ Vr 0 Vr1 Vr 2 ˙ˇ ˘
ˆ ˇ I r1 ˘
ˇ Ir 2 ˘
˝ ˆ
or S = 3 ˛V
˝ r 0 I r 0 + Vr1 I r1 + Vr 2 I r 2 ˙ˆ
* * *
(2.36)
that is, the sequence power is one third the power in terms of phase quantities.
Example 2.4
Solution
Let Xa, Xb and Xc represent the total reactances present in each phase of the given
circuit.
Analysis of Faults in Power System 47
Va 100˛0°
˜ Ia = = = − j50 A = 50˛ − 90° A
Xa j2
Vb 100° − 90°
Ib = = = 33.33° −180°A
Xb j3
Vc 100°120°
Ic = = = 25°30°A
Xc j4
1
˛ I a1 =
3
( I a + aI b + a 2 Ic )
1
= (50ˆ − 90° + 33.33ˆ (−180° +120°) + 25ˆ(30° + 240°
3
1
= (50ˆ − 90° + 33.33ˆ − 60° + 25ˆ270°
3
= 5.55 − j34.62 = 35.06ˆ − 80.88°A
1
I a2 =
3
( I a + a 2 I b + aIc )
1
= (50˙ − 90° + 33.33˙ (−180° + 240°) + 25˙(30° +120°
3
= −1.66 − j2.88 = 3.32˙ −120°A
48 Power Transmission System Analysis Against Faults and Attacks
1
I a0 = ( I a + I b + I c )
3
1
= (50˙ − 90° + 33.33˙ −180° + 25˙30°)
3
= −3.89 − j12.5 = 13.09˙ −107.299°A
Example 2.5
Solution
1
I r1 =
3
( I R + aIY + a 2 I B )
1
=
3
(1˙0° +1˙ (180° +120°) + 0) = 0.5 − j0.2886 = 0.5773˙ − 30°
1
Ir 2 =
3
( I R + a 2 IY + aI B )
1
=
3
(1˙0° +1˙ (240° +180°) + 0) = 0.5 + j0.2886 = 0.5773˙30°
1 1
I r 0 = ( I R + IY + I B ) = (1˙0° + 1˙180° + 0 ) = 0
3 3
Example 2.6
˝ IA ˆ
P = ˝˙ VAN VBN VCN ˆ [K ] ˘ I B
ˇ ˘
˘
˙ IC ˇ
where, VAN , VBN and VCN are the phase voltages, and I A , I B and I C are the line cur-
rents for a pure star-connected balanced load.
˙ 0 1 −1 ˘
1 ˇ
If [ K ] = −1 0 1 and I A = I B = I C ,
3 ˇˇ 1 −1 0
ˆ
Solution
ˆ IA ˘
P = ˆˇ VAN VBN VCN ˘ [ K ] I B
IC
ˇ
ˆ 0 1 −1 ˘ˆ IA ˘
˘ 1 −1
= ˆˇ VAN VBN VCN 3 0 1 IB
ˇ 1 −1 0 I C
ˇ
ˆV V V ˘
= AN ( I C − I B ) + BN ( I A − I C ) + CN ( I B − I A )
ˇ 3 3 3
˛ I A = I B = I C = I (say )
ˆV V V
P = ˘ AN ( I − I ) + BN ( I − I ) + CN ( I − I ) = 0
ˇ 3 3 3
Example 2.7
Solution
= 3 [360.85 + j232.28]
The addition of new bus (k) to the reference bus (or node) through a link/branch of
impedance Z b (Figure 2.15) without any connection to any of the other buses of the
original network will not alter the original bus voltages, even if a new current Ik is
injected in the new bus (k). The voltage Vk at the new bus is given by
Vk = Z b I k
n port
passive linear
network
FIGURE 2.15 Addition of link Z b from new bus (k) to an old bus (r).
˝ V1 ˇ ˝ | 0 ˇ˝ I1 ˇ
ˆ ˆ ˆ
ˆ V2 ˆ [ Z BUS ]old | ˜ ˆ I2
ˆ ˜ ˆ |
˜ ˆ ˜
ˆ Vn =ˆ ˆ In (2.38a)
ˆ ˆ | 0 ˆ
ˆ … ˆ ˆ
…
ˆ Vk ˆ ˆ Ik
˙ ˘ ˙ˆ 0 ° ° 0 | Z b ˘ ˙ ˘
or [V ] = [ Z BUS ]new [ I ]
ˆ | 0
˘
˘ [ Z BUS ]old | ˜
˘
|
=˘
˜
Here, [ Z BUS ]new
˘
˘ | 0 (2.38b)
˘ ˙ ˙ ˙ ˙ ˙ ˙
˘
ˇ 0 ° ° 0 | Zb
It may be noted here that the column vector of the current multiplied by [ Z BUS ]new
does not alter the voltage of the original network.
52 Power Transmission System Analysis Against Faults and Attacks
Vk = Vj + Z b I k
or Vk = Z j1I1 + Z j2 I 2 + + Z jj I j + + Z jn I n + ( Z jj + Z b ) I k
Thus, the new row must be combined with [ Z BUS ]old to fnd Vk ; this is
{ Z j1 Z j2 …Z jn .( Z jj + Zb )}
Because [ Z BUS ] is to be a square matrix around the
principal diagonal, a new column is to be combined that is a transpose of the new
row. The new column accounts for the increase of all bus voltages due to I k. The
generalised matrix equation then becomes
ˆ | Z1 j
ˆ V1 ˘ ˆ I1
˘
˘ V2
˘
˘
[ Z BUS ]old | Z2 j ˘ I2
˘
˘ ˜ ˘ | ˜ ˘ ˜
˘ Vn =˘ | Z nj ˘ In (2.40a)
˘ ˘ ˘
˘ … ˘ ˘ …
˘ ˘ ˘ˇ
ˇ Vk ˘ Z j1
ˇ
Z j2 ° Z jn | ( Z jj + Zb )
Ik
n port
passive linear
network
FIGURE 2.16 Addition of a link Z b from new bus (k) to an old bus (j).
Analysis of Faults in Power System 53
| Z1 j
[ Z BUS ]old | Z2 j
| ˜
Here, [ Z BUS ]new = (2.40b)
| Z nj
ˇ ˇ ˇ ˇ ˇ ˇ
Z j1 Z j2 ° Z jn | ( jj + Z b )
Z
[It may be observed here that the frst elements of the new row of [ Z BUS ]new are the
elements of row j of [ Z BUS ]old , and the frst n elements of the new column are the ele-
ments of column j of [ Z BUS ]old ]
Let there be an addition of a branch (link) Z b from an old bus j to the reference bus
(Figure 2.17). This is done by short circuiting bus (k) to reference node (r) by mak-
ing Vk = 0. This will yield the same matrix as shown in Equation (2.40a) except for
Vk = 0.
n port
passive linear
network
FIGURE 2.17 Addition of a link (Z b ) from an old bus (j) to the reference bus (r).
54 Power Transmission System Analysis Against Faults and Attacks
This yields
ˆ | Z1 j
ˆ V1 ˘ ˆ I1
˘
V2
˘ [ Z BUS ]old | Z2 j ˘ I2
˘ ˘ ˘
˘ ˜ ˘ | ˜ ˘ ˜
˘ Vn =˘ | Z nj ˘ In (2.41)
˘ ˘ ˘
˘ … ˘ ˘ …
˘
ˇ 0 ˘
˘ Z j1 Z j2 ° Z jn | ( Z jj + Zb ) ˇ˘ Ik
ˇ
A new (n + 1)th row and a new (n + 1)th column is obtained. It is now possible to
eliminate (n + 1)th row and (n + 1)th column by Kron reduction. Each element in the
new matrix will then become
Z m (n+1) Z(n+1)i
Z m (new) = Z mi − (2.42)
Z jj + Z b
ˆ Z1 j
1 ˘ (2.43)
− ˘ ˇˆ Z j1 … Z jn
Z jj + Z b ˘ Z
nj
ˇ
n port
passive linear
network
FIGURE 2.18 Addition of a link (Z b ) between two old buses (i and j).
Finally,
V j = Vi + Z b I k
= Z j1I1 + Z j2 I 2 + + Z ji ( I i + I k ) + Z jj ( I j − I k ) + + Z jn I n (2.46)
In a matrix form,
ˆ V1 ˘
ˆ | ( Z1i − Z1 j )
ˆ I1
˘ ˘ [ Z BUS ]old | ˜ ˘
˘ ˜ ˘ ˘ ˜
˘ Vn =˘ | (Z ni − Z nj ) ˘ In
˘ … ˘ ˘ …
˘ ˘ ˘
˘ˇ 0 ˘ ( Zi1 − Z j1 ) ° ° | ( Zb + Zii + Z jj − 2Zij ) ˘ˇ Ik
ˇ˘
(2.47)
˘ Z1i − Z1 j
1
[ Z BUS ]new = [ Z BUS ]old −
( Zb + Zii + Z jj − 2Zij ) Zni − Znj
(2.48)
× ˘ (Zi1 − Z j1 ) … (Zin − Z jn )
n port
passive linear
network
FIGURE 2.19 Addition of two branches (Z a and Zb) with mutual impedance (Z m) between
four buses.
Analysis of Faults in Power System 57
Again, at the j-th and k-th buses, with mutual impedance Z m between them V j is
given by
V j = Z a I a + Z m I b +Vk (2.51)
Equation (2.50) can be used in Equation (2.51) with proper notations (for j-th and k-th
buses) to yield
Z j1I1 + Z j2 I 2 + + Z jn I n + ( Z jk − Z jj ) I a + ( Z jm − Z jl ) I b
(2.52)
= Z a I a + Z m I b + Z k 1I1 + + Z kn I n + ( Z kk − Z kj ) I a + ( Z km − Z kl ) I b
0 = ( Z k1 − Z j1 ) I1 + + ( Z kn − Z jn ) I n + ( Z a + Z jj + Z kk − 2Z jk ) I a
+ ( Z m + Z jl + Z km − Z jm − Z kl ) I b (2.53)
Vl = Z b I b + Z m I a +Vm
ˆ V1 ˆ | ˜ | ˜
˘ ˘
˘ ˜ ˘ [ Z BUS ]old | ( Zlk − Zij ) | ( Zim − Zil )
˘ Vn ˘
˘ ˘ | ˜ | ˜
˘ −− =˘
− | − − −
˘ 0 ˘
˘ ˜ ˘ ° ( ki − Z ji )°
Z | ( Za + Zij + Z kk − 2Z jk ) | ( Zm + Z jl + Z km − Z kl − Z jm )
˘ ˘
ˇ˘
0 ˘ °( Z mi − Z li )° | ( Z m + Z lj + Z mk − Z lk − Z mj ) | ( Z b + Zll + Z mm − 2 Zlm )
ˇ
ˆ I1
˘
˘ ˜
˘ In
× ˘˘ −−
˘ Ia
˘ −−
˘
˘ˇ Ib
˝ [ Z BUS ]old [ Z ab ] ˇ
i.e., [ Z BUS ]new = ˆ
ˆ
˙
[ Z ba ] [ Z bb ]
˘ (2.56)
= [ Z BUS ]old − [ Z ab ][ Z bb ] [ Z ba ]
−1
The algorithm to obtain bus impedance matrix [ Z BUS ] is given in the next article.
Example 2.8
Figure 2.20 shows a four-bus power network. Assuming bus 1 to be the reference
bus, fnd [ Z BUS ] .
Solution
Bus 1 is the reference bus and in the algorithm of [ Z BUS ] building, the bus number-
ing is done excluding the reference bus. Hence, new bus numbering is required
as given below.
1
[ Z Bus ] = 1 5 ˝
[ ]
Step 2: In the next modifcation consider the element between new bus 2 and
reference bus [ Z b = 5˝]. This is also type 1 modifcation.
1 2
[ Z Bus ] = 1 ˝ 5 0 ˇ
ˆ
2 ˙ 0 5 ˘
Step 3: Consider the element [ Z b = 5˝] between bus 3 and reference bus. This is
again a type 1 modifcation between the new bus and reference bus.
1 2 3
1 ˙ 5 0 0 ˘
˛ [ Z Bus ] = ˇ
2 ˇ 0 5 0
3 ˇˆ 0 0 5
Step 4: Consider the element [ Z b = 5˝] between buses 1 and 2 in the next modif-
cation. This is type 4 modifcation between the two old buses 1 and 2.
˘ (Z − Z )
1 11 12
[ Z Bus ] = [ Z BUS ]old − ( Z 21 − Z 22 ) × ( Z11 − Z 21 )( Z12 − Z 22 )( Z13 − Z 23 )
5 + Z11 + Z 22 − 2Z12
( Z 31 − Z 32 )
ˆ 5
1 ˘
or, [ Z Bus ] = [ Z BUS ]old − ˘ −5 ˆˇ 5 −5 0
5+5+5
˘ˇ 0
˝ 5 0 0 ˇ ˝ 5 ˇ ˝ 25 −25 0 ˇ
ˆ 1 ˆ ˆ
or, [ Z Bus ] = ˆ 0 5 0 −
15 ˆ −5 ˆ −25
25 0
ˆ˙ 0 0 5 ˘ ˆ˙ 0 ˘ ˆ˙ 0 0 0 ˘
Simplifcation yields
1 2 3
Step 5: In the next modifcation, consider the element [ Z b = 5˝] between buses 2
and 3. This is also type 4 modifcation.
Added impedance value is 5 Ω between two old buses 2 and 3.
(Z − Z )
1 12 13
[ Z Bus ] = [ Z BUS ]old − × ( Z 22 − Z 23 ) ( Z 21 − Z 31 )( Z 22 − Z 32 )( Z 23 − Z 33 )
5 + Z 22 + Z 33 − 2Z 23
( Z 32 − Z 33 )
ˆ 1.67
1 ˘
= [ Z BUS ]old − ˘ 3.33 ˆˇ 1.67 3.33 −5
5 + 3.33 + 5
˘ˇ −5
˙ 1.67 ˘
1 ˇ
= [ Z BUS ]old − 3.33 ˙ˆ 1.67 3.33 −5 ˘
13.33 ˇ
ˇˆ −5
Because there is no further modifcation and no bus interchange, the above matrix
is the fnal [ Z Bus ] matrix.
Therefore,
1 2 3
1 ˝ 3.12 1.25 0.62 ˇ
[ Z Bus ] = 2
ˆ = [ Z Bus ]new
ˆ 1.25 2.5 1.25
3 ˆ˙ 0.62 1.25 3.12 ˘
−1
˝ Y11 Y12 ˜ Y1i ˜ Y1n ˇ
ˆ
ˆ Y21 Y22 ˜ Y2i ˜ Y2n
−1 ˆ ° ° ° °
[ Z Bus ] = [YBus ] = ˆ
ˆ Yi1 Yi2 ˜ Yii ˜ Yin
ˆ ° ° ° °
ˆ Yn1 Yn2 ˜ Yni ˜ Ynn
˙ ˘
(2.57)
˝ Z11 Z12 ˜ Z1i ˜ Z1n ˇ
ˆ
ˆ Z 21 Z 22 ˜ Z 2i ˜ Z 2n
ˆ ° ° ° °
=ˆ
ˆ Zi1 Zi2 ˜ Zii ˜ Zin
ˆ ° ° ° °
ˆ Z n1 Z n2 ˜ Z ni ˜ Z nn
˙ ˘
three-phase network; they should not be confused with the voltage sources that exist
in the PPS network.
Let the unbalanced condition be considered for a three-phase network at point
F, as shown in Figure 2.22a. The three-phase networks can be then constructed
from the actual three-phase network components and network theory and are shown
in Figures 2.22b and c. The entire PPS, NPS and ZPS networks are derived using
Thevenin’s theorem. This reduction results in a single equivalent voltage source at
point F and a single equivalent impedance seen looking back into the relevant net-
work from point F, as illustrated in Figure 2.22c.
From Figure 2.22c, sequence voltage and current relations at the point of fault (F)
can be written for the networks. For the active positive-sequence network,
(a)
Point of Fault
(b)
(c)
Vr2 = −Z 2 I r2 (2.59)
Vr0 = −Z 0 I r0 (2.60)
where Vr2 and Vr0 are the negative-sequence and zero-sequence voltages at F for the
negative- and zero-sequence networks, respectively. I r2 and I r0 are the corresponding
negative- and zero-sequence currents fowing out of the NPS and zero-sequence net-
works into the fault, respectively. Z1, Z 2 and Z 0 represent the positive-, negative- and
zero-sequence impedances of the sequence networks.
In the multi-bus power system, the governing sequence network equation can be
represented, generalising Equations (2.58)–(2.60) as follows:
For the positive-sequence generalised network,
n
Vi1 = E − ˜Z I
ik1 k1 (2.61a)
k=1
where Vi1 is the generalised-positive sequence voltage at ith bus, the bus subjected to
be under fault condition, and E is the pre-fault bus phase voltage. I k1 is the positive-
sequence current at any bus k, while Zik1 is the equivalent positive-sequence imped-
ance looking into the positive-sequence network of bus k. For the convenience of the
modelling, it is the logical assumption that all the currents at bus k ˜ i are zero, while
I f is the fault current at bus i at k = i . Hence, I k1 , I k2 and I k0 are all zero quantities for
k ˜ i . At bus, the positive-, negative- and zero-sequence currents are represented as
I i1 , I i2 and I i0 (k = i).
Then, for the faulted power network, the governing equation of the sequence net-
works are given by
Vi1 = E − [ Z1 ] I i1 (2.61b)
n
Vi2 = − ˜Z I
ik2 k2 (2.62)
k=1
Vi0 = − ˜Z I
ik0 k0
(2.63)
k=1
= − [ Z 0 ] I i0
The following common types of electrical faults are analysed in the following articles:
For any of the above type of fault at the i-th bus, I k = 0 ( k = 1, 2,3,…, n; k ˙ i ).
Vi(1) = E − ˜Z I
ik(1) k(1)
k=1
E
i.e., I i(1) = (2.64)
Zii(1)
E
I i(1) = (2.65)
Z f + Zii(1)
The bus voltage at i-th bus would be zero due to direct fault at i-th bus. The bus
voltage at other bus are given by,
E
= E − Z ki(1)
Z f + Zii(1)
˝ Z ki(1) ˇ
= E ˆ1−
ˆ˙ Z f + Zii(1) ˘
˙ Z f + Zii(1) − Z ki(1) ˘
˜Vk(1) = E ˇ (2.66)
ˇˆ Z f + Zii(1)
66 Power Transmission System Analysis Against Faults and Attacks
Here, I ib = I ic = 0 (2.67)
Via = I ia Z f (2.68)
I i( 0 ) + a 2 I i(1) + aI i( 2) = I i( 0 ) + aI i(1) + a 2 I i( 2)
or, (a 2
) (
− a I i(1) = a 2 − a I i( 2) ) (2.69)
ˆ I i(1) = I i( 2)
Because I ib = 0 ,
I i( 0 ) + a 2 I i(1) + aI i( 2) = 0
(
i.e. , I i( 0 ) = − a 2 + a I i(1) ) ˆˇ I i(1) = I i( 2) ˘ (2.70)
or, I i( 0 ) = I i(1) ˇ (
ˆ 1 + a + a 2 = 0 ˘
)
With reference to Figure 2.23,
Via = I ia Z f
(2.71)
Vi( 0 ) + Vi(1) + Vi( 2) = Z f ˛˝ I i( 0 ) + I i(1) + I i( 2) ˙ˆ
i.e., Vi( 0 ) + Vi(1) + Vi( 2) = 3I i(1) Z f
point of fault
i-th bus
ground
The equivalent circuit of the Equation (2.71) can then be the network having the
series-connected sequence networks across the fault impedance Z f (Figure 2.24).
In the generalised n – bus network, for a single line-to-ground fault at the i th bus,
Equation (2.71) can be rewritten as
− Zii (0) I i (0) + E − Zii (1) I i (1) − Zii (2) I i (2) = 3 Z f I i (1)
or, E − Zii (0) I i (0) − Zii (1) I i (1) − Zii (2) I i (2) = 3 Z f I i (1) (2.73)
E = I i(1) ˛Z
˝ ii( 0 ) + Zii(1) + Zii( 2) + 3Z f ˙ˆ
E
˜ I i (1) = (2.74)
Zii (0) + Zii (1) + Zii (2) + 3Z f
−Z ki (0) ˝ E
˜Vk (0) = (2.75)
Zii (0) + Zii (1) + Zii (2) + 3Z f
˝ −Z ki(1) ˇ
Also, Vk (1) = E ˆ1 −
˙ Zii( 0 ) + Zii(1) + Zii( 2) + 3Z f ˘
68 Power Transmission System Analysis Against Faults and Attacks
˛V
˝ k (1) = E − Z ki(1)I i(1) ˙ˆ
−Z ki (2) ˝ E
˜Vk (2) = (2.77)
Zii (0) + Zii (1) + Zii (2) + 3Z f
Z ki (1) , Z ki (0) , Z ki (2) , Zii (1) , Zii (0) ,and, Zii (2) are the respective entries of the [ Z Bus ] matrix
of the n-bus power network in sequence terms. Thus, it is possible to determine the
sequence components of fault currents and the sequence components of voltages at
any bus of the n-bus power network subjected to a single line-to-ground fault at bus i.
and I ia = 0
3 phase
i-th bus
ground
( ) (
2I a( 0 ) + ( −1) −I a( 0 ) = 0 ˆˇ a 2 + a = −1˘ )
i.e., 3I a(0) = 0
Vi (0) +Vi (1) +Vi (2) = (Vi (0) + aVi (1) + a 2Vi (2) ) + Z f ( I i (0) + a 2 I i (1) + aI i (2) )
Simplifcation yields,
(a 2
− a ) Vi (1) = ( a 2 − a ) I i (1) Z f + ( a 2 − a ) Vi (2)
FIGURE 2.26 Interconnection of sequence network for double line (L-L) fault.
70 Power Transmission System Analysis Against Faults and Attacks
Ei
I i (1) = (2.85)
Zii (1) + Zii (2) + Z f
Also,
Ei
= Ek − Z ki (1)
Zii (1) + Zii (2) + Z f
ˆ Z ki (1)
= E ˘1−
˘ˇ Zii (1) + Zii (2) + Z f
(assuming Ei = Ek = E )
( )
and, Vk( 2) = −Z ki( 2) I i( 2) = −Z ki( 2) +I i( 2) = −Z ki( 2) −I i(1) ( ) ˆˇ I i(1) = −I i( 2) ˘
Ek
or, Vk (2) = Z ki (2) I i (1) = Z ki (2)
Zii (1) + Zii (2) + Z f
Z ki (2) ˝ E
i.e., Vk (2) = ; [ Ek = E ] (2.87)
Zii (1) + Zii (2) + Z f
Equation (2.85) represents the i-th bus positive sequence current while the k-th bus
sequence voltages are represented in Equations (2.86) and (2.87) in the multi-bus
power network subjected to a line-to-line fault at i-th bus.
Obviously, I ia = 0 (2.88)
ground
Vi (0) + a 2Vi (1) + aVi (2) = Vi (0) + aVi (1) + a 2Vi (2)
Simplifcation yields,
Vi (0) + a 2Vi (1) + aVi (2) = ( I i (0) + a 2 I i (1) + aI i (2) + I i (0) + aI i (1) + a 2 I i (2) ) Z f
Simplifcation yields
( )(
Vi( 0 ) − Vi(1) = ˆˇ 2I i( 0 ) + a 2 + a I i(1) + I i( 2) ˘ Z f )
or, Vi (0) −Vi (1) = 3Z f I i (0)
−Vi (1) + E
i.e., I i (1) = (2.94)
Zii (1)
FIGURE 2.28 Sequence network interconnection for double line to ground fault.
