US-Canada Power System Outage Task Force.Final report on the August 14, 2003 blackout in the United States and Canada:causes and recommendation[R/OL].Canada, 2004.https://reports.energy.gov/.
[2]
Enquiry Committee.Report of the enquiry committee on grid disturbance in Northern Region on 30th July 2012 and in Northern, Eastern & North-Eastern Region on 31st July 2012[R/OL].New Delhi, 2012.http://www. powermin.nic.in/pdf/GRID_ENQ_REP_16_8_12.pdf.
[3]
石立宝, 史中英, 姚良忠, 等.现代电力系统连锁性大停电事故机理研究综述[J].电网技术, 2010, 34(3):48-54.Shi Libao, Shi Zhongying, Yao Liangzhong, et al.A review of mechanism of large cascading failure blackouts of modern power system[J].Power System Technology.2010, 34(3):48-54(in Chinese).
[4]
Liu Kun, Dong Xinzhou, Wang Bin, et al.Research on the process of power flow transferring and its identification method[C]//Advanced Power System Automation and Protection (APAP).Beijing:Chinese Society for Electrical Engineering, 2011:2354-2360.
[5]
David C, Elizondo J, Ree D L.Analysis of hidden failures of protection schemes in large interconnected power systems[J].Proceedings of the IEEE, 2005, 93(5):956-964.
[6]
Kinney R, Crucitti P, Albert R, et al.Modeling cascading failures in the North American power grid[J].European Physical Journal B:Condensed Matter, 2005, 46(1):101-107.
[7]
Re'ka Albert, Istva'n Albert, Nakarado G L.Structural vulnerability of the North American power grid[J].Physical Review E, 2004, 69(2):025103.
[8]
闫常友, 周孝信, 康建东, 等.潮流转移灵敏度以及安全评估指标研究[J].中国电机工程学报, 2010, 30(19):7-13.Yan Changyou, Zhou Xiaoxin, Kang Jiandong, et al.Flow transferring sensitivity and security index analysis[J].Proceedings of the CSEE, 2010, 30(19):7-13(in Chinese).
[9]
Ni M, Mccalley J D, Vittal V, et al.Online risk-based security assessment[J].IEEE Trans. on Power Systems, 2003, 18(1):258-265.
[10]
杨文辉, 