−Vi( 2) −Vi(1)
i.e., I i( 2) = = ˙using
ˆ Equation ( 2.92 )˘ˇ (2.95)
Zii( 2) Zii( 2)
Vi (1)
i.e., I i (0) = − (2.96)
Zii (0) + 3Z f
Substituting the values of I i (1) , I i (2) and I i (0) from Equations (2.94)–(2.96), respectively,
in Equation (2.91), we get
Vi (1) Vi 1 − E Vi (1)
or, + () + =0
Zii (0) + 3Z f Zii (1) Zii (2)
Zii( 2) ˛Z
˝ ii( 0 ) + 3Z f ˙ˆ
i.e., Vi(1) = (2.97)
ˇZ
where, ˛Z = Zii (1) Zii (2) + Zii (1) ( Zii (0) + 3Z f ) + Zii (2) ( Zii (0) + 3Z f )
Analysis of Faults in Power System 73
Substituting the value of Vi (1) from Equation (2.97) in Equations (2.94), (2.95) and
(2.96), the expressions of I i (0) , I i (1) and I i (2) are modifed as follows:
Vi (1) Zii 2 ˝ E
I i (0) = − =− ( ) (2.98)
Zii (0) + 3Z f ˙Z
(
ˇ Zii( 2) Zii( 0 ) + 3Z f E
E−
)
I i(1) =
E − Vi(1)
=
˘ ˆZ
=
(
E Zii( 2) + Zii( 0 ) + 3Z f ) (2.99)
Zii(1) Zii(1) ˆZ
−Vi(1) − ˙˝ Zii( 0 ) + 3Z f ˆˇ
and, I i( 2) = = (2.100)
Zii( 2) ˘Z
The sequence currents in the interconnecting line between faulted bus i and healthy
bus k are given as
I ik (1) = −I ik (1)
−I ik (0) , −I ik (1) and −I ik (2) being the sequence currents fowing from the k-th bus to
the i-th bus and are usually negative of I ik (0) , I ik (1) and, I ik (2), respectively, except the
condition when there is a star-delta transformer in the line.
74 Power Transmission System Analysis Against Faults and Attacks
Example 2.9
For a three-bus power system, the sequence impedances are given as follows:
Solution
Here, Z 33(1) = Z 33(2) , as given in the statement of this problem. As E = 1 p.u. we have,
1 1
I 3(0) = I 3(1) = I 3(2) = = = − j1.56 p.u.
Z 33(0) + 2Z 33(1) j0.14 + 2 × j0.25
Next, we compute line currents (here, suffx L stands for the p.u. impedances of
respective lines)
V1(0) − V2(0)
I12(0) = =0 ˛˝V1(0) = V2(0) ˙ˆ
Z12(0) L
V1(1) − V2(1)
I12(1) = =0 ˛˝V1(1) = V2(1) ˙ˆ
Z12(1) L
V1(2) − V2(2)
I12(2) = =0 ˛˝V1(2) = V2(2) ˙ˆ
Z12(2) L
˜ Finally, for L-G fault at bus 3, we get the following sequence quantities.
76 Power Transmission System Analysis Against Faults and Attacks
E
I 3(1) =
Z 33(1) + Z 33(2) + Z f
1 1
˜ I 3(1) = = = − j2 p.u.
j0.25 + j0.25 j0.5
I 3(2) = I 3(1) = j2 p.u.
˜ I 3( 0 ) = 0
V1(0) = 0 p.u.
V2(0) = 0 p.u.
V3(0) = 0
Analysis of Faults in Power System 77
Line currents are obtained as (suffx L stands for respective line impedances)
I 23(0) = 0 p.u.
I12(0) = 0
E °˛ Z f = 0˝˙
I 3(1) =
Z 33(1)
78 Power Transmission System Analysis Against Faults and Attacks
1
or, I 3(1) = = − j4 p.u.
j0.25
V1(1) − V2(1)
I12(1) = =0 ˛˝V1(1) = V2(1) ˙ˆ
Z12(1) L
E ( Z 33(2) − Z 33(0) )
I 31(1) = , using equation ( 2.99) with i = 3 and Z f = 0
˙Z
1( j0.25 + j0.14 )
=
j0.25 × j0.25 + j0.25 × j0.14 + j0.25 × j0.14
[ ˜Z = Z 33(1) Z 33(2) + Z 33(1) Z 33(0) + Z 33(2) Z 33(0) for Z f = 0 and i = 3 from Equation
(2.97)]
j0.39
˜ I 31(1) = = − j2.94 p.u.
−0.1325
Analysis of Faults in Power System 79
Also, I 3( 2 ) = −
( Z ( ) ) , with i = 3 and
33 0
Z f = 0 in Equation ( 2.100 )
˙Z
j0.14
i.e., I 3(2) = − = j1.06 p.u.
−0.1325
and, I 3(0) = −
( Z ( ) ) E , with i = 3 and
33 2
Z f = 0 in Equation ( 2.98)
˙Z
j0.25 ×1
=− = j1.89 p.u.
−0.1325
Bus voltages after the occurrence of the fault can be calculated as follows.
˙ E ˘
I af ( the fault current in phase a ) = 3 ˇ ,
ˆ Zii( 0 ) + Zii(1) + Zii( 2)
1
As I (0) = I (1) = I (2) =
I af , for the single line-to-ground fault, I af = 3 × sequence current.
3
Assuming the resistance component of impedances to be negligible and the posi-
tive sequence reactance being equal to the negative-sequence reactance, we get the
modifed fault current expression. Here
˛ E ˆ
I af = 3 ˙ ˘ (2.105)
˝ 2X ii(1) + X ii( 0 ) ˇ
Analysis of Faults in Power System 81
On the other hand, for a solid three-phase fault (where Z f ˜ 0), we have
E
I af = (2.106)
X ii (1)
Comparing Equations (2.105) and (2.106), we fnd that for a three-phase system
where the neutral is solidly grounded and the positive reactance is equal to the nega-
tive reactance and the zero-sequence reactance is of low value, we have the single
line-to-ground fault more severe than the three-phase fault. However, if the zero-
sequence reactance ( X ii (0) ) is of much higher value than the positive-sequence reac-
tance X ii (1), there is a possibility that the three-phase fault is more severe than the
single line-to-ground fault.
For an alternator, usually the positive- and negative-sequence reactances are equal
while the zero-sequence reactance is of lower magnitude. To make the fault current
due to the L-G fault lesser than even the fault current due to three-phase faults, we
need to include a grounded reactance ( X n ) at the neutral so that
3E E
<
2X ii (1) + X ii (0) + 3X n X ii (1)
1
or, Xn >
3
( Xii(1) − Xii(0) )
Thus, it is possible to select the grounding reactance (X n) to limit the L-G fault cur-
rent lower than the L-L-L fault current using a suitable grounding reactance at the
neutral of the generator.
° Ia ˙ ° Vaa˘ ˙
˝ ˇ ˝ ˇ
Here, I = ˝ I b ˇ; V = ˝ Vbb˘ ˇ
˝ Ic ˇ ˝ Vcc˘ ˇ
˛ ˆ ˛ ˆ
˜ Ia ˝ ˜ 1 1 1 ˝ ˜ Ia0 ˝
˛ ˆ ˛ ˆ˛ ˆ
and ˛ I b ˆ=˛ 1 a2 a ˆ ˛ I a1 ˆ
˛ Ic ˆ ˛ 1 a a2 ˆ ˛ Ia2 ˆ
° ˙ ° ˙° ˙
82 Power Transmission System Analysis Against Faults and Attacks
˜ Va ˝ ˜ 1 1 1 ˝ ˜ Va0 ˝
˛ ˆ ˛ ˆ˛ ˆ
˛ Vb ˆ=˛ 1 a2 a ˆ ˛ Va1 ˆ
˛ Vc ˆ ˛ 1 a a2 ˆ ˛ Va2 ˆ
° ˙ ° ˙° ˙
The sequence component of currents and voltages are shown in Figure 2.30.
Ia = 0 (2.109)
Using Equations (2.109) and (2.108) in the concept of symmetrical theory related to
Equations (2.30) and (2.25b), we get
1
Vaa˝(1) = Vaa˝(2) = Vaa˝(0) = Vaa˝ (2.110)
3
Analysis of Faults in Power System 83
Obviously, Vaa° = 0; I b = I c = 0
1
I a(1) = I a(2) = I a(0) = I a (2.113)
3
Thus, the sequence network connections would be a series connected network, as
shown in Figure 2.34.
FIGURE 2.32 Connection of sequence network for one conductor open circuit fault.
FIGURE 2.34 Interconnection diagram of sequence networks for two conductor open fault.
REFERENCE
1. A. Chakrabarti and S. Halder, “Power System Analysis: Operation and Control”, Third
Edition, New Delhi: PHI Learning Pvt. Ltd.
3 Contingency Analysis
3.1 INTRODUCTION
Contingency analysis is a method to predict steady state bus voltages and line cur-
rents in a power system network following switching (addition or removal) of a line
in that network. It helps in checking the components of the system (e.g. bus or line)
being subjected to overloading or overvoltage/undervoltage conditions following
switching of the prescribed line. Contingency analysis is mostly an offline method
and usually in the analysis, line resistance, presence of off-nominal tap ratios of
transformers and line charging effects are neglected. The linear model of the sys-
tem is usually assumed where the principle of superposition can be applied. The
results, thus, have little approximation. Contingency analysis [1] frequently uses bus
impedance matrix [ Z BUS ] where loads are to be treated as constant current injec-
tions. Addition of a line in the system is simply the addition of an impedance, while
removal of the line is accomplished by adding a negative impedance in the pre-
scribed part of the network. The diagonal elements of [ Z BUS ] provide important
characteristics of the power network and facilitate the use of Thevenin’s equivalent
impedance at designated buses. Application of [ Z BUS ] is evident in power system
contingency analysis.
where [V0 ] is the column vector of initial bus voltages and [ I 0 ] is the column vector of
initial respective bus currents. However, due to current injection at bus q, there will
be changes in the bus voltages, and the modified governing equation of the system
is expressed as
85
86 Power Transmission System Analysis Against Faults and Attacks
n bus
power
network
Because ˜I q is the only injected current at bus q with no other current injections at
any other bus, the column vector [ ˛I ] can be expressed as
˙ 0 ˘ ˙ ˛V1 ˘
ˇ ˇ
ˇ ˇ ˛V2
ˇ 0 ˇ
[ ˛I ] = ˇˇ ˛I q while [ ˛V ] = ˇ ˛Vp
ˇ
ˇ 0 ˇ ˛Vq
ˇ ˇ
ˇ ˇ
ˇˆ 0 ˇ ˛Vn
ˆ
° ˜V1 ˙ ° Z1q ˙
˝ ˇ ˝ ˇ
˝ ˜V2 ˇ ˝ Z 2q ˇ
˝ ˇ ˝ ˇ
i.e. ˝ ˇ=˝ ˇ ˜I q (3.5)
˝ ˜Vq ˇ ˝ Z qq ˇ
˝ ˇ ˝ ˇ
˝ ˇ ˝ ˇ
˝˛ ˜Vn ˇˆ ˝˛ Z nq ˇˆ
(as the nonzero quantity in the current matrix exists in the q-th row only).
At the q-th bus, with initial bus voltage Vq0 , we can express the new q-th bus volt-
age as
Vq = Vq0 + Z qq ˛I q (3.6)
Hence, we can interpret Z qq as the Thevenin’s impedance at bus q where Zth ˜ Z qq.
Obviously, Z qq is the diagonal entry in the q-th row in [ Z BUS ] and is the driving point
impedance of bus q (Figure 3.2).
The next task is to obtain the Thevenin’s impedance between bus p and q so that
the bus voltages are V1 , V2 ,… , Vp , Vq ,… , Vn . As [ ˛V ] = [ Z BUS ] [ ˛I ], we can write
° Z1p ˜I p + Z1q ˜I q ˙
˝ ˇ
˝ Z 2 p ˜I p + Z 2q ˜I q ˇ
˝ ˇ
˝ ˜ ˇ
=˝ Z pp ˜I p + Z pq ˜I q ˇ (3.7)
˝ ˇ
˝ Z qp ˜I p + Z qq ˜I q ˇ
˝ ˜ ˇ
˝ ˇ
˝˛ Z np ˜I p + Z nq ˜I q ˇˆ
˜Vp = Z pp ˜I p + Z pq ˜I q (3.8a)
88 Power Transmission System Analysis Against Faults and Attacks
˜Vq = Z qp ˜I p + Z qq ˜I q (3.8b)
Vp = Vp0 + Z pp ˛I p + Z pq ˛I q (3.9a)
Vq = Vq0 + Z qp ˛I p + Z qq ˛I q (3.9b)
Vp = Vp0 + ( Z pp − Z pq ) ˆI p + Z pq ( ˆI p + ˆI q ) (3.10a)
Vq = Vq0 + ( Z qq − Z qp ) ˆI q + Z qp ( ˆI p + ˆI q ) (3.10b)
Vp = Vp0 + ( Z pp − Z pq ) ˆI p + Z pq ( ˆI p + ˆI q )
and Vq = Vq0 + ( Z qq − Z pq ) ˆI q + Z pq ( ˆI p + ˆI q )
FIGURE 3.3 Thevenin’s equivalent circuit of the p-th, q-th bus in the multi-bus power
network.
Assuming a load impedance Zl between bus p and q, the Thevenin’s current through
the load impedance Zl is given by
Vp0 −Vq0
Il = (3.12)
Zth( p−q) + Zl
where I l is the current through Zl and (Vp0 −Vq0 ) is the open circuit voltage between
bus p and q.
90 Power Transmission System Analysis Against Faults and Attacks
˝ V1 ˇ ˝ I1 ˇ ˝ V1 ˇ
ˆ ˆ ˆ
ˆ V2 ˆ I2 ˆ V2
ˆ ˆ ˆ
ˆ ˆ ˆ
Vp Ip ˆ Vp
ˆ ˆ
[V ] = ˆ Vq ;[I ] = ˆ Iq ; [V ] = ˆ Vq
ˆ ˆ ˆ
ˆ Vr ˆ Ir ˆ Vr
ˆ Vs ˆ Is ˆ Vs
ˆ ˆ ˆ
ˆ ˆ ˆ
ˆ Vn ˆ In ˆ Vn
˙ ˘ ˙ ˘ ˙ ˘
Also, [V ] = [ Z BUS ] [ I ]
Figure 3.5a represents the system in the initial state, while Figure 3.5b represents the
system after Z x and Zy are added at the designated buses.
From Figure 3.5b, we have
n bus n bus
power power
network network
FIGURE 3.5 n-bus power system with addition of lines in designated buses.
˜ V1 ˝
˛ ˆ
˛ V2 ˆ
˛ ° ˆ
˛ ˆ
˛ Vp ˆ
˜ Zx 0 ˝ ˜ Ix ˝ x ˜ 0 ˜ 1 −1 0 0 ˜ 0 ˛˝
˛ ˆ˛ ˆ= ˛ Vq ˆ
˛° 0 Zy ˆ ˛ Iy ˆ˙ y ° 0 ˜ 0 0 1 −1 ˜ 0 ˆ˙ ˛ ˆ
˙° ˛ Vr ˆ
˛ Vs ˆ
˛ ˆ
˛ ° ˆ
˛ Vn ˆ˙
°
(3.13 a)
˛ Zx 0 ˆ ˛ Ix ˆ
i.e., ˙ ˘ ˙ ˘ = [ AC ] [V ] (AC being the connection matrix) (3.13 b)
0 Zy ˘ ˙ Iy ˘
˝˙ ˇ˝ ˇ
As (−I x ) enters bus p while (+I x) enters bus q and (−I y ) enters bus r while (+I y) enters
bus s in Figure 3.5b, we can express the current vector [ I ˛ ] as
˙ 0 ˘ 1 ˙ 0 ˘
ˇ 0
ˇ
ˇ
ˇ
ˇ −I x p ˇ −1 0
ˇ Ix ˇ 1 ˙ Ix ˘ ˙ Ix ˘
q 0
[ I ] = ˇ −I = ˇ ˇ I = − ˙ˆ ACT ˘ ˇ (3.14)
ˇ y r ˇ 0 −1 ˇˆ y ˇˆ I y
ˇ I s ˇ 0 1
ˇ y
ˇ
ˇ
ˇ
ˇ 0 n ˇˆ 0 0
ˆ
92 Power Transmission System Analysis Against Faults and Attacks
ˇ Ix
[ ˛V ] = [V ˙ ] − [V ] = [ Z BUS ][ I ˛ ] = − [ Z BUS ] ˇ˘ ACT (3.15)
˘ I y
Also, [V ˛] = [V ] + [ ˆV ] = [V ] + [ Z BUS ] [ I ˆ ]
ˆ Ix ˘
[V ˛ ] = [V ] − [ Z BUS ] ˆˇ ACT ˘ (3.16)
ˇ I y
˛ Zx 0 ˆ ˛ Ix ˆ ˛ Ix ˆ
˙ ˘ ˙ ˘ = [ AC ] [V ] = [ AC ] [V ] − [ Z BUS ] ˛˝ ACT ˆˇ ˙ ˘
˙˝ 0 Zy ˘ ˙ Iy ˘ˇ ˙˝ I y ˘ˇ
ˇ˝
˛ Ix ˆ
= [ AC ] [V ] − [ AC ] [ Z BUS ] ˛˝ ACT ˆˇ ˙ ˘
˙˝ I y ˇ˘
˛˛ Zx 0 ˆ ˆ ˛ Ix ˆ ˛ Vp − Vq ˆ
or, ˙˙ ˘ + [ AC ] [ Z BUS ] ˝˛ ACT ˆˇ ˘ ˙ ˘ = [ AC ] [V ] = ˙ ˘
˙˝ ˙˝ 0 Zy ˘
ˇ ˇ˘ ˙˝
Iy ˘ˇ ˙˝ Vr − Vs ˘ˇ
(3.17)
−1
˛ Ix ˆ ˛˛ Zx 0 ˆ ˆ
or, ˙ ˘ = ˙˙ ˘ + [ AC ] [ Z BUS ] ˛˝ ACT ˆˇ ˘ [ AC ][V ]
I 0 Zy ˘
˝˙ y ˇ˘ ˙˝ ˙˝ ˇ ˇ˘
˛ Ix ˆ ˛ Vp − Vq ˆ
˘ = [ Z ] [ AC ] [V ] = [ Z ] [ AC ] ˙
−1 −1
or, ˙ ˘ (3.18)
˙˝ I y ˘ˇ ˙˝ Vr − Vs ˘ˇ
˝˝ Zx 0 ˇ ˇ
where [Z ] = ˆˆ 0 + [ AC ] [ Z BUS ] ˝˙ ACT ˘ˇ
ˆ ˆ˙ Zy ˘
˙ ˘
(Vp − Vq )) and (Vr − Vs ) are the open circuit voltages between buses (p-q) and
(r-s), respectively In the original power network (Figure 3.5a) and as evident from
Equation (3.18),
Contingency Analysis 93
x ˙ 1 −1 0 0 ˇ
[ AC ][ Z BUS ] ˙ˆ ACT ˇ˘ = y ˆ 0 0 1 −1 ˘
˙ Z pp Z pq Z pr Z ps ˇ ˙ 1 ˇ
0
Z pq Z qq Z qr Z qs −1 0
×
Z pr Zrq Zrr Zrs 0 1
Z ps Z sq Z sr Z ss ˆ 0 −1
˘ (3.19)
ˆ ˘
˙
ˇ ( Z pp − Z pq ) − ( Zqp − Zqq ) + Z x ( Z pr − Z ps ) − ( Zqr − Zqs ) ˘˙
ˇ Ix
˘
ˇ
ˇˆ ( Zrp − Zrq ) − ( Zsp − Zsq ) ( Zrr − Zrs ) − ( Z sr − Z ss ) + Z y ˇ Iy
ˆ
˙ Vp − Vq ˘
=ˇ (3.21)
ˇˆ Vr − Vs
I x and I y can be obtained from Equation (3.21) to observe the addition of impedances
Z x and Z y between respective buses in the system. The removal of the line imped-
ances Z x and Z y from the original network in Figure (3.5a) can be accomplished in a
similar manner by treating the removals as additions of negative impedances (−Z x )
and (−Z y ) in Figure 3.5b and Equation (3.21).
Example 3.1
Two lines Z x and Z y of p.u. reactances j0.08 and j1 p.u. are connected between
buses 2–3 an 3–4, respectively. Find currents I x and I y fowing through line imped-
ances Z x and Z y . Also, fnd the changes in bus voltages.
Solution
Letting bus nomenclatures p = 2, q = 3, r = 3 and s = 4 from Equation (3.21), we
have
˙ ˘
ˇ ( j0.22 − j0.15) − ( j0.15 − j0.20) + j0.08 ( j0.15 − j0.15) − ( j0.20 − j0.12)
ˇ ( j0.15 − j0.2) − ( j0.15 − j0.12) ( j0.2 − j0.12) − ( j0.12 − j0.2) + j1
ˆ
˙ Ix ˘ ˙ ˘
ס = ˇ 0.990° − 0.980°
ˇˆ I y ˆ 0.980° − 0.970°
˙ ˘˙ ˘ ˙
( j0.07 + j0.05 + j0.08) (0 − j0.08) ˇ Ix
˘
or, ˇ = ˇ 0.01
ˇ (− j0.05 − j0.03) ( j0.08 + j0.08 + j1) ˇˆ I y ˆ 0.01
ˆ
−1
˜ Ix ˝ ˜ j 0.2 − j0.08 ˝ ˜ ˝ ˜ − j5.14 − j 0.35 ˝˜ ˝
˛ ˆ=˛ ˆ ˛ 0.01 ˆ = ˛ ˆ ˛ 0.01 ˆ
˛° I y ˆ˙ ˛° − j 0.08 j1.16 ˆ˙ ° 0.01 ˙ ˛° − j 0.35 − j 0.88 ˆ˙ ° 0.01 ˙
˜ − j0.055 ˝
=˛ ˆ p.u. (3.21a)
˛° − j0.012 ˆ˙
[ ˛V ] = −I x ˇˆ Z BUS
p− q (r − s ) ˘
˘ − I y ˆˇ Z BUS
˜ Z1p − Z1q ˛
ˇ ˘
ˇ Z 2 p − Z 2q ˘ ˜ ˛
ˇ ˘ ˇ Z12 − Z13
˘
ˇ ˘ Z 22 − Z 23
˜ ( p− q) ˛ ˜ (2−3) ˛
where, ° Z BUS ˝ = ° Z BUS ˝ = ˇ Z pp − Z pq ˘ = ˇˇ ˘
˘
ˇ Z32 − Z33
ˇ Z qp − Z qq ˘˘ ˇ ˘
ˇ Z 42 − Z 43 ˘˝
ˇ ˘ °
ˇ Z np − Z nq ˘˝
°
Contingency Analysis 95
Z1r − Z1s
Z 2r − Z 2 s
Z13 − Z14
Z pr − Z ps
Z 23 − Z 24
(r − s ) ( )
Also, Z BUS 3 − 4 =
= Z BUS = Z qr − Z qs
Z 33 − Z34
Zrr − Zrs Z 43 − Z 44
Z sr − Z ss
Z nr − Z ns
Substituting the values of I x and I y from Equation (3.21a), the bus voltage changes
are obtained as
∆V1 −0.02756
∆V2 = −0.0038
∆V3 +0.0266
−0.0007
∆V4
i.e., [ ∆V ] = [V ′] − [V ] = [ Z BUS ][ I ∆ ]
96 Power Transmission System Analysis Against Faults and Attacks
˝ ˛V1 ˇ ˝ V1− V1 ˇ
˝ 0 ˇ
ˆ ˆ
ˆ 0
ˆ ˛V2 ˆ V2 − V2
ˆ ˆ ˆ
ˆ ˆ
ˆ
or, ˆ ˛Vp =ˆ Vp − Vp = [ Z BUS ] ˆ [column r of Z BUS ] ˛I r (3.22)
ˆ ˆ ˆ
ˆ
˛Vq
ˆ
Vq − Vq ˆ ˛I r
ˆ ˆ ˆ
ˆ 0
ˆ ˛Vn ˆ Vn − Vn
˙ ˘
˙ ˘ ˆ˙ ˘
Here, we assumed nonprimed voltages to be the bus voltages before any current injec-
tion and is available from load fow study. The primed voltage quantities are respec-
tive bus voltages following current injection ( ˜I r ) at bus r only. The current injection
is constant, and for each line the line changing capacitance and any shunt connection
to the line are omitted. All bus voltages are with respect to the reference bus.
Moreover, we have
˜Vp = Z pr ˜I r
(3.23)
and, ˜Vq = Z qr ˜I r
Let us now assume that Z pq is the p.u. impedance of line between buses p and q. The
change of line current in Z pq can then be computed as
˜Vp − ˜Vq Z pr ˜I r − Z qr ˜I r ˝ Z − Z qr ˇ
˜I pq = = = ˜I r ˆ pr
Z pq Z pq ˙ Z pq ˘
(3.24)
˜I Z − Z qr
pq = pr
˜I r Z pq
° ˜I ˙
Conventionally, the ratio ˝ pq ˇ is termed as current injection distribution factor
( ˛ i ). ˛ ˜I r ˆ
˜I pq
i.e., = ˛i
˜I r (3.25)
or, ˜I pq = ˛ i ( pq)r ˜I r
In a power system network, often the load increases in a bus leading to line loading
beyond permissible value, and then it is required to reschedule the line loadings to
keep the line loading within safe values. Mathematically, this is equivalent to change
of current injection by ˜I m and ˜I n at buses m and n for reducing the line loading of
line between buses m-n. Equation (3.25) can be rewritten as
The next concept we would like to introduce is the line outage distribution factor (˜ ).
˛I pq
˜ pq(m−n) =
I mn
(3.27)
˛I
and, ˜rs(m−n) = rs
I mn
Clearly, the post contingency line currents in lines p-q and r-s are
Thus, it is now evident that if the pre-contingency line currents are known from usual
load fow as well as the line outage distribution factors ˜ pq and ˜rs for tripping a line
m-n are known, we can obtain the values of post-contingency line currents I pq ' and
I rs ' in the healthy lines p-q and r-s.
Vm −Vn
Ix = (3.29)
( Z mm + Z nn − 2 Z mn ) + (− Z x )
FIGURE 3.6 Removal of a line between buses m-n is equivalent to addition of (−Z x ) imped-
ance between buses m-n in Thevenin’s equivalent circuit.
98 Power Transmission System Analysis Against Faults and Attacks
Here (Vm ) and (Vn ) are the pre-contingency voltages at buses m and n, respectively.
On the basis of the analytical reasoning in the preceding articles, we can say that
the addition of impedance (−Z x ) between buses m-n would cause current ˜I m (= −I x) in
bus m and ˜I n (= I x ) in bus n. Thus, the resulting current variation in the line between
buses p-q can be expressed by the Equation (3.30).
˛I pq = ˙ i ( pq)m ˛I m + ˙ i ( pq)n ˛I n
Z pm − Z qm Z − Z qn (3.30)
= (−I x ) + pn ( I x )
Z pq Z pq
ˆ ( Z pn − Z pm ) − ( Z qn − Z qm )
or, ˛I pq = I x ˘ (3.31a)
ˇ Z pq
ˇ Vm −Vn ( Z pn − Z pm ) − ( Z qn − Z qm )
˛I pq = (3.31b)
˘ Z mm + Z nn − 2 Z mn − Z x Z pq
However, during the state of pre-contingency, when the line Lmn was not removed,
the current through this line (i.e. the current through the impedance (−Z x )) was
expressed as
Vm −Vn
I x(0) = (3.32)
Zx
I x (0) is the current through the line Lmn (= Z x ) in the pre-contingency state, while I x
is the current through (−Z x ) following line removal.
It may be noted here that I x (0) ˜ I x
Substituting Equation (3.32) in (3.31), we get
ˆ ( Z pn − Z pm ) − ( Z qn − Z qm ) I x(0) Z x
˛I pq = ˘
ˇ Z pq Z mm + Z nn − 2 Z mn − Z x
Z ˆ ( Z pn − Z pm ) − ( Z qn − Z qm ) (0)
= x ˘ I x
Z pq ˇ Z mm + Z nn − 2 Z mn − Z x
˛I pq ˆ Z ( Z pm − Z pn ) − ( Z qm − Z qn )
i.e., (0)
= −˘ x (3.33)
Ix ˇ Z pq Z mm + Z nn − 2 Z mn − Z x
˛ °I pq ˆ
Here, ˙ ( 0 ) ˘ is the line utage distribution factor ˜ pq( m− n )
˝ Ix ˇ
Contingency Analysis 99
ˆ Z ( Z pm − Z pn ) − ( Z qm − Z qn )
˜ pq(m−n) = − ˘ x (3.34)
ˇ Z pq Z mm + Z nn − 2 Z mn − Z x
In a similar manner, for removal of line Lmn, the effect on line between buses r and
s can be represented as
ˆ Z ( Z − Zrn ) − ( Z sm − Z sn )
˜rs( m− n ) = − ˘ x rm (3.35)
ˇ Zrs Z mm + Z nn − 2 Z mn − Z x
Thus, from Equations (3.34) and (3.35), we can fnd new line currents Ip̃q and I rs˜ fol-
lowing a line contingency in the power system between buses m-n.
Z x ( Z pm − Z pn ) − ( Z qm − Z qn ) (0)
I′pq − I pq = ∆I pq = −
I x
Z pq Z mm + Z nn − 2 Z mn − Z x
Z ( Z pm − Z pn ) − ( Z qm − Z qn ) (0)
i.e., I′pq = I pq − x
I x (3.36a)
Z pq Z mm + Z nn − 2 Z mn − Z x
ˆ Z ( Z − Zrn ) − ( Z sm − Z sn ) (0)
i.e., I rs˛ = I rs − ˘ x rm Ix (3.37a)
ˇ Zrs Z mm + Z nn − 2Z mn − Z x
Example 3.2
Assume fve bus power system. The [ Z BUS ] (in p.u.) is given by
Assume removal of the line between buses 2 and 4. The series impedance of line
between buses 2 and 4, that is, L34 are j0.05 and j0.1 p.u., respectively. Compute
the new current in the line between buses 3 and 4. In addition, obtain the value of
the line outage distribution factor of L34 for removal of line L24.
Solution
Let p = 3; q = 4; m = 2; n = 4
From Equation (3.34), we can write
ˆ Z 24 L ( Z − Z 34 ) − ( Z 42 − Z 44 )
˜34 (2−4) = − ˘˘ ( ) 32
ˇ Z 34 ( L ) Z 22 + Z 44 − 2 Z 24 − Z 24
− j0.56 + j0.89
= −0.5 = −0.0976
j1.69
˜ Line outage distribution factor of line L34 for outage of line L24 has been obtained
as (−0.0976).
0.005 − j0.025
= = − ( 0.25 + j0.05) p.u.
j0.1
0.015 − j0.02
= = − ( 0.4 + j0.3) p.u.
j0.05
Following Equation (3.36) we now have, for new line current in L34,
bus q of area B has impedance Z x , while that connecting bus m of area A and bus n
of area B has impedance Z y .
First, let us assume that the sub-grids are not interconnected and V1A , V2 A ,… , VmA
are the bus voltages for the buses 1, 2, …, m in area A, while V1B , V2B ,… , VnB are
the bus voltages for the buses 1, 2, …, n in area B. The respective bus impedance
metrices of area A and area B are [ Z BUS ] A and [ Z BUS ] B during isolated operation
of area A and area B. Moreover, the current injections in the respective buses are
I1A , I 2 A ,… , I mA for area A and I1B , I 2B ,… , I nB for area B.
Using the relation [V ] = [ Z BUS ] [ I ] , we have for this system,
° V1 A ˙ ° I1 A ˙
˝ ˇ ˝ ˇ
˝ V2 A ˇ ˝ I2 A ˇ
˝ ˇ ˝ ˇ
˝ ˇ ˝ ˇ
˝ VpA ˇ ˝ I pA ˇ
˝ VmA ˇ ° ˙ ˝˝ I mA ˇ
˝ ˇ ZA 0 ˇ
˝ … ˇ=˝ ˇ˝ … ˇ (3.38)
V1B ˇ ˝˛ 0
ZB ˇˆ I1 B ˇ
˝ ˝
˝ V2 B ˇ ˝ I2B ˇ
˝ ˇ ˝ ˇ
˝ ˇ ˝ ˇ
˝ VqB ˇ ˝ I qB ˇ
˝ ˇ ˝ ˇ
˝˛ VnB ˇ ˝˛ I nB ˇ
ˆ ˆ
[ AC ] = ˝˙ ACA ACB ˆˇ
x ˝ 0 0 ˜ 1 0 ° 0 0 … 1 0 ˆ
= (3.39)
y 0 0 ˜ 1 0 ° 0 0 … 0 −1 ˇ
˙
Following Equation (3.16), we have
˛ ˜
V1A ˆ ˛ ˆ
˙ ˘ ˙ V1 A
˘
˙ V2˜A ˘ ˙ V2 A˘
˙ ˘ ˙ ˘
˙ ˘ ˙ ˘
˙ Vp̃A ˘ ˙ VpA ˘
˙ ˜ ˘ ˙
VmA VmA ˘ ˛
˙ ˘ ˙ ˘ ZA 0 ˆ ˛ T ˆ ˛ Ix ˆ
˙ … ˘=˙ … ˘−˙ ˘ AC ˙ ˘ (3.40)
Z B ˘ˇ ˝ ˇ ˙˝ I y
˙ V1B˜ ˘ ˙ V1B ˘ ˙˝ 0 ˘ˇ
˙ ˘
˙ V2˜B ˘ ˙ V2B ˘
˙ ˘
˙ ˘ ˙ ˘
˙ ˜ ˘ ˙
VqB VqB ˘
˙ ˘ ˙ ˘
˙ ˜ ˘ ˙˝
VnB VnB ˘
˝ ˇ ˇ
˝ ˇ
ˆ ( Z pp + Z qq + Z x ) ˜ ( Z pn + Z qn ) ˝ I ˇ ˝ Vp − Vq ˇ
ˆ ° ° ° ˆ x =ˆ (3.41)
ˆ ˆ˙ I y ˘ ˆ˙ Vm −Vn ˘
ˆ˙ ( Z mp + Z nq ) ˜ ( Z mm + Z nn + Z y ) ˘
Because there are no interconnections between buses p-n and m-q hence Z pn = Z np
and Z mq = Z qm are nonexistent quantities.
−1
˝ ˇ
˝ Ix ˇ ˆ ( Z pp + Z qq + Z x ) ˜ ( Z pn + Z qn ) ˝ V −V ˇ
˛ˆ =ˆ ° ° ° ˆ p q (3.41a)
ˆ˙ I y ˘ ˆ ˆ˙ Vm −Vn ˘
ˆ˙ ( Z mp + Z nq ) ˜ ( Z mm + Z nn + Z y ) ˘
ˇ
( Z pp + Z qq + Z x ) ˜ ( Z pn + Z qn )
Here, [ Z ] = ° ° °
˘ ( Z mp + Z nq ) ˜ ( Z mm + Z nn + Z y )
(3.42)
ˇ Z pp Z pm ˇ Z x 0 ˇ Z qq Z qn
= + +
˘ Z mp Z mm ˘ 0 Zy ˘ Z nq Z nn
˛˙˙˝˙˙ˆ ˛˙˙˝˙˙ˆ
Sub matrix for system-A Sub matrix for system-B
Contingency Analysis 103
[ Z ] is the [ Z BUS ] matrix for the system with interconnections connected. Moreover,
the change in bus voltages can be obtained using Equation (3.15).
˝ ˛V1 A ˇ ˝ V1A ˇ ˝ V ˇ
ˆ ˆ ˆ 1A ˝ Ix ˇ
ˆ =ˆ ˆ = − Z ˝ T ˇ
− ˆ VpA [ BUS ] A ˙ ACA ˘ ˆ (3.34a)
ˆ ˛VpA ˆ VpA ˆ˙ I y ˘
ˆ ˆ ˆ
ˆ˙ ˛VmA
˘ ˆ˙ VmA ˘ ˆ˙ VmA ˘
Thus, the line currents can be obtained from Equation (3.41a), while the change in
bus voltages are obtained from Equations (3.43a) and (3.43b).
( V i = V j = 1.00 p.u.)
˜ I i − j becomes a real quantity. The p.u. power fow in the connecting line between
bus i − j is expressed as
Vi V j ˜i − ˜ j
Pi − j = sin (˜i − ˜ j ) ˆ p.u. (3.45)
xl xl
Comparing Equations (3.44) and (3.45) we see that once the voltages at buses of the
power network are assumed to be 1.00 p.u., the line current and power fow lead to
104 Power Transmission System Analysis Against Faults and Attacks
the same expression; hence, both are synonymous in the DC power flow method, that
δ −δ
is, I i − j ≡ Pi − j = i j
xl
∆I i − j, the change in line current is given by
∆ (δi − δ j ) ∆δi − ∆δ j
∆I i − j = = p.u (3.46)
xl xl
Next, we look at Equation (3.27) to apply the concept of line outage factor λi − j (m−n) for
assessing the line outage factor λ for line i − j due to assumed removal of line m − n in
the power system network. Following Equation (3.34) we can write
Z ( Zim − Zin ) − ( Z jm − Z jn )
λi − j (m−n) = − x
Zij Z mm + Z nn − 2 Z mn − Z x
Vm − Vn
I x(0) = ≡ I x( 0)
Z mn
∆I ij
Since λi − j (m−n) =
I mn
(see equation 3.27) , in dc pwer flow model
˝ ˜ Ykl 0 ° 0 ˇ
kˆ
iˆ ˜ 0 Yij ° 0
ˆ
˜ˆ ˜ ˜ ˜ ° ˜
˜ ˆ ˜ 0 0 ° 0
[ BUS ]
Y = ˜ˆ ° ° ° ° ˜ ° ° ° ° (3.49)
ˆ
lˆ Ylk 0 ° 0 ˜
jˆ 0 Y ji ° 0 ˜ [YBUS ]2
˜ ˆˆ ˜ ˜ ° ˜ ˜
1 ˆ 0 0 ° 0 ˜
˙ ˘
Yin ×Ynj
Yij (new) = Yij (old) − ,
Ynn
where n is the node number that is to be eliminated. Kron’s network reduction tech-
nique is applied to [YBUS ]1. Let the new bus admittance matrix of area 1 be [YBUS ]˛1
where all the nodes except nodes k and i are eliminated;
˙ Y˛ Yki˛ ˘
i.e., [YBUS ]1˛ = ˇ
kk
ˆˇ ik˛
Y Yii˛
° Y˜ Ylj̃˜ ˜ Yl˜1̃ ˙° ˙ ° ˙
˝ ll̃ ˇ ˝ Vl˜ ˇ ˝ I˜l ˇ
˝ Y jl˜˜ Yljj˜˜ ˜ Y j˜1̃ ˇ ˝ V j˜ ˇ ˝ I ˜j ˇ
˝ ˇ˝ ˇ=˝ ˇ (3.52)
˝ ° ° ° ˇ˝ ° ˇ ˝ ° ˇ
˝˛ Y1˜˜l Y1˜j̃ ˜ Y11˜˜ ˇˆ ˛˝ V1˜ ˆˇ ˛˝ I1˜ ˆˇ
The new [ Z BUS ] with respect to area 2 having equivalent representation of buses of
area 1 is as shown below
−1
˙ Y ˛˛ Ylj˛˛ ˜ Yl1˛˛ ˘
ˇ ll
ˇ Y jl˛˛ Yljj˛˛ ˜ Y j˛˛1
[ Z BUS ]˛˛ = ˇ (3.53)
ˇ ° ° °
ˆˇ Y1˛˛l Y1˛˛j ˜ Y11˛˛
while the new voltages for the buses in area 2 are given by
The elements of [ Z BUS ]˛˛ has external network equivalents of area 1, and hence, it is
possible to conduct the study of contingency analysis of the system in area 2 with
equivalent network of area 1 embedded in the new [ Z BUS ]. I l˜ and Ij̃ are equivalent
current injections at buses l and j, the boundary buses, while other bus current injec-
tions remain unchanged.
REFERENCE
1. A. Chakrabarti and S. Halder, “Power System Analysis: Operation and Control”, Third
Edition, New Delhi: PHI Learning Pvt. Ltd.
4 Fundamental
Concepts of Complex
Network Theory
4.1 INTRODUCTION
Complex network theory has gained extensive approval and has been successfully
applied in the assessment of complex systems such as computer networks, social
interacting species, internet and many more. With the evolution of complex network
theory, most complex systems in the universe can be abstracted as networks consist-
ing of a set of edges connecting a set of vertices. The inherent structural features of
these networks are assessed statistically using metrics. Earlier, the concept of com-
plex network theory was applied in abstracted networks such as random network
[1], small-world networks [2] and scale-free networks [3,4]. Scale-free networks are
fragile to intentional attacks but robust against random failures of nodes [4]. They are
more prone to cascading failure triggered by intentional attacks rather than random
networks [5,6].
The complexity of power systems arises not just from the instant power balance
of generators and consumers in large-scale transmission network across multitude of
countries but also from the decision making of system operators to keep the system
secure and reliable. Furthermore, there is a strong link between topological structure
and operational performance in power systems. For instance, a large-scale blackout
is more possible to be triggered by removing some critical buses or lines, which are
essential elements of the topological structure of power systems. Consequently, power
systems are naturally analysed under the framework of complex networks [7–9].
Despite the application of complex network theory in simulation of an electrical
power system, it would not be appropriate until it is employed with power system-
related constraints and features. Hence, it is more appropriate to utilise the concepts of
complex network theory in assessing the structural vulnerability of electrical power
grid associated with appropriate constraints and operational aspects related to electri-
cal power system. Literature survey reveals that attempts have already been made to
analyse the structural vulnerability in the North American [10] and European power
grids [11–13]. In this chapter, the complex network theory has been employed to
analyse its features related to vulnerability taking into account the associated param-
eters of power system such as electrical distance, line fow limit and power transmis-
sion distribution. These parameters are inserted through appropriate mathematical
framework into the traditional complex network metrics such as degree, geodesic
distance, effciency and betweenness. The concept of extended topological metrics
of electrical betweenness and netability have been simulated to assess the vulner-
ability of the power network. Furthermore, this chapter explains the theoretical and
109
110 Power Transmission System Analysis Against Faults and Attacks
L=
1
N ( N −1) ∑d ij (4.1)
i , j =1
unweighted and undirected network model is utilised. All the vertices and edges are
considered to be identical, without differences in their quantitative features or direc-
tions. In an unweighted and undirected graph, the length of a path is the number of
edges in a path connecting vertices i and j.
ci = ˜l ij (4.2)
j
si = ˜w ij (4.3)
j
E=
1
N ( N −1) ˜ d1 ij
(4.4)
i˝ j
where N is the number of nodes and dij is the geodesic distance between nodes i and j.
The concept of distance dij may be explained as the diffculty to transfer the rel-
evant quantity between the nodes (i, j) of a network. Distance generally depends on
the path that one follows and should be defned as a function of the characteristics of
the lines along the path. The economic and technical diffculties for transfer of elec-
trical power through a path depend on both the power fow through the lines and on
their impedance. With the same impedance, higher power fow increases costs; with
the same power fow, higher impedance increases costs. Consequently, the distance
from node i to node j along path k is related not only to the impedance of each line of
the path but also to the power fows through the lines of the path.
where Z is the element of the bus impedance matrix. The electrical distance is used
instead of geodesic distance when considering an extended topological approach.
Vij
Zij = (4.7)
Ii
4.2.7 BETWEENNESS
From the concept of complex network theory, it is evident that, if a vertex or edge
participates in more number of paths, the corresponding component becomes more
important for transmission in the entire network. Once it is assumed that the interac-
tions or transmission is always through the shortest paths between two vertices, it can
be used as an indication to justify the importance of a vertex or an edge in terms of
its betweenness.
Energy transfer between two nonadjacent buses depends on the buses and lines
of the geodesic paths connecting those buses. Thus, the vulnerability measure of a
network element can be determined by counting the number of geodesic paths going
through it, and is defned as betweenness centrality of that element.
Node betweenness of a node v can be expressed by the following formula [19]:
N N
B ( v ) = ˜˜ °°(v) i ˆ j ˆ v ˇ V
ij
ij
(4.8)
i j
where σij(v) is the number of geodesics from node i and node j through node v and
σij is the total number of geodesics between i and j. Similarly, the importance of
lines in the power grid can be determined by edge betweenness. Mathematically,
line betweenness centrality of a line can be obtained by the following formula [19]:
N N
B (l ) = ˜˜ °° (l ) i ˆ j ˇV , l ˇ E
ij
ij
(4.9)
i j
where σij(l) is the number of geodesics from node i to node j through line l. The
betweenness centrality is based on the topological structure of a complex network.
A component in any network has a specifc value of betweenness depending on
the confguration of the network. When these values are higher, it indicates that a
greater number of shortest paths pass through the component, highlighting the higher
criticality of the component. Thus, critical components of a network can be identifed
by ranking the betweenness value of the network components.
• Bus Classifcation
To avoid diffculties involved in differentiation and dynamic behaviour
features of network components, all components have to be treated identi-
cally. Here, power fow is the characterising parameter which is consid-
ered to be transmitted from any vertex to any other. Generally, the buses
in power transmission networks are considered as generation, transmis-
sion and load buses. Transmission is normally considered from generation
to load buses.
• Line Flow Limits
In a pure topological approach, edges are generally described in an
unweighted manner to defne related metrics such as distance, degree and
betweenness. However, in power systems, line fow limits restrict the abil-
ity of power fow in a line due to congestion and economic load dispatch.
These factors are important to assess the network security of the power
system. These constraints need to be ascertained and applied for each line
specifcally as different lines may have distinct fow limits. To assess the
vulnerability of the power network, electrical performance parameters are
important to assess the network security.
• Flow-Based Network
Transmission of power between two buses (vertices) is always supposed
to be through the shortest path. This is the most unrealistic assumption from
the viewpoint of electrical engineering. Power transmission from a genera-
tor bus to a load bus involves numerous lines which can be designated as
paths having different extent of contribution. In simulation of power net-
works for a linear model of power fow, the various contributions of lines in
the power network can be described by the PTDF.
The conventional topological model in network theory describes the
graph as unweighted and undirected. The identifcation of possible paths
connecting two vertices is based on graph theory where transmission lines
are assumed to be bidirectional. Some paths in undirected model may be
not valid in the directed power transmission networks. PTDF character-
ises the behaviour of the system when the simulation between two vertices
completely depends on physical rules. Because each element in PTDF is
116 Power Transmission System Analysis Against Faults and Attacks
associated with a sign, the lines connecting to one vertex should be classi-
fed as input or output lines.
• Transmission capacity
To maintain stable and secure operation, the capability of transferring
power for each transmission line can be designated by its own transmission
l
limit Pmax . In fact, for power transmission, not all lines reach their line fow
limit at the same time. Once the line attains its power transmission limit, the
power transmitted between corresponding pair of buses reaches its upper limit.
T (v) =
1
2 ˜˜C ˜ | f
g ˙G d ˙D
d
g
v
l ˙L
l
gd
| (4.10)
where v ˜ g ˜ d ° V
˜| f
l °Lv
l
gd
| is the sum of PTDF of all the lines connecting bus v when power is injected
at bus g and withdrawn at bus d.
1 d
2
Cg
l °L
˜
v
| fl gd | is the transmission power taken by bus v when power is transmitted
from generator bus g to load bus d; G is the set of generation buses, D is the set of
load buses, NG is the number of generation buses, ND is the number of load buses and
Lv is the set of lines connecting bus v.
Similarly, the extended betweenness of a line l can be defned as follows [66]:
where Tp and Tn are the positive extended line betweenness and negative extended
line betweenness of the line l.
T p (l ) = ˜˜C f g ˙ d , fl gd > 0
d gd
g l (4.12)
g ˇG d ˇ D
T n (l ) = ˜˜C f g ˙ d , fl gd < 0
d gd
g l (4.13)
g ˇG d ˇ D
Complex Network Theory 117
where Cgd fl gd represents the power fowing on the line l when power is transmitted
from g to d.
The concept of pure betweenness has been extended by introducing some elec-
trical properties. The set of extended betweenness qualifes the contribution of a
component to power transmission in the entire power grid, and in this respect, the
elements of the power grid can be ranked according to their criticality.
E =
1
N ( N −1) ˜ d1 ij
(4.14)
iˆ j
Here, the sum is taken over all pairs of nodes of the unweighted and undirected
network.
Vulnerability of a line in the network is a measure of drop in network functioning
due to removal of that line in the system [14]. So, the damage of the line can be mea-
sured by the relative decrement in network performance. If E is the global effciency
of the network without any damage to the lines and E(l) is the global effciency of
the network when line l is removed, then vulnerability of that line l can be calculated
as [14]
E − E (l )
Ve (l ) = (4.15)
E
The maximum of the vulnerabilities is vulnerability of the network;
Though the above method can be applied to power grid, some problems arise due to
distinguished characteristics of power grid network as follows:
a) Geodesic distance considers only the shortest path between the nodes, but
power can fow through any path between a pair of nodes.
118 Power Transmission System Analysis Against Faults and Attacks
b) There is no need to consider all pairs of nodes as power fows only from
generation nodes to load nodes.
c) The transfer capabilities in transmitting power of a network are different
which has not been taken into consideration in global effciency calculation.
° l ˙
P ˇ
Cij = min l ˘ L ˝ max (4.17)
˝ fijl ˇ
˛ ˆ
l
where Pmax is the transmission limit of transmission line l and fijl is the PTDF of line
l of the path joining generation node i to load node j. This is the change of power on
line l for injection at generation bus i and withdrawal at load bus j. fijl is obtained as
the difference between the entries fli and flj of the PTDF matrix is calculated as [16]
A = H / B / −1 (4.18)
1
Bij = ,i ° j (4.19)
xij
Bii = ˜ x1 ij
(4.20)
j ˛i
1
Hli = −Hlj = (4.21)
xij
Hlk = 0 °k ˛ i, j (4.22)
A=
1
NG N D ∑∑ CZ (4.23)ij
ij
i ∈G j ∈ D
A − A (l )
Va (l ) = (4.24)
A
where A(l) is the netability of the network when line l is removed.
REFERENCES
1. P. Erdos and A. Renyi, “On the evolution of random graphs”, Publications of the
Mathematical Institute of the Hungarian Academy of Sciences, vol. 5, pp. 17–61, 1960.
2. D.J. Watts and S.H. Strogatz, “Collective dynamics of ‘small world’ networks”, Nature,
vol. 393, pp. 440–442, 1998.
3. A.L. Barabasi and R. Albert, “Emergence of scaling in random networks”, Science, vol.
286, pp. 509–512, 1999.
4. R. Albert, H. Jeong, and A.L. Barabási, “Error and attack tolerance of complex net-
works”, Nature, vol. 406, pp. 378–382, 2000.
5. A.E. Motter and Y.C. Lai, “Cascade-based attacks on complex networks”, Physical
Review E, vol. 66, p. 065102, 2002.
6. P. Crucitti, V. Latora, and M. Marchiori, “Model for cascading failures in complexnet-
works”, Physical Review E, vol. 69, p. 045104, 2004.
7. R. Albert, I. Albert, and G.L. Nakarado, “Structural vulnerability of the North
American power grid”, Physical Review E, vol. 69, p. 025103, 2004.
8. V. Rosato, S. Bologna, and F. Tiriticco, “Topological properties of high-voltage elec-
trical transmission networks”, Electric Power Systems Research, vol. 77, pp. 99–105,
2007.
9. M. Rosas-Casals, S. Valverde, and R. Sol_e, “Topological vulnerability of the European
power grid under errors and attacks”, International Journal of Bifurcation and Chaos,
vol. 17, no. 7, pp. 2465–2475, 2007.
10. R. Kinney, P. Crucitti, R. Albert, and V. Latora, “Modelling cascading failures in North
American power grid”, European Physical Journal B, vol. 46, pp. 101–107, 2005.
11. P. Crucitti, V. Latora, and M. Marchiori. “A topological analysis of the Italian electric
power grid”, Physica A, vol. 338, pp. 92–97, 2004.
12. P. Crucitti, V. Latora, and M. Marchiori, “Locating critical lines in high-voltage electri-
cal power grids”, Fluctuation and Noise Letters, vol. 5, pp. L201–L208, 2005.
13. M.E.J. Newman, “The structure and function of complex network”, SIAM Review, vol.
45, pp. 167–256, 2003.
14. V. Latora and M. Marchiori, “Vulnerability and protection of infrastructure networks”,
Physical Review E, vol. 71, p. 15103, 2005.
Complex Network Theory 121
5.1 INTRODUCTION
Power generation, transmission and distribution, as an integrated system, is one of
the critical infrastructures as it is widely distributed in a vast geographical region and
indispensable to the modern world. Accidental failures and intentional attacks can
lead to disastrous social and economic consequences. Therefore, to ensure reliable
performance, electrical operation engineers need to assess the vulnerability of power
grid networks and identify the critical elements that need essential back-up protec-
tion to ensure a more robust electrical system against natural or malicious threats.
The vastness, size of components and the complex dynamics of various compo-
nents of power grids make them typical complex networks. Numerous researches
including basic characteristics and steady state and transient state performance have
been analysed since long, and in the present scenario of planned and unplanned
attacks on civilisation and society have raised the issue of vulnerability of a power
grid. Interestingly, the close relationship between topological structure and opera-
tion performance in power systems as a change in topological structure can alter the
operational condition of a power system leading to change in its operational perfor-
mance. Hence, there is an increasing interest in topological vulnerability assessment
of power grid networks using complex network methodology.
In this chapter attempts have been made to explore the applicability of complex
network theory in power distribution and transmission systems in assessment of vul-
nerability of any electrical power network.
In general, a vulnerable system operates with a “reduced level of security that
renders it vulnerable to the cumulative effects of a series of moderate disturbances”
[1]. From the viewpoint of power system operation, vulnerability is an estimate of the
fragility of the system following a sequence of occurrences which might involve line
or generator failure, disruptions, interruptions, blackout, breakdown or undesirable
operations of protective relays, information or communication system malfunction-
ing and human errors.
Vulnerability assessment includes identifcation and quantifcation following the
prioritising (or ranking) sequence while the system is under the threat of planned or
unplanned contingencies or attacks [2]. In conventional methods of security assess-
ment and contingency analysis, power system engineers use conventional mathemati-
cal tools with operational data and physical models of the power system components.
Such an analysis is valid under a given contingency and operating condition. It may
not be computationally feasible to simulate all possible combinations of contingencies
123
124 Power Transmission System Analysis Against Faults and Attacks
that could result in partial or complete collapse of the power network as well as events
of various switching actions and continuous load variations. Hence, it is diffcult to
assess the outage of a portion or the entire grid following unforeseen operating con-
ditions. Moreover, the expansion of the bulk power systems, their physical behaviour
and interrelationship intensifes the problem of comprehensive vulnerability study.
Hence, to reduce and simplify these problems, it is important to deepen and contrib-
ute to traditional analysis with novel tools of vulnerability assessment.
The motivation to assess the vulnerability of grid networks employing complex
network analysis is because of cascading failures of power grids globally following
contingencies and other reasons. The North American power grid was the frst ana-
lysed power grid [3] where the vertices were randomly removed, and in decreasing
order of their degrees (of those vertices) the connectivity loss was monitored. The
connectivity loss among various areas of the grid resulted in loss of potential of
substations to draw power from the generators. The depletion of generation nodes
(substations) was not effective in changing the average degree (connectivity) of the
grid due to high redundancy at the generation nodes (substations). As the power grid
is delicate towards the depletion of transmission nodes, the elimination of a single
transmission line can lead to connectivity loss. The analytical methods in complex
network theory revealed that the connectivity loss is substantially higher following
planned attacks, particularly if the degree of attack is higher for high betweenness
transmission hubs. Crucitti et al. [4] made the frst reference to European power grids
and compared the structural properties of Italian, French and Spanish power grids
by identifying the elements whose removal genuinely affected the structure of those
graphs. Rosato et al. [5] implemented high-voltage vulnerability assessment of power
grid networks in Italy, France and Spain to analyse the damage caused by controlled
removal of links. Thus, vulnerability assessments using topological methods are use-
ful in assessing the weakness of an electrical network as well as to design distinct
actions to minimise topological weaknesses.
been assumed to be the weight of the transmission lines and it is presumed that the
magnitude of power fow increases when the line reactance is low.
Some researchers [6] have employed metrics, such as degree and degree distribu-
tion, characteristic path length, clustering coeffcient and betweenness, to determine
how the relative connection of distributed generators (DGs) infuences the topological
structure of the grid network. Some researchers utilised weighted graph indices and
proposed advanced metrics based on the topology and condition of practical working
operation of the power networks for the measure of topological characteristics of the
power networks employing DGs. Authors of [7] performed similar assessment on the
basis of specifc distinct metrics where they introduced three vulnerability indices:
Structural Vulnerability Index (SVI), Contingency Vulnerability Index (CVI) and
Operational Vulnerability Index (OVI). These indices were exploited to measure
structural vulnerability to identify the vulnerable elements in the power network
and assess the state of operation of the network. In this chapter, a new metric called
Grid Vulnerability Index (GVI), which is a combination of the SVI, CVI and OVI, is
calculated to assess the structural change in a transmission system due to incorpora-
tion of DG.
GVI =
1
NG N D ˜˜ L Pe j
i
Zij (5.1)
i ˛G j ˛ D
where NG and ND denote number of generation buses and number of load buses,
respectively. Pi and Lj are the active power generation and maximum load of buses,
respectively. Here, the term Zij would be zero if the DG is directly connected to the
load bus. On the other hand, for conventional generators supplying power through
transmission lines, the value of Zij would be higher. In this case, the attribution of
generation bus to load bus reduces with the increase in the value of Zij.
To simulate GVI for a power network, the following assumptions are considered:
ei =
1 1
PD j N g ˜ 2P Gi
dij −1 (5.2)
i ˛VG
where ei represents the effciency of supplying power to a load node j. PD j is the active
load demand of node j, PGi is the power capacity of generator node i and dij is the
shortest path between generation node i and load node j. Ng is the number of DGs
in the network. The bigger the value of ei is, the more will be the power supplying
effciency of node i.
Consequently, the Global Average Power Supplying Effciency Index can be
expressed as [8]:
ei =
1
Ng ˜e = N1 i
g
1
ND ˜ PGi
2dij−1
(5.3)
i ˛VG j ˛VD i ˛VG
The exponential function in Equation (5.3) describes the characteristic of power sup-
plying effciency of the DG which decreases sharply with the increase in the trans-
mission distance.
Following any decrement in the value of e, the vulnerability of the network can be
assessed using the following expression:
˝ eˇ
e˜ = ˆ1 − ×100% (5.4)
˙ e0 ˘
Here, e0 denotes the power supplying effciency before the failure and e denotes the
power supplying effciency after the failure. From Equation (5.4), it is evident that the
bigger e’, more will be the drop in the functioning of the network, and the affected
node (bus) or link (line) will be more prone towards vulnerability.
for load shedding at demand nodes to restore feasible operation. Most studies focus
on minimising the costs of load shedding and additional generation in the DC model
or in lossless AC models. In case of identifcation of critical components of a power
system, the grid has to be modelled with full AC power fow equations, which are the
most accurate mathematical models of power fow.
A second aspect to measure severity of an attack is to consider the minimum
adjustments to power that must be made to restore the grid to feasible operation.
Power adjustments take the form of shedding load at demand nodes and adjusting
generation at generator nodes. This is explained in the Chapter 6 in the islanding pro-
cedure for modelling cascading failure in power transmission grids where load redis-
tribution model is followed using preferential probability. The next section discusses
the application of vulnerability indices in power transmission network by simulation.
TABLE 5.1
Line Parameters of IEEE 14 Bus System
Line No. Connecting Nodes Line Reactance Line Flow Limits
01 1–2 0.05917 130
02 1–5 0.22304 130
03 2–3 0.19797 65
04 2–4 0.17632 130
05 2–5 0.17388 130
06 3–4 0.17103 65
07 4–5 0.04211 90
08 4–7 0.20912 70
09 4–9 0.55618 130
10 5–6 0.25202 32
12 6–11 0.19890 65
12 6–12 0.25581 32
13 6–13 0.13027 65
14 7–8 0.17615 65
15 7–9 0.11001 65
16 9–10 0.08450 65
17 9–14 0.27038 32
18 10–11 0.19207 32
19 12–13 0.19988 32
20 13–14 0.34802 16
The line reactance is considered as weights of the edges of the graph. The line
parameters that are mainly considered are shown in Table 5.1:
Sample Calculation:
Global effciency (Ve): From Equations (4.14) and (4.15), the global effciency can
be calculated as follows:
For the given network
˜ d1 = 46.31667, E = 0.254487
ij
i˛ j
E − E1
Ve1 = = 1.43%
E
Netability (Va): From Equations (4.23) and (4.24), the netability can be calculated.
Vulnerability Assessment of Power Transmission Network 129
˜˜ CZ ij
ij
= 18218.0365, A = 506.0565
i =G j = D
A − A1
Va1 = = 9.15%
A
Following the above method of calculation, the values of global effciency and
netability for the given network are obtained and shown in Table 5.2.
The line vulnerabilities are calculated using Equations (4.15) and (4.24) and the
comparable graphs are resulted as shown in Figure 5.2:
It is observed that netability metric that includes the electrical properties of
extended topological approach gives enhanced results of vulnerability analysis. The
critical lines can be identifed as listed below in Table 5.3.
TABLE 5.2
Calculated Values of Global Effciency
and Netability
Line No. Connecting Nodes Ve (%) Va (%)
01 1–2 1.43 09.15
02 1–5 2.73 08.44
03 2–3 2.15 17.57
04 2–4 3.6 14.14
05 2–5 2.08 05.47
06 3–4 3.63 19.41
07 4–5 8.44 18.96
08 4–7 8.5 17.17
09 4–9 1.76 11.58
10 5–6 8.2 01.73
12 6–11 9.31 18.86
12 6–12 4.06 05.24
13 6–13 7.12 09.14
14 7–8 7.19 29.6
15 7–9 8.25 17.8
16 9–10 0.6 16.45
17 9–14 4.1 08.93
18 10–11 4.46 14.03
19 12–13 1.43 05.02
20 13–14 5.75 12.04
FIGURE 5.2 Graph of vulnerability analysis of lines using global effciency versus netabil-
ity of IEEE 14 bus power system.
TABLE 5.3
Critical Lines Identifed from Graph
Line No. Connecting Nodes Vulnerability in (%)
3 2–3 17.57
6 3–4 19.41
7 4–5 18.96
8 4–7 17.17
11 6–11 18.86
14 7–8 29.60
From the above, it is noticed that line number 11 is highly vulnerable in the given
network which connects a generation bus to a transformer node. One of critical lines,
that is, line no. 3 connects two generation buses. Other critical lines connect trans-
formers and buses. For obvious reasons, these lines are vulnerable as they are associ-
ated with critical components such as transformers and generation buses of the power
grid network.
The grid network has been analysed separately using only topological model
(global effciency) and by adding some power grid characteristics to the topological
model (netability). The IEEE 14 bus system is studied and the critical lines are iden-
tifed which justifes the applicability of the developed model, that is, the netability
model. The analysis identifes critical lines in the power grid which is very important
in maintaining the network security.
the 0th node. According to [12], the line parameters and fgure are shown in Appendix.
On the basis of pure topological betweenness or betweenness centrality (Equations 4.8
and 4.9) and extended electrical betweenness (Equations 4.10 and 4.11), the simulation
has been conducted on the test system to fnd line betweenness and node betweenness
with respect to respective line and node numbers (Figures 5.3 and 5.4a–d).
From the above analysis, it has been observed that the lines exhibit different
betweenness among themselves. Figure 5.4a reveals that line 70 has the largest value
of betweenness. Other lines like line number 42, 71, etc. follow line 70 in descending
order of magnitude of betweenness. Because betweenness interprets the criticality of
an element connected between two nodes, it is obvious that ranking lines in the order
of criticality is possible using this method of analysis.
(a) (b)
(c) (d)
FIGURE 5.4 (a) Line betweenness of IEEE57 bus system, (b) extended line betweenness
of IEEE57 bus system, (c) node betweenness of IEEE57 bus system and (d) extended node
betweenness of IEEE57 bus system.
In the next step, the concept of extended betweenness has been considered. This
extended betweenness indicates the criticality taking into account constraints like
line fow limits, maximum transmission capability, and power transmission distri-
bution factor. This concept is more realistic, and applying this concept in the test
system, the simulation reveals that line number 79 showed the highest magnitude
of extended betweenness followed by line number 25, 14, 27 and 21 (Figure 5.4b).
Hence, the extended betweenness exhibits more specifc criticality of the lines. The
same exercise has been conducted for nodes (buses) revealing that bus number 12
exhibits the highest degree of extended betweenness, that is, criticality.
In the next phase, analysis and simulation has been conducted on the same test
system to determine the netability of the system. The netability exhibits the degree
of vulnerability of the power network following contingencies. While observing the
results (shown in Figure 5.5), it is clear that despite line number 79 displaying high
betweenness under normal operating conditions, failure of line number 14 indicates
the drop of netability of 14.37% compared to other lines (case of single line outage).
In this context, line number 14 has been taken into account as a specifc case of
Vulnerability Assessment of Power Transmission Network 133
(a)
(b)
(c)
FIGURE 5.5 (a) Single-line outages of IEEE 57 bus system, (b) double-line outages of IEEE
57 bus system and (c) triple-line outages of IEEE 57 bus system.
134 Power Transmission System Analysis Against Faults and Attacks
REFERENCES
1. L.H. Fink and K. Carlsen, “Operating under stress and strain”, IEEE Spectrum, vol. 20,
pp. 1357–1365, 2005.
2. http://en.wikipedia.org/wiki/Vulnerability_assessment.
3. R. Albert, I. Albert, and G.L. Nakarado, “Structural vulnerability of the North
American power grid”, Physical Review E, vol. 69, 2004.
4. P. Crucitti, V. Latora, and M. Marchiori, “Locating critical lines in high-voltage electri-
cal power grids”, Fluctuation and Noise Letters, vol. 5, pp. L201–L208, 2005.
5. V. Rosato, S. Bologna, and F. Tiriticco, “Topological properties of high-voltage elec-
trical transmission networks”, Electric Power Systems Research, vol. 77, pp. 99–105,
2007.
6. L. Feng, M. Yanbin, and M. Shengwei, “On the topological characteristics of power
grids with distributed generation”, In the Proceedings of the 29th Chinese Control
Conference, Bejing, China, pp. 4714–4720, July 2010.
7. Z. Chen, C. Liu, Q. Xu, and C.L. Bak, “Vulnerability evaluation of power system
integrated with large scale distributed generation based on complex network the-
ory”, In Proceedings of the 47th IEEE International Universities Power Engineering
Conference, Middlesex, U.K, pp. 1–5, September 2012.
8. T. Chowdhury, A. Chakrabarti, and C.K. Chanda, “Analysis of vulnerability indices
of power grid integrated DG units based on complex network theory”, In Proceedings
of the 2015 Annual IEEE India Conference (INDICON), New Delhi, pp. 6540–6546,
December 2015.
9. T. Kim, et al., “Vulnerability analysis of power systems”, 2015.
10. http://www.ee.washington.edu/research/pstca/pf14/pg_tca14bus.htm.
11. H.B. Plittgen, “Computational cycle time evalution for steady state power fow calcula-
tions”, December 1985.
12. http://www.ee.washington.edu/research/pstca/.
6 Analysis of Cascading
Failure and Islanding
in Grid Network
6.1 INTRODUCTION
In most countries power grid is a typical complex network that is distributed
throughout a vast geographical region. Seldom, grid operation poses a threat of fail-
ure because of localised faults, consequently, affecting a part or the entire network
leading to vulnerable collapse of the grid network. Such a failure can affect a large
number of customers resulting in significant economic disruptions. Although most
electrical failures of line(s) and or buses emerge and dissolve locally, some trigger
avalanche mechanisms that can lead to failure of lines and buses as a chain event and
eventually cripple the entire network [1–3]. Such vulnerable failure of an electric grid
that leads to islanding of the grid network is termed as cascading failure. Literature
review reveals that a number of power grids across the world have suffered cascading
failures [1–5] causing blackouts. Cascading failure can achieve massive scale, with
millions of customers affected by loss of billions of dollars [6,7].
In mathematics a popular model, called the “sand pile” [8] model, states that when
sand is continuously piled in a heap, a point arises when a portion of the pile suddenly
begins to subside. If an attempt is made to prevent the breakdown by adding more
sand, the pile just collapses. Similarly, we can say that as a power grid approaches
a critical point, the possibility of a collapse increases. With the addition of new ele-
ments to the grid, increasing demand, interconnections and increase in power fows,
the grid may be quickly approaching its critical point. At such a point, it becomes
necessary to study the complex dynamics arising in the grid and to fnd possible solu-
tions to problems that may arise because of these dynamics.
Cascading failure [2] is common in power transmission grids when one of the ele-
ments fails (completely or partially) and shifts its load to nearby elements in the system.
Those nearby elements are then pushed beyond their capacity and they become over-
loaded and shift their load onto other elements.
• Severe overload
• Resource exhaustion
• Defective load management
• Inaccurate capacity planning
• Delay in communication response
• Sudden load burdening
135
136 Power Transmission System Analysis Against Faults and Attacks
• They can take down the entire power system, tumbling the service of each
component of the system one by one, until the entire load-balanced service
is unhealthy.
• They are an exceptional type of failure from which it is hard to recover.
They normally start with some small perturbation – like a transient net-
work issue, a small spike in load or the failure of a few instances. Instead
of recovering to a normal state over time, the system enters into a worse
state. A system in cascading failure won’t self-heal; it can only be restored
through human intervention.
• If the right conditions exist in the system, cascading failures can strike with
no warning. Unfortunately, the basic pre-conditions for cascading failures
are diffcult to avoid: it’s simply failover. If failure of a component can cause
load to shift to other parts of the system, then the basic conditions for cas-
cading failure are present. However, there are patterns we can apply that
help us defend our systems against cascading failures.
Among the above-stated probable causes of cascading failures, two scenarios are
commonly observed [8] to be frequent. These are load growth and random fuctua-
tions or perturbations.
Load growth is the increase in load in a specifc ratio either intentionally or due to
sudden high current operation.
Random perturbations can occur in the grid for several reasons. If random fuc-
tuations are small, their effect may not be felt. However, if the fuctuations are con-
siderable in magnitude, they can cause several undesirable effects on the functioning
of the grid, including the initiation of a cascading failure. For example, random per-
turbations can occur due to the incorporation of renewable distributed generators,
such as wind turbines and solar panels, in the grid.
The complexity of the entire power grid makes it diffcult to model each and every
individual component and study the stability of the entire system. Therefore, it is
often the case that abstract models of the working of the power grid are constructed
and analysed. The lack of a complex network-based model for the analysis of power
grid was a major drawback of the studies conducted earlier. However, Overload
Cascade model [9] was introduced to the complex network approach-based model.
This model assigns capacity to the links in the network proportional to the initial
power owing through them in the absence of any disturbance. When a disturbance
occurs, these power fows are redistributed and the fow dynamics of the network are
observed. The scenarios on which grid dynamics are observed include load growth
and random fuctuations or perturbations.
In this model, the initial load and generation on the nodes represent the initial
state of the system. Power fows are calculated using the DC Power Flow model.
Every link has a capacity which determines the maximum amount of power that can
be carried by that link. During normal operation, the system is stable and all power
fows are within limit. If a disturbance, such as failure of an element, sudden increase
in demand or load fuctuations, occurs in the system, all power fows are recalculated
Cascading Failure and Islanding in Grid Network 137
using equations and utilisation of all links is checked to see whether they are within
their capacity. If any link exceeds its capacity, it is removed from the system, and
its power is redistributed among other links, depending on impedances of the other
links. Even though the model is simple, the presence of the fow equations guarantees
that Kirchhoff’s and Ohm’s laws are properly considered, thus making the model
more realistic for use with the power grid. The reduced complexity of this method
allows its use even with large systems and provides a reasonable balance between
complexity of the method and accuracy of the results.
In load growth scenario, the load growth is modelled by increasing all loads simul-
taneously step-by-step by a factor. Each time the loads are increased, the Overload
Cascade model is run to calculate the power in the network. The increase in the
demand causes increased power fows through the links. Because each link is bound
by a fnite capacity, some of the links exceed their capacity and get overloaded to sup-
ply the increased demand. These overloaded links fail and the power that was being
carried through them is redistributed among the other links in the network. Because
of this redistribution, more links may reach their capacity and fail. This may lead
to a cascade of overload failures. This simulation can be performed with different
values of the factor, and the fraction of links that failed at the end of each simulation
can be recorded.
If a transmission line within the power grid trips, its power fow is automati-
cally shifted to the neighbouring line(s), which in most of the cases are capable
of operating with the extra load. However, in some cases, one or more of these
neighbouring lines may get overloaded and exceed the allowable limit of power
fow leading to overloading of line(s). This may lead to outage of the neighbouring
overloaded line(s) which phenomenon may spread over other line(s) suffering from
overloading. This process of failure of multiple lines as a chain event is a blow to
the contingent power grid which is likely to collapse while encountering multiple
line tripping. To better understand such events, the power grid needs to be analysed
from a network perspective taking the advantage of concepts in complex network
theory [10].
is prone to have cascading failure. If any of these vulnerable links happen to be the
initial failure, islanding must be initiated. Using the vulnerability index, proposed in
[15], it is possible to obtain the order in which the links fail.
electrical betweenness [13] where power transmission network buses are categorised
with respect to their characteristics and each power line performs in power transmis-
sion system subjected to operating equality and inequality constraints.
As stated earlier, betweenness of a bus (or node m) in a power network can be
defned as [13].
NG N D
T (m) =
1
2 ˜˜C ˜ f d
g
m
l
gd
(6.1)
g ˙G d ˙ D l˙L
where m ˜ g ˜ d ° Lm
˜fm
l
gd
represents the summation of PTDF of all the lines connecting bus m, power
l°L
being injected at bus g with power withdrawal at bus d.
1 d
2
Cg
m
˜
fl gd represents the quantum of transmitted power available at bus m dur-
l°L
ing transmission of electrical power from bus g to bus d. G represents the set of
generation buses; D denotes the set of load buses; NG and ND represent the number
of generation buses and the number of load buses, respectively; Lm is the set of lines
connected with bus m.
Electrical betweenness of a transmission line (link l) in a power network model
can then be represented as [13]
where T p (l ) and T n (l ) are positive and negative electrical line betweenness of the
transmission line l.
T p (l ) = ˜˜C d gd
f
g l g ˙ d , fl gd > 0 (6.3)
g ˇG d ˇ D
T n (l ) = ˜˜C d gd
g l f g ˙ d , fl gd < 0 (6.4)
g ˇG d ˇ D
Here, Cgd fl gd represents the power fow in the line l. The set of electrical betweenness
qualifes the contribution of the grid network component, for example, a transmis-
sion line, to the power grid network, and thus the criticality of elements of the grid
network can be assessed. With higher electrical betweenness, the criticality of the
line is enhanced. Each line can then be associated with a defnite value of electrical
betweenness Tgd, max where
Here, ε is the tolerance factor that represents the ability of a line to handle increased
electrical betweenness to retain the line operation within specifed limits. It may be
noted that ˜ > 1. A transmission line may be termed as overloaded, making it vulner-
able to failure, if Tgd, max > Cgd.
When considering power transmission [17] from a generator bus g to a load bus
d , as PTDF has a sign, if we specify a reference direction for line l the PTDF of
fl gd should be positive, negative or zero. Then, we determine positive betweenness
( fl gd > 0) and negative betweenness ( fl gd < 0) by Equations (6.3) and (6.4), respec-
tively. In Equation (6.3), if there is no fl gd > 0, then T p (l ) = 0 and in Equation (6.4),
if there is no fl gd < 0, then T n (l ) = 0.
The outage of a line or a bus connected to a line alters the shortest paths between
the buses (nodes), and consequently, the power fow of the tripped line gets redis-
tributed following the concept of preferential probability Πd. Such a process may
create overloads and subsequent overloading in other adjacent lines. The electrical
betweenness Tgd, max of the adjacent line(s) may exceed the corresponding limit(s) Cgd
for the overloaded line(s) following load redistribution and may trigger an avalanche
chain mechanism collapsing the entire system. During load redistribution, the pref-
erential probability can be expressed as [18]
cd˝
°d = (6.6)
˜c ˝
m
m˙ N
where α is a tunable parameter that can be varied from 0.2 to 2.2 in small-world
networks [9,19–23] like power grid, c is the degree (or connectivity) of d and N is the
set of neighbours of d.
Obviously, following collapse of a overloaded line, the additional electrical
betweenness ΔTgd transferred to an adjacent line is then given by
˛Tgd = T (l ) ˙ d (6.7)
This adjacent line may face outage and would induce further redistribution of power
fow making other surviving lines potentially vulnerable for collapse provided for
any surviving line, Tgd, max > Cgd.
This iterative process for removal of an overloaded line followed by redistribution of loads
among adjacent lines with subsequent identifcation and tripping of adjacent line(s) with
high degree of betweenness leads to cascading failure resulting in islanding condition.
6.5 SIMULATION
To illustrate the dynamic behaviour of cascading failures, the developed concept
has been validated frst in IEEE 57 bus test system [24] and then in the part of the
Eastern grid system of India (203 bus, 267 lines and 24 generator electrical grid
network). The single line diagram of both the test systems is shown in Appendix A
and B respectively.
142 Power Transmission System Analysis Against Faults and Attacks
The following algorithm illustrates the process of testing a grid system against
possible cascading collapse following tripping of a line with highest electrical
betweenness.
In the simulation, the IEEE 57 bus test system has frst been tested for failure of high-
est betweenness line as well as for failure of the bus with highest electrical between-
ness. In this process, the transmission line with the highest electrical betweenness in
the IEEE 57 bus test system has been identifed (line 79) and removed in the simula-
tion. This induces load redistribution among adjacent lines (line 10, 11, 13, 15 and 25).
Line 11 has now the highest electrical betweenness and is removed (Table 6.1). The
simulation reveals that continuation of the iterative process for removal of an over-
loaded line followed by redistribution of loads among adjacent lines with subsequent
identifcation and tripping of adjacent line(s) with high degree of betweenness leads
to islanding condition. It is clear from Table 6.1 that at the end of the process only
line 21 survives, and tripping of the this line leads to termination of the process and
the system is islanded. The mapping diagram of this process is shown in Figure 6.1
(circles indicate the islanded nodes while the rectangles are the line numbers). This
diagram depicts the mapping pattern of cascading failure, and it may be noted that
the tripping or cascading failure occurs only in the direction shown by arrows and
not otherwise or in any reverse process.
Cascading Failure and Islanding in Grid Network 143
TABLE 6.1
Results on Tripping of Line 79
Line No. Adjacent Lines πd Tgd,max Cgd
79 10 0.4836 22.8165 70
11 0.3631 25.8475 20
13 0.2362 31.8237 30
15 0.5352 45.4841 50
25 0.4849 74.8006 80
11 10 0.4351 22.0706 70
12 0.2672 43.0848 30
13 0.3962 35.9426 30
15 0.2436 36.8447 50
74 0.5964 41.2983 45
12 21 0.5632 64.6761 50
23 0.2975 24.6177 25
13 0.1326 29.1567 30
74 0.8973 49.0825 45
21 22 0.3261 1.6372 50
23 0.8964 35.9826 25
FIGURE 6.1 Load redistribution resulting islanding initiated by outage of line 79.
In the next step, standard load fow program is executed applying contingency
with tripping of lines, as indicated in the preceding steps. It has been found that load
fow convergence is possible till line 23 is tripped. Following tripping of line 23, the
load fow does not converge, indicating that the system is subjected to failure.
In the next step, the bus with the highest electrical betweenness (node 12) is
tripped in IEEE 57 bus test system. This induces load redistribution among adjacent
144 Power Transmission System Analysis Against Faults and Attacks
FIGURE 6.2 Load redistribution resulting islanding initiated by outage of node 12.
lines (line numbers 12, 13, 14, 21 and 23). The simulation reveals that continuation
of the iterative process for removal of an overloaded line followed by redistribution
of loads and subsequent identifcation and tripping of line(s) with high degree of
betweenness leads to cascading failure. The mapping pattern of this process is shown
in Figure 6.2.
In the 203-bus test system, the same process is repeated, and it has been observed
that cascading failure process is initiated with removal of a single line with the high-
est electrical betweenness (line number 206). Outage of line 206 results in redistribu-
tion of power fow associated with preferential probability in the neighbouring lines,
as shown in Table 6.2.
It reveals that for line number 14 and 13, the condition Tgd, max > Cgd is satisfed.
From outage of line number13, it can be observed from Table 6.2 that the criterion of
overload appears in line number 165 and 17 (as for each of these two lines Tgd, max > Cij
is satisfed). Following outage of line 165, the process of further redistribution of
loads is terminated because it is one of the terminal lines creating the state of island-
ing for the 203 bus network. The results obtained in Table 6.2 have been pictorially
depicted in Figure 6.3 where the rectangles represent the transmission lines (links or
edges of complex network) and the circles represent the buses (nodes or vertices of
complex network).
The process of cascading failure for the 203 bus network has been shown in
Figure 6.4 following tripping of the node (node number 101) that has the highest
electrical betweenness in the model power network. During islanding operation, the
system parts into two or more sections and each section may tend to have overvoltage
TABLE 6.2
Results on Tripping of Line 206
Line No. Adjacent Lines πd Tgd,max Cgd
206 207 0.4982 54.6062 85
14 0.5277 48.9331 40
13 0.7782 88.5479 80
241 0.6962 65.5667 70
13 237 0.4932 48.8378 90
165 0.6742 57.8635 45
17 0.4642 62.9876 50
165 157 0.6329 96.5728 90
Cascading Failure and Islanding in Grid Network 145
FIGURE 6.3 Load redistribution resulting islanding initiated with outage of line 206.
FIGURE 6.4 Load redistribution resulting islanding initiated by outage of node 101.
6.6 SUMMARY
In this chapter, a topological cascading failure assessment approach is described for
complex power grids. The property of electrical betweenness has been utilised to
identify critical lines and tripping of such a line with the highest electrical between-
ness resulting in load redistribution associated with preferential probability of load
attachment. To validate the developed concepts, IEEE 57 bus test system and a typi-
cal 203 bus grid network of eastern India have been utilised. Outage of a line with the
highest electrical betweenness within such a grid network has been simulated, and
it has been observed that the redistribution of loads to the adjacent lines associated
with preferential attachment leads to overload of an adjacent line(s). The iteration of
simulated outage of such an overload line and determination of subsequent loadings
on surviving adjacent lines is continued in this investigation so that the process is
converged to a single overloaded line. It has been observed that tripping of this ter-
minating line would result in islanding of the power grid. Hence, it is concluded that
this method is an effcient technique for analysing and assessing cascading failure
following outage of overloaded line(s).
REFERENCES
1. R. Albert, I. Albert, and G.L. Nakarado, “Structural vulnerability of the North
American power grid”, Physical Review E, vol. 69, p. 025103, 2004.
2. P. Hines, K. Balasubramaniam, and E.C. Sanchez, “Cascading failures in Power grids”,
IEEE Potentials, vol. 28, no. 5, pp. 24–30, 2009.
3. Yang Nan, Liu Wenying and Guo Wei, “Study on scale-free characteristic on propa-
gation of cascading failures in power grid”, IEEE 2011 EnergyTech, Cleveland, OH,
pp. 1–5, 2011, doi: 10.1109/EnergyTech.2011.5948519.
4. L.L. Lai, H.T. Zhang, C.S. Lai, F.Y. Xu, and S. Mishra, “Investigation on July 2012 Indian
blackout”, 2013 International Conference on Machine Learning and Cybernetics,
14–17 July 2013. doi: 10.1109/ICMLC.2013.6890450.
5. P. Crucitti, V. Latora, and M. Marchiori, “A topological analysis of the Italian electric
power grid”, Physica A, vol. 338, pp. 92–97, 2004.
6. R. Kinney, P. Crucitti, R. Albert, and V. Latora, “Modelling cascading failures in North
American power grid”, European Physical Journal B, vol. 46, pp. 101–107, 2005.
7. IEEE Working Group on Understanding, Prediction, Mitigation and Restoration of
Cascading Failures, “Benchmarking and validation of cascading failure analysis tools”,
IEEE Transactions on Power Systems, vol. 31, no. 6, pp. 4887–4900, 2016.
8. S. Pahwa, “Dynamics on complex networks with application to power grids”,
Dissertation Thesis, Kansas State University, 2013.
9. A.E. Motter and Y.C. Lai., “Cascade-based attacks on complex networks”, Physical
Review E, vol. 66, p. 065102, 2002.
10. G.A. Pagani and M. Aiello, “The power grid as a complex network: A survey”, Physica
A, vol. 392, pp. 2688–2700, 2013.
11. K. Sun, “Complex networks theory: A new method of research in power grid”, In
Proceedings of IEEE PES Transmission and Distribution Conference and Exhibition,
Asia and Pacifc, Dalian, China, pp. 1–6, 2005.
12. D. Wu, E. Bompard, and F. Xue, “The Concept of Betweenness in the Analysis of Power
Grid Vulnerability,” In Engineering. Complexity in, Rome, Italy, pp. 52–54, 2010, doi:
10.1109/COMPENG.2010.10
Cascading Failure and Islanding in Grid Network 147
13. E. Bompard, D. Wu, and F. Xue, “Structural vulnerability of power systems: A topolog-
ical approach”, Electric Power Systems Research, vol. 81, no. 7, pp. 1334–1340, 2011.
14. North American Electric Reliability Corporation, “Evaluation of criteria, methods, and
practices used for system design, planning, and analysis response to NERC blackout
recommendation 13c, 2005. http://www.nerc.com/docs/pc/tis/.
15. M. Youssef, C. Scoglio, and S. Pahwa, “Robustness measure for power grids with respect
to casacading failures, In Proceedings of the International Workshop on Modeling,
Analysis and Control of Complex Networks, San Francisco, CA, pp. 45–49, September
2011.
16. G. Rout, T. Chowdhury, and C.K. Chanda, “Betweenness as a tool of vulnerability anal-
ysis of power system”, Journal of Institution of Engineers (India): Series B, Springer,
vol. 26, no. 8, pp 2443–2451, 2016.
17. A.V. Gheorghe, M. Masera, and P.F. Katina, “Infranomics: Sustainability, Engineering
Design and Governance”, New York: Springer Ltd.
18. J. Wang, L. Rong, and L. Zhang, “A new cascading model on scale free network
with tunable parameter”, First International Conference on Intelligent Networks and
Intelligent Systems, IEEE Computer Society, Washington, DC, 2008.
19. X.F. Wang and G.R. Chen, “Complex networks: Small-world, scale-free and beyond”,
IEEE Circuits and Systems Magazine, vol. 3, no. 1, pp. 6–20, 2003.
20. P. Crucitti, V. Latora, and M. Marchiori, “Model for cascading failures in complexnet-
works”, Physical Review E, vol. 69, p. 045104, 2004.
21. K.-I. Goh, B. Kahng, and D. Kim, “Universal behaviour of load distribution in scale
free networks”, Physical Review Letters, vol. 87, no. 27, p. 278701, 2001.
22. R. Cohen, “Breakdown of the Internet under international attack”, Physical Review
Letters, vol. 86, no. 16, p. 3682, 2001.
23. Y. Zhang, S. Cai, C. Chen, and J. Shi, “Robustness of deterministic hierarchical net-
works against cascading failures”, IEEE International Conference on Electrical and
Control Engineering, USA pp. 4063–4066, 2011.
24. http://www.ee.washington.edu/research/pstca/.
7 Assessment of
Resilience in Power
Transmission Network
7.1 INTRODUCTION
The word resiliency is derived from the Latin word “resilio,” which literally means
the ability of an entity to rapidly get back to its original state, shape, health or posi-
tion, after enduring and opposing stress applied on it. Based on these, resilience of
networks, systems, infrastructure, machines, human health, community response to
epidemics or natural disasters have been defned. Power grid resiliency is gaining
importance as climate change increases the threats to modern infrastructure.
unexpected set of disturbances is the system’s ability to reduce the magnitude and
duration of the disruption. A resilient system downgrades its functionality and alters
its structure in an agile manner. If failures are prolonged events and system recovery
is slow, this may have serious implications for the transmission system.
Robustness is the ability of a system to cope with a given set of disturbances and
maintain its functionality. Robustness is concerned with strength, whereas resilience
is concerned with fexibility.
Robustness and resilience belong to two different design philosophies. When a
robust grid is attacked, it may break like an oak tree in a storm. When a resilient grid
is attacked, it can bend and survive like a reed in a storm. From a system engineering
point of view, absolute robustness can actually lead to fragility. The interrelationship
between these three parameters can be explained by Figure 7.1.
In the wake of unprecedented disasters and attacks, robustness and resilience have
become buzz words in many disciplines including biology, ecology, sociology, sys-
tems engineering and infrastructure engineering. The traditional defnition of resil-
ience in systems engineering is the capacity for fast recovery after stress and for
enduring greater stress [4,5]. In systems engineering, resilience includes maintaining
system functionality following disturbances. Robustness, on the other hand, explains
the ability of a system to resist change without losing stability [6]. In some disci-
plines like social systems and organisational systems, the term resilience is similar
to the term robustness. In infrastructural systems, and especially in power systems,
however, the term robustness and resilience are more distinct; this is due to power
systems structure and function centring on conductor lines delivering electric power
to a certain area within specifc voltage and frequency ranges.
Extreme robustness actually leads to fragility. Power systems are usually robust
enough to withstand one contingency [N − 1] or two contingency [N − 2] events,
where N stands for the number of system buses. However, beyond that, they are gen-
erally vulnerable. Moreover, the robustness is usually used with specifc assumptions
for protection system operation under pre-defned operational ranges for voltage and
loading.
FIGURE 7.1 Block diagram of reliability, robustness and resilience in control operation.
Resilience in Power Transmission Network 151
The concept of reliability is also used in industrial and systems engineering and
is accompanied by statistical and probabilistic approaches that characterise system
performance after predicted and unpredicted failures. Reliability and stability are
two more explicit power system concepts that pre-date the terms “robustness” and
“resilience” [6]. Reliability and stability are well studied concepts in power systems.
Similarities and dissimilarities between them and the terms robustness and resilience
can inform future cyber physical resilience studies.
Discussions of resilience often centre around a system survivability that lever-
ages load shedding, generation outages and other actions. Reliability is a measure
of the system’s ability to serve all loads. The system’s ability to serve loads is tra-
ditionally referred to as service availability, which falls under the power systems
defnition of reliability. Reliability indices are usually expressed in terms of the
probability of load loss [6]. The loss of load probability is expressed in days per
year. Reliability is primarily concerned with the risk of service interruption of
device failure.
“Stability is the ability of a system to remain intact after being subjected to small
perturbations” [7]. In power systems, stability for a given initial operating condition
means the system will regain operation equilibrium state after small perturbations.
Stability is focused on the system equilibrium point. However, the concept of robust-
ness in power systems goes beyond stability. To be robust, the electric grid has to be
stable in the face of small perturbations as well as major equipment failures, man-
made attacks and natural disasters [7].
Power system resiliency generally refers to the ability of the system to deal with
unpredictability of catastrophic weather events and robustness of the infrastructure.
Resiliency of transmission lines are [8–10] different from that of distribution lines.
Transmission lines undergo extensive planning, maintenance, making them strong
enough to withstand forces of nature. Distribution systems, on the other hand, have
fnancial constraints for robust planning and 90% of the power outages are due to the
inability of the distribution system network to withstand strong disturbances leading
to power outages downstream of sub-transmission networks.
Metrics of resiliency are necessary to assess about preparation for ensuring proper
operation and safety of existing electrical network when the network is subjected to
contingency or attack. Resiliency implies the immunity of the electrical network and
it is a subjective concept. It can be assessed through its metric but there is practically
no way to quantify the resiliency. The resiliency related to the planning and opera-
tion of electrical power system deals with the effect of sudden disturbances to the
network [11]. For long-term resiliency, it is important to determine how the power
system infrastructure of a country would sustain itself in case imported raw materi-
als suddenly become unavailable.
There are considerable amount of research work on system restoration and
optimal recovery strategies in power system networks following a vulnerable dis-
turbance. Usually, the system operators heavily depend on switching of different
portions of the network to ensure proper restoration of the electrical network sub-
jected to unplanned contingency or attack but in case the switches face catastrophic
damages due to the vulnerability of the contingency or attack, then the restoration
policy fails.
152 Power Transmission System Analysis Against Faults and Attacks
To assess the resiliency, due consideration may be given in the following aspects:
Several isolated yet similar occurrences over the past emphasise the range of chal-
lenges power systems need to overcome. In addition, an eye must be kept on how
these challenges are evolving due to climate change and emergence of new tech-
nologies. Strong winds, especially when combined with rain, hail and snow from
seasonal storms, can damage electricity utility systems, resulting in service inter-
pretations to large numbers of electricity customers, which is likely to include criti-
cal loads like airports, hospitals, city halls and other buildings deemed important
to the community [12]. While most such power outages are caused by faults as a
result of trees (or their branches) falling on local electricity lines and poles, major
power outages tend to be caused by extreme weather events. Here are some of the
examples:
• In 2008, China had to bear the consequences of a severe ice storm, which
led to failure of about 2000 substations, resulting in the collapse of about
8,500 poles, resulting long power disruptions in 13 provinces and more than
170 cities and towns across the world’s most populated country [15].
Commonly used practices for resiliency are making lines underground, and/or
removing the trees which caused faults, and/or taking mitigating action against
rodents causing short circuit fault; however, these approaches are neither environ-
ment friendly nor a sustainable, economic and universal solution.
There is a huge drive to improve the resilience of the power infrastructure to
such increasing occurrences of power outages due to abrupt weather disturbances.
However, without having a formal procedure to measure the existing resiliency of
the system, it may be an uncertain path to follow while reconfguring the existing
network to be more robust. Now, before proceeding to the details about assessment
of resiliency, it is important to review the existing defnitions and interpretations of
resiliency.
Though there are some distinctions existing among various defnitions, it is wor-
thy to compare them to reveal some relevant aspects of system operations.
Basically, resiliency addresses the concern that assesses the level of preparedness
of a system encountering disruptions. It is important to clarify in resiliency assess-
ment that how much of the service has been degraded and how quickly the service
has been restored. Moreover, it is important to assess how completely the service
has been restored. Resiliency also describes the degree of disruption across mul-
tiple dimensions, which could include type, quality, time and geography of service
provision.
It is important to assess the state of the system from the viewpoint of its design
and redundancy. For example, an electricity grid system that is designed with more
redundancy, operated with more contingencies for back up and designed with recov-
ery might experience a lesser and briefer disruption; and, if so, would be more resil-
ient than a system that has less redundancy has fewer backups and is more diffcult
to rebuild.
Moreover, it may be noted that different responses lead to different resiliency at
different costs. For example, with additional resources, it is possible to restore the
electrical system while it is subjected to outages following disruptions. It is also
important to utilise more effcient equipment, and, consequently, the quality of ser-
vice provided after recovery could exceed the original level of service provided.
It is interesting to note that resiliency also depends on the timescale. With effcient
maintenance an electrical network would suffer lesser disruption and even if there
are disruptions, the restoration will be more prompt and quick. Indirectly, this would
increase the resiliency of the power network.
Because resiliency is a subjective concept, defnition of resiliency includes some
additional relevant characteristics of the network. These characteristics are clarifed
as redundancy of the network, reliability, sustainability, vulnerability, fault tolerance
capability and fast clearing circuit breakers, recoverability, etc.
A. Events: Background: What are the events (primary causes of outage like
tropical storm) for which the utility has a prepared response? How these
events were selected (experience, expertise, tradition, regulatory require-
ments, design basis, risk assessment, industry standard, etc.)
B. Resource allocation: In this section, the resource allocated for the event
response is to be studied. Budgets, number of generators available, man-
power, smart grid tech and questions related to monitoring system can be
asked in this section. This section utilities special arrangement for a par-
ticular event is of major attention
C. Capacity and capability: Capacity defnes the organised structure of
the allocated resource. The type and intensity of the damage to the grid
depend upon kinds of event. The capability of allocated resource to handle
the event specifc damage to grid is desirable. For the event of storm, the
required capabilities for response is different than in the event of cyber
attacks.
D. Threshold: When is a response activated? What is the triggering criterion
or threshold? Is the criterion absolute or does it depends on internal/external
factors? Is there a trade-off between, for example, safety and productivity?
Are some important that is associated with this section.
E. Performance and verifcation: This block is dedicated to the analysis of
the produce result. After an event recovery does not imply perfect restora-
tion of the system functionality rather it implies that system has returned to
a state where it is considered functional. Effciency, reliability, fault toler-
ance and robustness are some performance characteristic measures, which
are helpful for data verifcation.
F. Outcome: Whether the performance through prepared response is accept-
able. How much system generated the outcome that was it seeking to
achieve. Reduced damage from disasters and increased economic activity
are some measures of outcome.
G. Relevance: This is the beauty of proposed framework which allow utilities
to raise question upon its preparation. The most important question is that
when the response was prepared, and when was it last updated? And under
which circumstances?
A single event has the capability to create major disturbances in the grid but black-
outs are not the results of single event and defciency but the combination of sev-
eral defciencies. The following preconditions are the basis for a high power outage
risk:
Under these abovementioned conditions grid vulnerability increases. Now the likeli-
hood of a power blackout for the following events is very high:
main power network when the network is subjected under contingency or attack con-
dition. Molloy–Reed criterion [29] being an effective tool to determine the percola-
tion threshold of the nodes in a complex network, it can be applied in assessing the
resiliency of the grid network under stress. Following this criterion, the percolation
threshold transition is observable when <c2> = 2<c>, where <c2> is the second
moment of degree distribution and <c> is the frst moment of degree distribution.
When <c2> → 2<c>, the power grid network transforms its nature from a nonresil-
ient system to a resilient one in the limiting case.
Once the threshold of the grid network is established, it would be feasible to assess
the resiliency of a specifc structure of the grid network so that at least one critical load
is catered (which may be used as a resource point to restore other loads affected by the
vulnerability of any attack). In case the fraction (r) of the affected nodes of the grid net-
work becomes lesser than the critical fraction rcri of the quantum of affected nodes of
the grid network, the grid system would have better resiliency. In simulating the power
network, encountering attack or contingency, it would be useful to determine rcri of the
nodes that can be afforded to get damaged while maintaining the resiliency.
While encountering an attack or facing a contingency, the network graph con-
fguration gets altered. This altered graph of the network is then termed as damaged
graph. The damaged graph is characterised by the following degree distribution P(c)
[30,31]:
˙ i ˘ i −c
P (c ) = ˜ˇˆ r (1− r ) P (c )
c
c
(7.1)
i c
F0 ( x ) = ˜P (c) (1− r ) x c
(7.2)
c
ˆ
1
F1 ( x ) =
c ˜c P (c) (1− r ) x c−1
(7.3)
c
Here, F0 (1) is the fraction of nodes from the original graph belonging to the damaged
graph and F1 (1) is the relation among c and the average number of nodes from V
that can be reached after deleting a fraction r of nodes. The generating function of
other components which can be reached from a randomly chosen node is:
H1 ( x ) = r + xF1 ( H1 ( x )) s (7.4)
And the generating function for the size of the component to which a randomly cho-
sen node belongs to is [30]:
H 0 ( x ) = r + xF0 ( H1 ( x )) (7.5)
Resilience in Power Transmission Network 159
Thus, the average component size other than the giant component will be:
After long algebra, we see that this leads to singularity when F1/ (1) = 1
To ensure the percolation of the damaged graph, the following inequality holds
good:
c2 = ∑c P (c) 2
c (7.8)
= (1− r ) c 2 + r (1− r ) c
2
Application of Molloy–Reed criteria [30] in solving Equations (7.5) and (7.6) yields
the expression for critical fraction of node removal rcri, as shown in Equation (7.10),
1
rcri = 1− (7.10)
c2
−1
c
Hence, it is evident from Equation (7.10) that the critical ratio of damaged to
undamaged nodes in the given power network (rcri) is governed by the ratio of vari-
ance (c 2 ) and average degree distribution (c) for the network confguration under
consideration.
When the variance in the degree distribution gets maximised, the grid network
becomes more resilient. It may also be observed that even if average degree con-
nectivity increases without increase in variance, it would not improve the resiliency
of the grid network. On the other hand, when both variance and average degree
connectivity increases, the network resiliency will be more prominent. It is possible
to compute the critical probability associated with grid contingency to predict the
consequences of contingency or attacks on the grid network structure. It is possible
to translate a contingency or an attack into equivalent random failure [31]. This gives
C/
° =
/
˜ c Pc(c)
C
(7.11)
160 Power Transmission System Analysis Against Faults and Attacks
Here, ˜ / represents the probability that a particular line leads to a deleted node (bus)
following the removal of a fraction r of nodes (buses). This becomes equivalent to the
random removal of those links (lines) interconnecting the remaining nodes to those
already deleted.
The probability of having a node linked to other nodes can be represented as
where C / represents the average degree for the damaged graph (network under attack).
systems, it is appropriate to consider the fow of electrical energy through the net-
work. A statistical physics backed percolation model served as an abstraction of com-
plex networks and connectivity between the nodes [36]. Thus, this theory comes
across as suitable candidate for analysis of resiliency of transmission system. Some
of the defnitions of system resiliency derived from the statistical tools employing
complex network theory [37] are given below:
7.6 SIMULATION
To investigate the resilience characteristics of a large transmission system against
any attack or outage, the developed concept has been validated in the part of the east-
ern grid system of India (203 bus, 267 lines and 24 generator electrical grid network)
[38]. The following algorithm illustrates the process of testing grid resilience against
possible attacks and outages.
Step-by-step methodology:
In this simulation, in the frst step, the electrical betweenness of the nodes (buses)
and links (lines) are determined. In the following section of the simulation, generator
buses are ranked in descending order of electrical betweenness (Table 7.1). Here the
generator full load ratings (in p.u.) are taken into account, and according to ranking
of the electrical betweenness of these generator buses, the p.u. power ratings are cur-
tailed from full load value till zero (complete outage). The corresponding magnitudes
of rcri and ρc are computed and the obtained values are tabulated in Table 7.1.
It may be observed from Figure 7.2 that following generation drop of the genera-
tors in the transmission system, the magnitude of rcri and ρc reduce gradually indi-
cating drop in resiliency of the grid. The grid becomes vulnerable to outage and
attacks. Interesting to note how the values of rcri and ρc reduce gradually, indicating
the system is falling under poor resiliency. It may be observed that the slope of pro-
fle of rcri and ρc corresponding to generators at Farakka are steepest for the major
portion of operation, indicating that any attack or outage on generators at Farakka
would make the transmission system least resilient. It is also evident that generators
at Bakreshwar follows next. Hence, it is possible to identify specifc generating sta-
tion that would adversely affect the resiliency of the transmission network the most
by observing rcri and ρc profles.
TABLE 7.1
Computational Values of rcri and ρc Following Gradual Generation Drop of
Highest Betweenness Generator Buses in Descending Order
Generator Bus Generation Highest Betweenness Load Bus
Number (p.u.) Number Adjacent to the Generator rcri ρc
1 (FARAKKA) 4 47 (BALURGHAT) 0.64 0.44
3 0.49 0.38
2 0.32 0.21
1 0.28 0.12
4 (BAKRESHWAR) 1.9 188 (SAINTHIA) 0.83 0.72
1.5 0.74 0.36
1 0.68 0.29
0.5 0.6 0.23
3 (KTPS) 1.8 71 (KOLAGHAT) 0.78 0.38
1.4 0.73 0.32
1 0.69 0.29
0.5 0.66 0.23
8 (DPL) 0.9 199 (BOLPUR) 0.64 0.79
0.75 0.60 0.43
0.5 0.58 0.38
0.25 0.55 0.22
13 (CHUKHA) 0.675 114 (COOCHBEHAR) 0.63 0.36
0.5 0.6 0.29
0.35 0.58 0.21
0.2 0.55 0.18
Resilience in Power Transmission Network 163
FIGURE 7.2 Variation of rcri with change in p.u. generation for the respective generating
plants.
Figures 7.3 and 7.4 represent the bar diagrams for rcri and ρc of generators at respec-
tive generating stations arranged from the value of highest to lowest betweenness. It
is evident from the simulation that generators at Farakka have the lowest values of rcri
and ρc indicating their susceptibility to attacks and outages followed by generators
at Bakreshwar.
Next, the resiliency of lines has been studied by ranking the lines according to
electrical betweenness in descending order and then removing those selected lines
the values of rcri and ρc are computed. It has been observed that line number 169, 241,
245, 205, 106, 148 and 42 are the frst seven high betweenness lines. Outage of any or
pair of these lines would make the drop in resiliency for the entire network. Table 7.2
exhibits the respective values of rcri and ρc on removal of each of high betweenness
lines in the given network.
The pattern of the values of rcri and ρc when arranged according to the electrical
betweenness of selected lines are shown in Figures 7.5 and 7.6, respectively. It is
observed that as the electrical betweenness lines of the lines decrease, the value of rcri
and ρc increases. It signifes that for higher values of electrical betweenness the dam-
age is much larger in proportion to those lines with lower electrical betweenness. It is
evident that rcri and ρc values of the lines indicate how much resilient is the network
against tripping of any particular line.
The parametersrcri and ρc depict the pattern of resiliency of a transmission network
taking into account the possible outage of the generators as well as transmission lines
164 Power Transmission System Analysis Against Faults and Attacks
FIGURE 7.3 Bar diagram of rcri for generators arranged from the highest value of between-
ness to the lowest value of betweenness.
FIGURE 7.4 Bar diagram of ρc for generators arranged from the highest value of between-
ness to the lowest value of betweenness.
Resilience in Power Transmission Network 165
TABLE 7.2
Results on Removal of Highest Betweenness Lines
On Removal
with descending order of betweenness. This clearly signifes the relation of electrical
betweenness in measuring the criticality of grid resilience. The part of the eastern
grid system of India under study is basically a medium-to-large transmission sys-
tem and the assessment of its resiliency gives an idea of how structural topological
parameters like electrical betweenness are essential to maintain resiliency of trans-
mission systems.
FIGURE 7.5 Bar chart showing the values of rcri for selected lines for higher to lower
betweenness.
166 Power Transmission System Analysis Against Faults and Attacks
FIGURE 7.6 Bar chart showing the values of ρc for selected lines for higher to lower
betweenness.
7.7 SUMMARY
The ability to resist and mitigate stresses, failures, outages or any attacks can be
assessed by assessing the critical fraction of nodes and percolation threshold. These
parameters are observed on removal of lines and buses; hence, resiliency is ascer-
tained in transmission systems. It is possible to identify any specifc generating sta-
tion or transmission line whose removal would amount to the lowest resiliency of the
transmission network.
REFERENCES
1. D.L. Alderson, G.G. Brown, and W.M. Carlyle, “Operational models of infrastructure
resilience”, Risk Analysis, vol. 35, pp. 562–586, 2015.
2. L. Xu, D. Marinova, and X. Guo, “Resilience thinking: A renewed system approach for
sustainability science”, Sustainability Science, vol. 10, no. 1, pp. 123–138, 2015.
3. D. Woods, “Four concepts for resilience and the implications for the future of resilience
engineering”, Resilience Engineering and System Safety, vol. 141, pp. 5–9, 2015.
4. D. Helbing, “Globally networked risks and how to respond”, Nature, vol. 497, no. 7447,
pp. 51–59, 2013.
5. L. Howell, “Global Risks”, Eighth Edition, Switzerland: World Economic Forum, 2013.
6. L. Mili, “Taxonomy of the characteristics of power system operating states”, In 2nd
NSF-VT Resilient Ans Sustainable Critical Infrastructures (RESIN) Workshop, Tucson,
AZ, pp. 13–15, 2011.
Resilience in Power Transmission Network 167
29. M. Molloy and B. Reed, “A critical point for random graphs with a given degree
sequence”, Random Structures and Algorithms, vol. 6, no. 2–3, pp. 161–180, 1995.
30. R. Cohen, K. Erez, D. Ben-Avraham, and S. Havlin, “Resilience of the Internet to ran-
dom breakdowns”, Physical Review Letters, vol. 85, no. 221, p. 4626, 2000.
31. R.V. Sole, M. Rosas-Calas, B. Corominas-Murtra, and S. Valverde, “Robustness
of the European power grids under intentional attack”, Physical Review E, vol. 77,
pp. 026102–26109, 2008.
32. J.H. Grisi-Filho, R. Ossada, F. Ferreira, and M. Amaku, “Scale-free networks with
the same degree distribution: Different structural properties”, Physics Research
International, vol. 2013, pp. 2090–2220, 2013.
33. C. Wang, S. Ruj, M. Stojmenovic, and A. Nayak, “Modelling cascading failures in
smart grid using interdependent complex networks and percolation theory”, IEEE
8th Conference on Industrial Electronics and Applications (ICIEA), pp. 1023–1028,
Melbourne, 2013.
34. P. Crucitti, V. Latora, and M. Marchiori, “Model for cascading failures in complex net-
works”, Physical Review E, vol. 69, p. 045104, 2004.
35. R. Pastor- Satorras and A. Vespignani, “Evolution and Structure of the Internet: A
Statistical Physics Approach”, Cambridge: Cambridge University Press, 2007.
36. Y. Zhang and L. Guo, “Network percolation based on complex network”, Journal of
Networks, vol. 8, no. 8, pp. 1874–1881, 2003.
37. S. Chanda and A.K. Srivastava, “Quantifying resiliency of smart power distribution
systems with distributed energy resources”, 2015 IEEE 24th International Symposium
on Industrial Electronics (ISIE), Rio de Janeiro, Brazil, 2015.
38. K. Chakrabarti, “Investigation on voltage security of power transmission systems using
soft computing techniques”, PhD Thesis, BESU Shibpur, 2012.
8 Effect of Distributed
Energy Sources
8.1 INTRODUCTION
Distributed renewable energy sources (like wind turbine, photovoltaic, fuel cell, bio-
mass, smart house, etc.) and energy storage devices (like battery, electric double layer
capacitor, superconducting magnetic energy storage, etc.) are the future of energy
demand [1]. Distributed generation (DG) located close to the load, that is, on the
distribution network or on the customer side of the metre, have great potential to
improve distribution system performance and should be encouraged.
DG [2] refers to small electric power generators, typically ranging in capacity
from 1W to 300 MW, which can be located on the utility system, at the customer site
or at a location not connected to the grid. DG can be conventional, such as combined
cycle turbines, small diesel generators, combustion turbines or wind turbines, solar
generation and other renewable energies, which will be discussed in detail in this
chapter.
Rating of DGs: The maximum rating of the DG which can be connected to a
distributed generation depends on the capacity of the distribution system that is inter-
related with the voltage level of the distribution system. Hence, the capacity of DGs
can vary widely. There are four different categories of DGs [1]:
Because of the various types of DGs, the generation electric current can be either
direct current (DC) or alternating current (AC). Photovoltaic, fuel cell and batteries
generate DC which is appropriate for DC loads and DC SG (Smart Grid). On the
other hand, the DC can be converted to the AC using power electronics interface,
which can be connected to the AC loads and power grid. Other DGs such as wind
turbine, micro turbine and biomass deliver an AC, which for some applications must
be controlled using modern power electronic equipment to acquire the regulated
voltage [1].
169
170 Power Transmission System Analysis Against Faults and Attacks
it falls on PV cell it can liberate electrons. The energy of photons liberates electrons
from the valence band to the conduction band. and creates electron hole pair. One
photon is responsible for one electron-hole pair. The energy of photon depends on the
wavelength of the light.
hc
E=
˜
where h = Planck’s constant, c = speed of light and λ = wavelength.
The energy of photon must be equal to the energy gap of that material.
The effectiveness of PV conversion depends upon many factors:
In general, silicon (energy gap is 1.107 eV) is used as the material of PV cell but gal-
lium arsenide (GdAs), indium phosphide (InP), cadmium telluride (CdTe), etc. can
also be used.
A solar cell has limited open circuit voltage and current delivering capability.
To increase its power rating, they are connected in suitable series-parallel com-
bination in an enclosed chamber, known as a solar module or solar panel. In a
similar manner, solar modules are connected on load-specifc application-based
series-parallel combination to form a solar array. A solar panel is rated by its DC
output power at a certain voltage at SOCT(standard operating cell temperature).
At a higher temperature, the effciency of solar cell decreases; hence, it is recom-
mended to provide better ventilation in any solar module. During the formation of
a solar array, a designer should care about mismatch loss due to interconnection of
panels having different properties. It is an undesired phenomenon as it can create
a localised circulating power fow reducing the desired output of a solar cell to a
considerable extent.
Another problem regarding PV operation is shading. When one solar cell is cov-
ered or shaded by any means such as a leaf or a shadow, the covered portion heats
up to such an extent that the cell or module concerned may get damaged. This defect
is called a hot spot. A shaded cell does not produce electricity but consumes current
from the sound ones. Hence, the current from the string is converted into heat. To
protect a module from hot spot, bypass diodes are used. Their function is to pro-
vide an alternating path to the current concerned in shaded cell condition. To avoid
most of the unwanted situation and to maximise solar insolation, solar PV-based
systems are always installed in a place where the chances of shadow are a minimum.
Even in array, the distance between the rows of solar modules are chosen such that
the shadow of one module do not fall to any module on the next row. In Northern
Hemisphere, it is recommended that any solar installation should face south at an
elevation angle equal to the latitude of the concerned place.
For a reliable power supply through solar PV method, the following components
are used. However, depending on specifc application other components like inverter
might be used.
Effect of Distributed Energy Sources 171
i. PV module
PV module consists of solar cells arranged in a suitable fashion to suit for
the voltage or current demand. Several modules are connected in appropri-
ate series-parallel combination to increase the power range.
ii. Storage element (Battery):
In general, an off-grid system requires a storage system for utilising sun’s
energy in absence of sun light during the night. A battery is a good storage
choice in such a case. The capacity of the battery depends upon the esti-
mated load. The problem regarding battery storage system is that the life
period of a battery is much less than a solar module, so proper designing
involves choosing the proper capacity of battery from an economical view-
point. During operation, it has to be kept in mind that the battery should not
reach its threshold discharge level, otherwise its lifetime will be shortened.
For high-rating applications, several batteries are used in suitable series-
parallel connection known as battery bank.
When a battery is a part of balance of system for PV-based supply is
delivering current, it is not allowed to discharge to its full capacity. If this
should be the case (i.e. battery is allowed to discharge fully), then its life-
time will be much shortened, and due to the high cost of battery, it becomes
an uneconomical approach. To counter this problem, battery is allowed to
discharge to a certain level (say 40%) depending on the type and manu-
facturer of the battery. This is known as Depth of Discharge (DOD). To
maintain the DOD to the proper value, a charge monitoring unit, known as
charge controller is used.
iii. Charge controller:
Basically, charge controller is a protective measure taken to protect the
battery. The functioning of a charge controller is to protect the battery from
undercharge or overcharge protection. In either of the two cases, this pro-
tecting device cut outs the load relieving the battery. Charge controllers
might not be used in small-scale applications.
iv. Inverter:
The output of a solar photovoltaic system is always DC; however, most of
the electrical systems encountered today is AC in nature. To encounter this
problem an inverter is used at the end terminals of a PV system. In absence
of an inverter such as for lighting or to run a fan separate line is laid out with
different types of light or DC fan. Moreover, for a grid connected system,
an inverter is essential.
Responsibility of a designer is not only limited for proper load matching and estimat-
ing the capacity or rating of different components. The designer should equally focus
on the economics of the designed system. The target is to achieve a cost-beneft sys-
tem. To avoid any tussle between these two contradictory requirements, the designer
should choose an optimal design approach.
The cost of a PV system generally involves cost of it components such as
PV array and its size, battery bank size and other component costs, which are
application-specifc.
172 Power Transmission System Analysis Against Faults and Attacks
causing land and sea breezes. Due to the shape of the earth, Equator receives the
maximum heat causing winds to blow from subtropical belts towards the Equator. In
addition, the axial rotation of the earth induces a centrifugal force which has a thrust
on equatorial air masses to the upper atmosphere causing defection of the winds.
The concept of harnessing wind energy dates back to Egyptian civilisation where
they used wind power to sail their boats in the Nile River [3].Skilful technicians
from the Middle East introduced windmills to China. The technology to harness
wind energy reached Western Europe by the Arabs. Years have passed since then and
wind power has emerged as one of the most used renewable energy across the world.
After sudden price rise in fossil fuels, a number of countries were stimulated towards
generation of power using wind energy.
Wind turbines extract energy from wind stream by converting kinetic energy of
the wind to rotational motion required to operate an electric generator. By virtue
of kinetic energy, the velocity of the fowing wind decreases. It is assumed that air
masses which passes through rotor is only affected and remains separate from the
air which does not pass through the rotor. As the free wind (stream) interacts with
the turbine rotor, the wind transfers part of its energy into the rotor and the speed
of the wind decreases to a minimum leaving a trail of disturbed wind (also called
wake). The variation in velocity is considered to be smooth from far upstream to far
downstream. The wind leaving the rotor is below the atmospheric pressure (in wake
region) but at far downstream it regains its value to reach the atmospheric level. The
rise in static pressure is at the cost of kinetic energy, consequently, further decreas-
ing wind speed. Because wind fow is considered incompressible, air stream fow
diverges as it passes through the turbine. Also, the mass fow rate of wind assumed
constant at far upstream, at the rotor and at far downstream.
Basically, a wind turbine operates by slowing down the wind and extracting a part
of its energy in the process. In general, wind turbines have blades, sails or buckets
fxed to a central shaft. The extracted energy causes the shaft to rotate. This rotat-
ing shaft is used to drive a pump, to grind sees or to generate electric power. Power
extraction by wind turbine depends on variation of wind turbine power with rotor
diameter and wind speed. Mean wind speed, energy estimation and power density
duration curve also play equally important roles.
Wind turbines are classifed as horizontal-axis turbines or vertical-axis turbines
depending upon the orientation of the axis of rotation of their rotors. Wind turbines
are further classifed into “Lift” and “Drag” type.
Although wind energy is the frst among renewable energy to become an econom-
ically viable source, it is highly unpredictable depending on season, elevation of the
land and wind characteristics like frequency of distribution of wind speed. Hence,
assessment of wind energy potential has to be evaluated by recording meteorological
parameters such as wind direction, wind speed temperature and rainfall on hourly
basis. This data is collected from surveys and historical data are used for forecasting.
For correct forecasting, the wind energy at a particular site is decided by the wind
profle or regime (wind speed frequency distribution) of the site that can be math-
ematically described by Weibull Probability Distribution Function.
Many wind energy generators (WEGs) are commercially available in the capac-
ity of 1 kW to 3 MW. It is necessary to select the best-suited WEG for a particular
174 Power Transmission System Analysis Against Faults and Attacks
a. Dam
b. Sluice gates from the basins to the sea
c. Power house
A dam is an artifcial barrier between the seawater and the site of interest or basin.
The primary function of a dam in tidal power plant is to absorb shock and pressure of
wave. The dam provides proper channelling for turbine operation. Tidal barrages are
constructed at suitable places where the head of water are satisfactory which is ~3 m.
Choice of proper site for constructing a dam is a very diffcult task because the energy
available is related to the size of the basin (the area from dam to plant, precisely to
turbine) and to the square of tidal range.
From the above discussion, it is clear that a dam should be built near to the estu-
ary or bay. But the problem will be that with larger size of basin, the effective tidal
176 Power Transmission System Analysis Against Faults and Attacks
range gets reduced. So, a balance must be maintained between these two contradic-
tory criteria. Gates are used in tidal plant to fll and empty the basin as and when
required. Due to the interaction with seawater, gates are prone to corrosion. This can
be tackled by cathodic protection while constructing the gate. Power house is housed
with the turbines, generators and other auxiliary instruments. Because of the small
head, turbines of large sizes are required in this type of plants. Alternator is directly
coupled to turbines. Generally, turbines used in hydro turbines with low head opera-
tion may be used in such a plant with proper modifcations wherever necessary.
into the heat exchanger again. The viability S of extracting energy from a dry feld
depends upon the degree to which the resource feld can be fractured to develop man-
made geothermal reservoirs.
energy sources introduce erratic power inputs into the grid, thereby causing it to fail
with a sharp transition [10].
The interconnection of several DGs in the transmission system causes a
structural change in the grid, and, therefore, the properties of the system would
change. Indices, such as characteristic path length, degree and degree distribu-
tion, clustering coeffcient, and betweenness, decide how the interconnection of
DGs aspects topological characteristics of the grid. They have also used weighted
graph indices and have suggested new indices based on structure and operational
conditions of the grid for the evaluation of structural properties of the grid with
incorporated DGs.
DG affects the operation of the distribution networks, including power fows and
voltages [1]. DG also has an effect on system losses. In many cases, the effect of DG
on losses is positive as DG is often located close to the demands where the energy
is consumed. This reduces the distance over which energy needs to be transported,
therefore reducing losses.
DG can also impact the reliability and quality of the power supply in the electri-
cal system. Previous studies have demonstrated some positive effects of DG on reli-
ability, where DG can reduce the loading on the network at critical times, or supply
part of the demand in the network during faults and shortages. However, DG can
also have a negative impact on reliability, particularly in cases where it has caused
problems for the coordination of the network protection systems [10].
180 Power Transmission System Analysis Against Faults and Attacks
criticality and ensures lesser vulnerability of most critical bus following unplanned
outage or attack on the power network.
Figure 8.3 exhibits the decrement in magnitude of electrical betweenness of four
successive load buses (which have high level of betweenness) following incorpora-
tion of DG at most critical load bus (i.e. bus 11 which has the highest magnitude of
betweenness).
Load fow study was carried out after incorporation of DG to evaluate the losses.
DG incorporation resulted in improved effciency along with reduced losses and
raised the voltage profle. It has been observed that the steady state voltage profle
(Figure 8.4) of load buses improve with incorporation of DG while the power loss in
the network reduce from 28.12 to 24.32 MW.
Hence, employment of DG unit not only reduces betweenness (criticality) but
at the same time decreases system vulnerability, improves power transmission and
increases voltage profle making the grid more effcient. The role of DG penetration
in improvement of complex network theory parameters is an important tool which
can be employed to strengthen the infrastructure of power grid.
TABLE 8.1
Vulnerability of Some Nodes of the IEEE 57 Nodes
Systems without DG under Attacks on Nodes
Node e
8(G) 0.3168
12(G) 0.2263
9(G) 0.1983
1(G) 0.1590
11 0.1222
13 0.1090
10 0.0953
43 0.0855
15 0.0830
41 0.0796
TABLE 8.2
Vulnerability of Some Nodes of the IEEE 57 Nodes
Systems with DG under Attacks on Nodes
Node e
8(G) 0.3090
12(G) 0.2165
9(G) 0.1933
1(G) 0.1545
11 0.1166
13 0.1028
10 0.0913
43 0.0831
15 0.0824
41 0.0775
58 (DG) 0.0060
59 (DG) 0.0050
60 (DG) 0.0033
61 0.0006
62 0.0003
of DG, the present simulation includes the effect of DG installed at designated load
buses on the system voltage and line loss parameter. Figure 8.5 exhibits the effect of
DGs on voltage profles of the 57 bus system while Table 8.4 indicates the line losses.
The black and grey lines in the Figure 8.5 represents the voltage profles of buses
prior to and post allocation of DGs to designated load buses. It is observed that this
methodology of GVI is backed up by improvement of voltage profle of the system.
Similarly, the line losses are estimated as shown in the Table 8.4.
Effect of Distributed Energy Sources 185
TABLE 8.3
GVI Values of IEEE 57 Bus System
Condition Value of GVI
Before use of DGs 36.5792
Identifed load buses(58-62) added with DGs 3.9941
FIGURE 8.5 Voltage profle of IEEE 57 bus system with and without DGs.
TABLE 8.4
Total Active and Reactive Losses in the IEEE 57 Bus
System by Addition of DGs into Designated Load Buses
Bus No. Total Loss in MW Total Loss in MVar
2 27.0318 150.2279
5 25.9881 146.2857
6 22.7915 133.4965
9 20.1473 122.2515
10 19.8262 120.8614
13 18.7594 113.6647
14 18.1836 114.4084
15 17.4407 111.2176
16 15.7057 103.9075
17 15.4488 102.8686
18 15.1619 96.8877
(Continued)
186 Power Transmission System Analysis Against Faults and Attacks
The results indicate the gradual declining of line losses with repetitive addition
of distribution generation units to load buses. Reduction in the losses is because
of the proximity of DG to the load. The employment of large-scale DG units not
only decreases the system vulnerability but also achieves better power transmission,
increases voltage profle and makes a grid more effcient. In this method, a small
change in infrastructure can go a long way in strengthening the power grid.
REFERENCES
1. T. Funabashi, “Integration of Distributed Energy Resources in Power Systems”,
Cambridge, MA: Academic Press, 2016.
2. hdl.handle.net.
3. D.P. Kothari, K.C. Singal, and R. Ranjan, “Renewable Energy Sources and Emerging
Technologies”, Second Edition, New Delhi: PHI Learning Private Limited, 2012.
Effect of Distributed Energy Sources 187
4. G.S. Sawhney, “Non Conventional Energy Resources”, New Delhi: PHI Learning
Private Limited, 2012.
5. J.P. Barton and D.G. Infeld, “Energy storage and its use with intermittent renewable
energy,” IEEE Transactions on Energy Conversion, vol. 19, no. 2, pp. 441–448, 2004.
doi: 10.1109/TEC.2003.822305.
6. A.H. Ali, A. Youssef, T. George, and S. Kamel, “Optimal DG allocation in distribu-
tion systems using ant lion optimizer,”2018 International Conference on Innovative
Trends in Computer Engineering (ITCE), Aswan, pp. 324–331, 2018. doi: 10.1109/
ITCE.2018.8316645.
7. K. Mahmoud, N. Yorino, and A. Ahmed, “Optimal distributed generation allocation in
distribution systems for loss minimization,” IEEE Transactions on Power Systems, vol.
31, no. 2, pp. 960–969, 2016. doi: 10.1109/TPWRS.2015.2418333.
8. F.S. Abu-Mouti and M.E. El-Hawary, “Optimal distributed generation alloca-
tion and sizing in distribution systems via Artifcial Bee Colony algorithm,” IEEE
Transactions on Power Delivery, vol. 26, no. 4, pp. 2090–2101, 2011. doi: 10.1109/
TPWRD.2011.2158246.
9. P.J. Varghese, A. Sas, and K. Sunderamoorthy, Optimal siting and sizing of DGs for
congestion relief in transmission lines, 2017 IEEE PES Asia-Pacifc Power and Energy
Engineering Conference (APPEEC), Bangalore, 2017.
10. B. Hayes, “Distributed Generation Systems”, Amsterdam: Elsevier BV, 2017.
11. T. Chowdhury, A. Chakrabarti, and C.K. Chanda, “Analysis of vulnerability indices of
power grid integrated DG units based on Complex Network theory,” Annual IEEE India
Conference (INDICON), New Delhi, pp. 1–5, 2015.doi: 10.1109/INDICON.2015.7443605.
Appendix A
IEEE 57-BUS TEST SYSTEM
(American Electric Power)
189
190 Appendix A
195
Generator Load
196
Voltage Voltage
Bus No. MW MVAr MW MVAr Mag. Angle Bus Code ysnt Qmin Qmax
Busdata=[ 1 4 0 0 0 1.05 0 0 0 −1 2; %FKK21
2 1.8 0 0 0 1.04 0 2 0 −0.5 1; %KT115.75
3 1.8 0 0 0 1.04 0 2 0 −0.5 1; %KT215.75
4 1.9 0 0 0 1.04 0 2 0 −0.5 1; %BKR15.75
5 1.8 0 0 0 1.05 0 2 0 −0.5 1; %FKK15.75
6 1.9 0 0 0 1.0433 0 2 0 −0.5 1; %BAKR15.7
7 0.6 0 0 0 1.02 0 2 0 −0.3 0.6; %STP13.8
8 0.9 0 0 0 1 0 2 0 −0.22 0.45; %DPL13.8
9 0.115 0 0 0 1.02 0 2 0 −0.03 0.06;%RMM211
10 1.8 0 0 0 1 0 2 0 −0.5 1; %BTP11
11 0.5 0 0 0 1 0 2 0 −0.2 0.4; %BTPS11
12 0.6 0 0 0 1 0 2 0 −0.15 0.3; %DPL11
13 0.675 0 0 0 1.01 0 2 0 −0.2 0.4; %CHU11
14 0.181 0 0 0 1.02 0 2 0 −0.02 0.04; %JAL111
15 0.136 0 0 0 1.02 0 2 0 −0.009 0.018; %JAL211
16 0.18 0 0 0 1.02 0 2 0 −0.045 0.09; %RANGIT11
17 1.5 0 0 0 1.04 0 2 0 −0.45 0.9; %MEJIA11
18 0.5 0 0 0 1.03 0 2 0 −0.3 0.6; %WARIA11
19 1.5 0 0 0 1.03 0 2 0 −0.5 1; %WARIA211
20 1.5 0 0 0 1.04 0 2 0 −0.4 0.8; %TALA11
21 0.068 0 0 0 1.02 0 2 0 −0.019 0.038; %TCF16.6
22 0.075 0 0 0 1.02 0 2 0 −0.019 0.038; %TCF26.6
23 0.075 0 0 0 1.02 0 2 0 −0.019 0.038; %TCF36.6
Appendix B
(Continued)
Generator Load
Voltage Voltage
Bus No. MW MVAr MW MVAr Mag. Angle Bus Code ysnt Qmin Qmax
24 0.2 0 0 0 1 0 2 0 −0.05 0.1; %DPL6.3
Appendix B
25 0 0 0 0 1 0 1 0 0 0; %PSP16.5
26 0 0 1.2 1 1 0 1 0 0 0; %JRT132
27 0 0 0.68 0.921 1 0 1 0 0 0; %ARAM132
28 0 0 0 0 1 0 1 0 0 0; %KTPS132
29 0 0 0 0 1 0 1 0 0 0; %MALPG132
30 0 0 0 0 1 0 1 0 0 0; %DRG132
31 0 0 0.55 0.34 1 0 1 0 0 0; %DOMJ132
32 0 0 0.51 0.316 1 0 1 0.067 0 0; %GOK132
33 0 0 0.5 1.32 1 0 1 0.067 0 0; %HOW132
34 0 0 0.6 1.363 1 0 1 0 0 0; %KASBA132
35 0 0 0.51 0.316 1 0 1 0 0 0; %LXP132
36 0 0 0 0 1 0 1 0 0 0; %MIDNA132
37 0 0 0.35 0.217 1 0 1 0 0 0; %NJP132
38 0 0 0.2 0.124 1 0 1 0 0 0; %NHAL132
39 0 0 0 0 1 0 1 0 0 0; %RISH132
40 0 0 0.45 0.527 1 0 1 0.067 0 0; %SATG132
41 0 0 1 1.239 1 0 1 0 0 0; %DPL132
42 0 0 0 0 1 0 1 0 0 0; %BRPPG132
43 0 0 0 0 1 0 1 0 0 0; %SLGPG132
44 0 0 0.72 0.446 1 0 1 0.033 0 0; %ADI132
45 0 0 0.15 0.193 1 0 1 0 0 0; %ALIP132
(Continued)
197
Generator Load
198
Voltage Voltage
Bus No. MW MVAr MW MVAr Mag. Angle Bus Code ysnt Qmin Qmax
46 0 0 0.41 0.178 1 0 1 0 0 0; %ASOK132
47 0 0 0.32 0.198 1 0 1 0 0 0; %BALU132
48 0 0 0.58 0.259 1 0 1 0.033 0 0; %BNK132
49 0 0 0.37 0.477 1 0 1 0.033 0 0; %BARAS132
50 0 0 0.35 0.2169 1 0 1 0 0 0; %BASIR132
51 0 0 0.4 0.2558 1 0 1 0.0333 0 0; %JOKA132
52 0 0 0.46 0.533 1 0 1 0.0333 0 0; %BERH132
53 0 0 0.35 0.2169 1 0 1 0 0 0; %BRP132
54 0 0 0.4 0.2958 1 0 1 0 0 0; %VISH132
55 0 0 0 0 1 0 1 0 0 0; %BOLP132
56 0 0 0.33 0.2045 1 0 1 0 0 0; %BONG132
57 0 0 0.4 0.2479 1 0 1 0 0 0; %CLC132
58 0 0 0.53 0.3285 1 0 1 0.333 0 0; %CHK132
59 0 0 0.14 0.0868 1 0 1 0 0 0; %DALK132
60 0 0 0.24 0.1487 1 0 1 0 0 0; %DARJ132
61 0 0 0.31 0.1921 1 0 1 0.167 0 0; %DEBO132
62 0 0 0.57 0.3533 1 0 1 0.15 0 0; %DHRAM132
63 0 0 0.25 0.1549 1 0 1 0 0 0; %DHUL132
64 0 0 0 0 1 0 1 0 0 0; %EGRA132
65 0 0 0.43 0.2665 1 0 1 0.1667 0 0; %FALTA132
66 0 0 0.39 0.2417 1 0 1 0 0 0; %HALD132
67 0 0 0.49 0.4276 1 0 1 0 0 0; %HIZLI132
(Continued)
Appendix B
Generator Load
Voltage Voltage
Bus No. MW MVAr MW MVAr Mag. Angle Bus Code ysnt Qmin Qmax
68 0 0 0.66 0.409 1 0 1 0.1333 0 0; %KLY132
Appendix B
Voltage Voltage
Bus No. MW MVAr MW MVAr Mag. Angle Bus Code ysnt Qmin Qmax
90 0 0 0.29 0.1797 1 0 1 0 0 0; %TAML132
91 0 0 0.54 0.3347 1 0 1 0 0 0; %TARAK132
92 0 0 0 0 1 0 1 0 0 0; %TITA132
93 0 0 0.5 0.3099 1 0 1 0 0 0; %UKHRA132
94 0 0 0.57 0.3533 1 0 1 0 0 0; %ULU132
95 0 0 0 0 1 0 1 0 0 0; %STPS132
96 0 0 0 0 1 0 1 0 0 0; %BTPS132
97 0 0 0.19 0.1178 1 0 1 0 0 0; %BALIC132
98 0 0 0 0 1 0 1 0 0 0; %TCFI132
99 0 0 0 0 1 0 1 0 0 0; %TCFII132
100 0 0 0 0 1 0 1 0 0 0; %TCF3132
101 0 0 0 0 1 0 1 0 0 0; %RMM2132
102 0 0 0.13 0.0806 1 0 1 0 0 0; %HM132
103 0 0 0.05 0.031 1 0 1 0 0 0; %DANK132
104 0 0 0 0 1 0 1 0 0 0; %RANGT132
105 0 0 0.1 0.062 1 0 1 0 0 0; %HPCL132
106 0 0 0.006 0.0037 1 0 1 0 0 0; %FCI132
107 0 0 0.23 0.1425 1 0 1 0 0 0; %JANGI132
108 0 0 0.31 0.1921 1 0 1 0 0 0; %CTOLA132
109 0 0 0.12 0.0744 1 0 1 0.3096 0 0; %GRAM132
110 0 0 0.35 0.2169 1 0 1 0 0 0; %GTOK132
111 0 0 0.28 0.1735 1 0 1 0 0 0; %MELLI132
(Continued)
Appendix B
Generator Load
Voltage Voltage
Bus No. MW MVAr MW MVAr Mag. Angle Bus Code ysnt Qmin Qmax
112 0 0 1 1.2395 1 0 1 0 0 0; %WARIA132
Appendix B
Voltage Voltage
Bus No. MW MVAr MW MVAr Mag. Angle Bus Code ysnt Qmin Qmax
134 0 0 0 0 1 0 1 0 0 0; %WARIA220
135 0 0 0 0 1 0 1 0 0 0; %CHUK220
136 0 0 0.3 0.1859 1 0 1 0 0 0 0; %BRPPG220
137 0 0 0 0 1 0 1 0 0 0; %SLGPG220
138 0 0 0.5 0.5099 1 0 1 0 0 0 0; %DALPG220
139 0 0 0 0 1 0 1 0 0 0; %PURN220
140 0 0 0.5 0.6197 1 0 1 0 0 0 0; %STPS220
141 0 0 1 2.479 1 0 1 0 0 0; %MEJIA220
142 0 0 0.45 0.4789 1 0 1 0 0 0 0; %FKK220
143 0 0 0 0 1 0 1 0 0 0; %SGPG220
144 0 0 0 0 1 0 1 0 0 0; %KRIS220
145 0 0 1 0.35 1 0 1 −0.5333 0 0; %JRT400 load
added
146 0 0 1 1 1 0 1 −0.5667 0 0; %ARAM400load
added
147 0 0 0 0 1 0 1 −0.5867 0 0; %KTPS400
148 0 0 0 0 1 0 1 −0.5 0 0; %BAKR400
149 0 0 2 3.479 1 0 1 −0.5333 0 0; %FKK400
150 0 0 3.5 3.8592 1 0 1 −0.5 0 0; %PARU400
151 0 0 0 0 1 0 1 −0.42 0 0; %MALPG400
152 0 0 0 0 1 0 1 −0.41 0 0; %BGURI400
153 0 0 0.5 0.6197 1 0 1 −0.525 0 0; %BARIP400
154 0 0 0.75 1.8592 1 0 1 −0.5867 0 0; %PURN400
(Continued)
Appendix B
Generator Load
Voltage Voltage
Bus No. MW MVAr MW MVAr Mag. Angle Bus Code ysnt Qmin Qmax
155 0 0 0 0 1 0 1 −0.5366 0 0; %SGPG400
Appendix B
Voltage Voltage
Bus No. MW MVAr MW MVAr Mag. Angle Bus Code ysnt Qmin Qmax
176 0 0 0.1 0.21 1 0 1 0 0 0; %KTPS133
177 0 0 0.1 0.45 1 0 1 0 0 0; %MLDPG133
178 0 0 0.1 0.21 1 0 1 0 0 0; %DRG33
179 0 0 0.1 0.21 1 0 1 0 0 0; %DOMJ33
180 0 0 0.1 0.21 1 0 1 0 0 0; %GOK33
181 0 0 0.1 0.21 1 0 1 0 0 0; %HOW33
182 0 0 0.1 0.21 1 0 1 0 0 0; %KASBA33
183 0 0 0.1 0.21 1 0 1 0 0 0; %LXP33
184 0 0 0.1 0.21 1 0 1 0 0 0; %MIDNA33
185 0 0 0.1 0.51 1 0 1 0 0 0; %NJP33
186 0 0 0.1 0.21 1 0 1 0 0 0; %NHAL33
187 0 0 0.1 0.21 1 0 1 0 0 0; %RISH33
188 0 0 0.1 0.1 1 0 1 0 0 0; %SATG33
189 0 0 0.1 0.1 1 0 1 0 0 0; %DPL33
190 0 0 0.1 0.4 1 0 1 0 0 0; %BRPPG33
191 0 0 0.1 0.4 1 0 1 0 0 0; %SLGPG33
192 0 0 0.1 0.1 1 0 1 0 0 0; %STPS33
193 0 0 0.1 0.1 1 0 1 0 0 0; %WARIA33
194 0 0 0.37 0.2176 1 0 1 0.38 0 0; %RISHRA33
195 0 0 0.36 0.018 1 0 1 0.5233 0 0; %BISHNU33
196 0 0 0.17 0.1413 1 0 1 0.5233 0 0; %EGRA33
197 0 0 0.41 0.2161 1 0 1 0.03 0 0; %NBU33
(Continued)
Appendix B
Appendix B
Generator Load
Voltage Voltage
Bus No. MW MVAr MW MVAr Mag. Angle Bus Code ysnt Qmin Qmax
198 0 0 0.21 0.12 1 0 1 0.5367 0 0; %SLAKE33
199 0 0 0.23 0.1599 1 0 1 0.372 0 0; %BOLPUR33
200 0 0 0.25 0.30 1 0 1 0.5883 0 0; %TITAG33
201 0 0 0.32 0.2 1 0 1 0.5833 0 0; %MIDNAP33
202 0 0 0.1 0.25 1 0 1 0.15 0 0; %SGPG33
203 0 0 0 0 1 0 1 0 0 0;] %KRIS33
Bus tap
No. fb eb r x hlch Tap posl lmt
Linedata=[ 52 44 96 0.0036 0.0071 0.0108 1.0 0 10; %ADI132-BTPS132
53 44 91 0.0095 0.0189 0.0287 1.0 0 10; %ADI132-
TARAK132
54 45 53 0.0385 0.077 0.0292 1.0 0 10; %ALIP132-BRP132
55 27 82 0.0116 0.0232 0.0352 1.0 0 10; %ARAM132-
RAINA132
56 27 91 0.0071 0.0143 0.0217 1.0 0 10; %ARAM132-
TARAK132
57 46 57 0.031 0.0621 0.0235 1.0 0 10; %ASOK132-CLC132
58 46 26 0.0053 0.0107 0.0162 1.0 0 10; %ASOK132-JRT132
59 36 97 0.0178 0.0357 0.0135 1.0 0 10; %MIDNA132-
BALIC132
60 78 97 0.0185 0.0371 0.0141 1.0 0 10; %PING132-
BALIC132
61 47 109 0.0407 0.0813 0.0309 1.0 0 0 10; %BALU132-
GRAM132
62 48 54 0.0134 0.0268 0.0407 1.0 0 10; %BNK132-VISH132
63 49 50 0.0125 0.025 0.0379 1.0 0 10; %BARAS132-
BASIR132
64 49 26 0.0078 0.0157 0.0238 1.0 0 10; %BARAS132-
JRT132
65 52 32 0.0064 0.0128 0.0195 1.0 0 10; %BERH132-GOK132
66 53 42 0.0006 0.0011 0.0004 1.0 0 10; %BRP132-
BRPPG132
67 53 76 0.0132 0.0264 0.0401 1.0 0 10; %BRP132-
MOINA132
68 55 30 0.0481 0.0961 0.0365 1.0 0 10; %BOLP132-DRG132
69 55 85 0.026 0.0519 0.0197 1.0 0 10; %BOLP132-SAIN132
70 56 72 0.0189 0.0377 0.0573 1.0 0 10; %BONG132-
KRISH132
71 96 62 0.0073 0.0146 0.0222 1.0 0 10; %BTPS132-
DHRAM132
72 96 62 0.0188 0.0377 0.0143 1.0 0 10; %BTPS132-
DHRAM132
73 96 70 0.0285 0.0571 0.0217 1.0 0 10; %BTPS132-
KHAN132
74 96 68 0.0107 0.0214 0.0081 1.0 0 10; %BTPS132-KLY132
75 96 73 0.0328 0.0656 0.0249 1.0 0 10; %BTPS132-LILO132
76 96 39 0.0111 0.0221 0.0336 1.0 0 10; %BTPS132-RISH132
77 96 40 0.0378 0.0756 0.0287 1.0 0 10; %BTPS132-SATG132
78 96 108 0.0189 0.0378 0.0143 1.0 0 0 10; %BTPS132-
CTOLA132
79 58 36 0.0357 0.0713 0.0271 1.0 0 10; %CHK132-
MIDNA132
(Continued)
Appendix B 207
Bus tap
No. fb eb r x hlch Tap posl lmt
80 58 54 0.0321 0.0642 0.0244 1.0 0 10; %CHK132-VISH132
81 59 81 0.0182 0.0364 0.0552 1.0 0 10; %DALK132-
RAIG132
82 59 100 0.0388 0.0776 0.1178 1.0 0 0 10; %DALK132-
TCF3132
83 60 77 0.0467 0.0934 0.0355 1.0 0 10; %DARJ132-NBU132
84 60 101 0.0146 0.0292 0.0111 1.0 0 0 10; %DARJ132-
RMM2132
85 61 69 0.009 0.018 0.0274 1.0 0 10; %DEBO132-
KATWA132
86 62 26 0.005 0.01 0.0152 1.0 0 10; %DHRAM132-
JRT132
87 62 68 0.0093 0.0185 0.007 1.0 0 10; %DHRAM132-
KLY132
88 62 84 0.0132 0.0264 0.0401 1.0 0 10; %DHRAM132-
RANA132
89 62 92 0.0103 0.0207 0.0314 1.0 0 10; %DHRAM132-
TITA132
90 63 74 0.0541 0.1081 0.041 1.0 0 10; %DHUL132-
MALDA132
91 63 32 0.0499 0.0999 0.0379 1.0 0 10; %DHUL132-
GOK132
92 31 94 0.0096 0.0193 0.0292 1.0 0 10; %DOMJ132-ULU132
93 30 41 0.0036 0.0071 0.0108 1.0 0 10; %DRG132-DPL132
94 30 75 0.0139 0.0278 0.0422 1.0 0 10; %DRG132-
MANK132
95 30 85 0.0421 0.0842 0.0319 1.0 0 10; %DRG132-SAIN132
96 30 93 0.0065 0.013 0.0197 1.0 0 10; %DRG132-
UKHRA132
97 30 54 0.0185 0.0371 0.0563 1.0 0 10; %DRG132-VISH132
98 64 67 0.0435 0.087 0.033 1.0 0 10; %EGRA132-
HIZLI132
99 65 51 0.0206 0.0412 0.0156 1.0 0 10; %FALTA132-
JOKA132
100 65 35 0.0121 0.0243 0.0368 1.0 0 10; %FALTA132-LXP132
101 51 89 0.0128 0.0257 0.0097 1.0 0 10; %JOKA132-
SONA132
102 32 69 0.0203 0.0407 0.0617 1.0 0 10; %GOK132-
KATWA132
103 32 80 0.0378 0.0756 0.0287 1.0 0 10; %GOK132-RGJ132
104 32 83 0.0414 0.0827 0.0314 1.0 0 10; %GOK132-
RAMP132
105 32 85 0.0385 0.077 0.0292 1.0 0 10; %GOK132-SAIN132
106 66 90 0.0143 0.0285 0.0433 1.0 0 10; %HALD132-
TAML132
(Continued)
208 Appendix B
Bus tap
No. fb eb r x hlch Tap posl lmt
107 102 103 0.0043 0.0086 0.0032 1.0 0 10; %HM132-DANK132
108 103 73 0.0043 0.0086 0.0032 1.0 0 10; %DANK132-
LILO132
109 102 39 0.0078 0.0157 0.006 1.0 0 10; %HM132-RISH132
110 67 36 0.0053 0.0107 0.0162 1.0 0 10; %HIZLI132-
MIDNA132
111 33 73 0.0043 0.0086 0.013 1.0 0 10; %HOW132-LILO132
112 33 73 0.0046 0.0093 0.0141 1.0 0 10; %HOW132-LILO132
113 26 56 0.0126 0.0251 0.0381 1.0 0 10; %JRT132-BONG132
114 51 34 0.0208 0.0417 0.0158 1.0 0 10; %JOKA132-
KASBA132
115 51 35 0.0272 0.0545 0.0207 1.0 0 10; %JOKA132-LXP132
116 34 86 0.009 0.0179 0.0272 1.0 0 10; %KASBA132-SL132
117 34 89 0.0087 0.0174 0.0066 1.0 0 10; %KASBA132-
SONA132
118 69 40 0.0155 0.031 0.0471 1.0 0 10; %KATWA132-
SATG132
119 70 40 0.01 0.02 0.0076 1.0 0 10; %KHAN132-
SATG132
120 28 71 0.0012 0.0025 0.0038 1.0 0 10; %KTPS132-
KOLAG132
121 28 90 0.0089 0.0178 0.0271 1.0 0 10; %KTPS132-
TAML132
122 28 94 0.0104 0.0208 0.0315 1.0 0 10; %KTPS132-ULU132
123 73 39 0.0136 0.0271 0.0103 1.0 0 10; %LILO132-RISH132
124 73 39 0.0136 0.0271 0.0103 1.0 0 10; %LILO132-RISH132
125 74 29 0.0021 0.0041 0.0063 1.0 0 10; %MALDA132-
MALPG132
126 74 81 0.0556 0.1113 0.0422 1.0 0 10; %MALDA132-
1RAIG132
127 74 87 0.0349 0.0699 0.0265 1.0 0 10; %MALDA132-
SAMSI132
128 36 78 0.0285 0.0571 0.0217 1.0 0 10; %MIDNA132-
PING132
129 36 54 0.0678 0.1355 0.0514 1.0 0 10; %MIDNA132-
VISH132
130 37 76 0.02 0.0399 0.0606 1.0 0 10; %NJP132-
MOINA132
131 77 101 0.0492 0.0984 0.0374 1.0 0 10; %NBU132-
RMM2132
132 77 43 0.0071 0.0143 0.0054 1.0 0 10; %NBU132-
SLGPG132
133 77 98 0.0142 0.0284 0.0108 1.0 0 10; %NBU132-TCFI132
134 37 98 0.0143 0.0285 0.0108 1.0 0 10; %NJP132-TCFI132
(Continued)
Appendix B 209
Bus tap
No. fb eb r x hlch Tap posl lmt
135 37 88 0.0046 0.0093 0.0141 1.0 0 10; %NJP132-SLG132
136 95 79 0.0125 0.025 0.0379 1.0 0 10; %STPS132-
PURU132
137 87 81 0.0506 0.1013 0.0384 1.0 0 10; %SAMSI132-
RAIG132
138 85 83 0.0314 0.0628 0.0238 1.0 0 10; %SAIN132-
RAMP132
139 40 75 0.0257 0.0514 0.078 1.0 0 10; %SATG132-
MANK132
140 98 99 0.0056 0.0113 0.0043 1.0 0 10; %TCFI132-TCFII132
141 98 100 0.0178 0.0357 0.0135 1.0 0 10; %TCFI132-TCF3132
142 99 100 0.0121 0.0243 0.0092 1.0 0 10; %TCFII132-TCF3132
143 77 37 0.0071 0.0143 0.0054 1.0 0 10; %NBU132-NJP132
144 43 104 0.0317 0.0635 0.0964 1.0 0 10; %SLGPG132-
RANGT132
145 104 101 0.0193 0.0385 0.0146 1.0 0 10; %RANGT132-
RMM2132
146 38 66 0.0014 0.0029 0.0011 1.0 0 10; %NHAL132-
HALD132
147 38 105 0.0007 0.0014 0.0005 1.0 0 10; %NHAL132-
HPCL132
148 66 105 0.0014 0.0029 0.0011 1.0 0 10; %HALD132-
HPCL132
149 39 108 0.0039 0.0078 0.003 1.0 0 10; %RISH132-
CTOLA132
150 31 107 0.0061 0.0121 0.0184 1.0 0 10; %DOMJ132-
JANGI132
151 66 106 0.0018 0.0036 0.0054 1.0 0 10; %HALD132-FCI132
152 81 109 0.0407 0.0813 0.0309 1.0 0 10; %RAIG132-
GRAM132
153 27 113 0.0082 0.0164 0.0249 1.0 0 10; %ARAM132-
BIRSG132
154 104 110 0.0521 0.1041 0.0395 1.0 0 10; %RANGT132-
GTOK132
155 104 111 0.0214 0.0428 0.0162 1.0 0 10; %RANGT132-
MELLI132
156 110 111 0.0428 0.0856 0.0325 1.0 0 10; %GTOK132-
MELLI132
157 111 43 0.0642 0.1284 0.0487 1.0 0 10; %MELLI132-
SLGPG132
158 104 43 0.0663 0.1327 0.0503 1.0 0 10; %RANGT132-
SLGPG132
159 114 45 0.0143 0.0285 0.0108 1.0 0 10; %COOCH132-
ALIP132
(Continued)
210 Appendix B
Bus tap
No. fb eb r x hlch Tap posl lmt
160 114 53 0.0514 0.1027 0.039 1.0 0 10; %COOCH132-
BRP132
22 116 122 0.0166 0.058 0.2425 1.0 0 10; %ARAM220-
DRG220
23 122 119 0.0014 0.0049 0.0207 1.0 0 10; %DRG220-PARU220
24 116 123 0.0037 0.013 0.2169 1.0 0 10; %ARAM220-
DOMJ220
25 116 128 0.0046 0.016 0.2673 1.0 0 10; %ARAM220-
MIDNA220
26 116 131 0.0094 0.0328 0.1372 1.0 0 10; %ARAM220-
RISH220
27 116 140 0.0125 0.0438 0.7335 1.0 0 10; %ARAM220-
STPS220
28 118 122 0.0025 0.0088 0.1477 1.0 0 10; %BAKR220-
2DRG220
29 118 124 0.0053 0.0184 0.3083 1.0 0 10; %BAKR220-
GOK220
30 118 132 0.009 0.0315 0.5263 1.0 0 10; %BAKR220-
SATG220
31 123 125 0.0012 0.0041 0.0684 1.0 0 10; %DOMJ220-
HOW220
32 122 133 0.0006 0.0022 0.0376 1.0 0 10; %DRG220-DPL220
33 122 140 0.0064 0.0225 0.3759 1.0 0 10; %DRG220-STPS220
34 125 117 0.0046 0.016 0.2669 1.0 0 10; %HOW220-KTPS220
35 115 126 0.0038 0.0133 0.2233 1.0 0 10; %JRT220-
KASBA220
36 115 126 0.0076 0.0267 0.1118 1.0 0 10; %JRT220-
KASBA220
37 115 132 0.0051 0.0177 0.297 1.0 0 10; %JRT220-SATG220
38 126 127 0.0082 0.0287 0.1201 1.0 0 10; %KASBA220-
LXP220
39 117 130 0.0036 0.0126 0.2109 1.0 0 10; %KTPS220-
NHAL220
40 119 134 0.001 0.0036 0.0602 1.0 0 10; %PARU220-
WARIA220
41 122 134 0.0011 0.0038 0.0639 1.0 0 10; %DRG220-
WARIA220
42 136 135 0.0055 0.0192 0.7218 1.0 0 10; %BRPPG220-
CHUK220
43 138 120 0.0069 0.0243 0.406 1.0 0 10; %DALPG220-
MALPG220
44 138 137 0.0076 0.0265 0.4436 1.0 0 10; %DALPG220-
SLGPG220
45 121 136 0.0053 0.0186 0.312 1.0 0 10; %BGURI220-
BRPPG220
(Continued)
Appendix B 211
Bus tap
No. fb eb r x hlch Tap posl lmt
46 121 137 0.0001 0.0004 0.0075 1.0 0 10; %BGURI220-
SLGPG220
48 141 134 0.0022 0.0076 0.1278 1.0 0 10; %141MEJIA220-
WARIA220
49 132 144 0.003 0.0106 0.1767 1.0 0 10; %SATG220-KRIS220
50 143 115 0.0091 0.0319 0.1335 1.0 0 10; %SGPG220-JRT220
51 127 143 0.0055 0.0193 0.0808 1.0 0 10; %LXP220-SGPG220
7 146 148 0.004 0.0151 0.9204 1.0 0 10; %ARAM400-
8BAKR400
8 145 148 0.005 0.0189 1.154 1.0 0 10; %JRT400-BAKR400
9 146 147 0.002 0.0075 0.4545 1.0 0 10; %ARAM400-
KTPS400
10 145 147 0.0042 0.0156 0.9516 1.0 0 10; %JRT400-KTPS400
11 147 153 0.0056 0.021 1.2783 1.0 0 10; %KTPS400-
BARIP400
12 145 149 0.0073 0.0273 1.6618 1.0 0 10; %JRT400-FKK400
13 149 150 0.0023 0.0087 2.1163 1.0 0 10; %FKK400-PARU400
14 149 151 0.0006 0.0022 0.5255 1.0 0 10; %FKK400-
MALPG400
15 151 154 0.0026 0.0099 2.4145 1.0 0 10; %MALPG400-
PURN400
16 152 154 0.0025 0.0093 2.2725 1.0 0 10; %BGURI400-
PURN400
17 150 157 0.0061 0.0228 1.3919 1.0 0 10; %PARU400-PPSP2
18 146 157 0.0032 0.0122 2.9685 1.0 0 10; %ARAM400-PPSP2
19 155 149 0.0095 0.0355 2.166 1.0 0 10; %SGPG400-FKK400
20 155 145 0.0022 0.0083 0.5042 1.0 0 10; %SGPG400-JRT400
21 152 156 0.0034 0.0128 3.1247 1.0 0 10; %BGURI400-
TALA400
1 158 159 0.0114 0.0128 0.0009 1.0 0 10; %JALI66-JALII66
2 159 160 0.1027 0.1155 0.0081 1.0 0 10; %JALII66-
CHALSA66
3 160 161 0.1912 0.215 0.0038 1.0 0 10; %CHALSA66-
BANAR66
4 161 162 0.1096 0.1233 0.0022 1.0 0 10; %BANAR66-BRP66
5 160 163 0.131 0.1723 0.0065 1.0 0 10; %CHALSA66-
KPONG66 Zlinechng
6 164 163 0.0571 0.0642 0.0011 1.0 0 10; %MELLI66-
KPONG66
161 145 115 0 0.0132 0 0.95 1 10; %JRT400-JRT220 tap
chngori 1.05
162 146 116 0 0.0132 0 0.95 1 10; %ARAM400-
ARAM220 tap chng
ori 1.05
(Continued)
212 Appendix B
Bus tap
No. fb eb r x hlch Tap posl lmt
163 147 117 0 0.0198 0 1.0 1 10; %KTPS400-KTPS220
164 148 118 0 0.0198 0 1.0 1 10; %BAKR400-
BAKR220
165 150 119 0 0.0198 0 1.05 1 10; %PARU400-
PARU220 tap chng
ori 1.05
166 151 120 0 0.0198 0 1.0 1 10; %MALPG400-
MALPG220
167 152 121 0 0.0198 0 1 1 10; %BGURI400-
BGURI220 tap chng
ori −1
168 154 139 0 0.0198 0 1 1 10; %PURN400-
PURN220
169 149 142 0 0.0397 0 1 1 10; %FKK400-FKK220
170 155 143 0 0.0198 0 1.05 1 10; %SGPG400-
SGPG220
171 115 26 0 0.0208 0 1 2 10; %JRT220-JRT132 tap
chng ori 0.95
172 116 27 0 0.0313 0 0.95 2 10; %ARAM220-
ARAM132
173 117 28 0 0.0625 0 1 2 10; %KTPS220-KTPS132
174 120 29 0 0.0667 0 1 2 10; %MALPG220-
MALPG132
175 122 30 0 0.0208 0 1 2 10; %DRG220-DRG132
176 123 31 0 0.0313 0 1 2 10; %DOMJ220-
DOMJ132
177 124 32 0 0.0313 0 1 2 10; %GOK220-GOK132
tap chng
178 125 33 0 0.0625 0 1 2 10; %HOW220-HOW132
179 125 33 0 0.0333 0 1 2 10; %HOW220-HOW132
180 126 34 0 0.0333 0 1 2 10; %KASBA220-
KASBA132
181 126 34 0 0.0625 0 1 2 10; %KASBA220-
KASBA132
182 127 35 0 0.0313 0 1 2 10; %LXP220-LXP132
183 128 36 0 0.0313 0 0.95 2 10; %MIDNA220-
MIDNA132
184 129 37 0 0.0313 0 1 2 10; %NJP220-NJP132
185 130 38 0 0.0313 0 1 2 10; %NHAL220-
NHAL132
186 131 39 0 0.0313 0 1 2 10; %RISH220-RISH132
187 132 40 0 0.0313 0 1 2 10; %SATG220-
SATG132
188 133 41 0 0.1 0 1 2 10; %DPL220-DPL132
(Continued)
Appendix B 213
Bus tap
No. fb eb r x hlch Tap posl lmt
189 136 42 0 0.1 0 1 2 10; %BRPPG220-
BRPPG132
190 137 43 0 0.1 0 1 2 10; %SLGPG220-
SLGPG132
191 140 95 0 0.1 0 1 2 10; %STPS220-STPS132
192 117 28 0 0.0333 0 1 2 10; %KTPS220-KTPS132
193 136 42 0 0.2 0 1 2 10; %BRPPG220-
BRPPG132
194 134 112 0 0.0313 0 1 2 10; %WARIA220-
WARIA132
195 144 72 0 0.0313 0 1 2 10; %KRIS220-
KRISH132
196 111 164 0 0.2 0 1.05 2 10; %MELLI132-
MELLI66 tap chng
orig. -1.05
197 10 96 0 0.0324 0 1 2 10; %BTP11-BTPS132
tap chng original -1
198 11 96 0 0.02 0 1 2 10; %BTPS11-BTPS132
tap chng original -1
199 7 140 0 0.0179 0 1 2 10; %STP13.8-STPS220
tap chng original -1
200 8 133 0 0.0769 0 1 2 10; %DPL13.8-DPL220
tap chng original -1
201 12 41 0 0.0314 0 1 2 10; %DPL11-DPL132 tap
chng original -1
202 24 41 0 0.1143 0 1 2 10; %DPL6.3-DPL132
tap chng original -1
203 2 117 0 0.0135 0 1 2 10; %KT115.75-
KTPS220 tap chng
original1
204 3 147 0 0.0169 0 1 2 10; %KT215.75-
KTPS400 tap chng
originl-1
205 4 148 0 0.0253 0 1 2 10; %BKR15.75-
BAKR400 tap chng
originl-1
206 1 149 0 0.0112 0 0.95 2 10; %FKK21-FKK400
tap chng original-1
207 5 149 0 0.0177 0 0.95 2 10; %FKK15.75-FKK400
tap chng original-1
208 13 135 0 0.0268 0 0.95 2 10; %CHU11-CHUK220
tap chng original-1
209 9 101 0 0.1333 0 1 2 10; %RMM211-
RMM2132 tap chng
original-1
(Continued)
214 Appendix B
Bus tap
No. fb eb r x hlch Tap posl lmt
210 21 98 0 0.25 0 1 2 10; %TCF16.6-TCFI132
tap chng original-1
211 22 99 0 0.25 0 1 2 10; %TCF26.6TCFII132
tap chng original-1
212 23 100 0 0.25 0 1 2 10; %TCF36.6-TCF3132
tap chng original-1
213 14 158 0 0.1571 0 1 2 10; %JAL111-JALI66 tap
chng original-1
214 15 159 0 0.3125 0 1 2 10; %JAL211-JALII66
tap chng original-1
215 16 104 0 0.0889 0 1 2 10; %RANGIT11-
RANGT132 tap chng
orig.-1
216 53 162 0 0.1333 0 1.05 2 10; %BRP66-BRP132 tap
chng
217 17 141 0 0.0101 0 1 2 10; %MEJIA11-
141MEJIA220
218 6 118 0 0.0405 0 1 2 10; %BAKR15.7-
BAKR220
219 18 112 0 0.0485 0 1 2 10; %WARIA11-
WARIA132
220 19 112 0 0.028 0 1 2 10; %WARIA21-
WARIA132
221 25 157 0 0.0112 0 0.9875 2 10; %PPSP16.5-PPSP2
tap chng orig.-0.9875
222 39 194 0 0.0533 0 1.05 1 10; %RISH132-
RISHRA33 tap chng
orig.-1.05
223 36 201 0 0.127 0 1.05 1 10; %MIDNA132-
MIDNAP33 tap chng
orig.-1.05
224 54 195 0 0.08 0 1.05 1 10; %VISH132-
BISHNU33 tap chng
orig.-1.05
225 64 196 0 0.254 0 1.05 1 10; %EGRA132-
EGRA33 tap chng
original-1.05
226 64 196 0 0.4 0 1.05 1 10; %EGRA132-
EGRA33 tap chng
original-1.05
227 77 197 0 0.127 0 1.05 1 10; %NBU132-NBU33
tap chng original-1.05
228 86 198 0 0.0533 0 1.05 1 10; %SL132-SLAKE33
tap chng original-1.05
(Continued)
Appendix B 215
Bus tap
No. fb eb r x hlch Tap posl lmt
229 55 199 0 0.16 0 1.05 1 10; %BOLP132-
BOLPUR33 tap chng
orig.-1.05
230 55 199 0 0.2 0 1.05 1 10; %BOLP132-
BOLPUR33 tap chng
orig.-1.05
231 92 200 0 0.08 0 1.05 1 10; %TITA132-TITAG33
Tap chng
original-1.05
232 20 156 0 0.0156 0 0.9875 2 10; %TALA11-TALA400
tap chng orig.-0.9875
233 145 165 0 0.3333 0 1 1 10; %JRT400-220-JRT33
tap chng original-1
234 146 166 0 0.3333 0 1 1 10; %ARAM400-220-
ARAM33 tap chng
original-1
235 147 167 0 0.5 0 1 1 10; %KTPS400-220-
KTPS33 tap chng
original-1
236 148 170 0 0.5 0 1 1 10; %BAKR400-220-
BAKR33 Tap chng
original-1
237 150 169 0 0.5 0 1 1 10; %PARU400-220-
PARU33
238 151 171 0 0.5 0 1 1 10; %MALPG400-220-
MLDAPG33
239 152 172 0 0.5 0 1 1 10; %BGURI400-220-
BGURI33 tap chng
ori-1
240 154 173 0 0.5 0 1 1 10; %PURN400-220-
PURN33
241 149 168 0 0.5 0 1 1 10; %FKK400-220-
FKK33*trf tap has
been chng
242 155 202 0 0.5 0 1 1 10; %SGPG400-220-
SGPG33
243 115 174 0 0.0741 0 1 1 10; %115JRT220-132-
JRT133
244 116 175 0 0.1111 0 1 1 10; %116ARAM220-132-
ARAM133
245 117 176 0 0.2222 0 1 1 10; %117KTPS220-132-
KTPS133
246 120 177 0 0.2222 0 1 1 10; %120MALPG220-
132-MLDPG133
(Continued)
216 Appendix B
Bus tap
No. fb eb r x hlch Tap posl lmt
247 122 178 0 0.0741 0 1 1 10; %122DRG220-132-
DRG33
248 123 179 0 0.1111 0 1 1 10; %123DOMJ220-132-
DOMJ33
249 124 180 0 0.1111 0 1 1 10; %124GOK220-132-
GOK33
250 125 181 0 0.2222 0 1 1 10; %125HOW220-132-
HOW33
251 125 181 0 0.1111 0 1 1 10; %125HOW220-132-
HOW33
252 126 182 0 0.1111 0 1 1 10; %126KASBA220-
132-KASBA33
253 126 182 0 0.2222 0 1 1 10; %126KASBA220-
132-KASBA33
254 127 183 0 0.1111 0 1 1 10; %127LXP220-LXP33
255 128 184 0 0.1111 0 1 1 10; %128MIDNA220-
132-MIDNA33
256 129 185 0 0.1111 0 1 1 10; %129NJP220-132-
NJP33
257 130 186 0 0.1111 0 1 1 10; %130NHAL220-132-
NHAL33
258 131 187 0 0.1111 0 1 1 10; %131RISH220-132-
RISH33
259 132 188 0 0.1111 0 1 1 10; %132SATG220-132-
SATG33
260 133 189 0 0.3333 0 1 1 10; %133DPL220-132-
DPL33
261 136 190 0 0.3333 0 1 1 10; %136BRPPG220-
132-BRPPG33
262 137 191 0 0.3333 0 1 1 10; %137SLGPG220-
132-SLGPG33
263 140 192 0 0.3333 0 1 1 10; %140STPS220-132-
STPS33
264 117 176 0 0.1111 0 1 1 10; %117KTPS220-132-
KTPS133
265 136 190 0 0.6667 0 1 1 10; %136BRPPG220-
132-BRPPG33
266 134 193 0 0.1111 0 1 1 10; %134WARIA220-
132-WARIA33
267 144 203 0 0.1111 0 1 1 10;] %144KRIS220-132-
KRIS33
%47 129 121 0 0 0 0.0004 1 10;
%%total line = 160 + 35(line trf-3 wdg) + 37 (load trf-2wdg) + 35 (for tertiary dg) = 267 %but here total
line 266, line 47 has removed due to it zero imp %Lines are arrange acc to bus voltage level.
Appendix B
217
219
220 Index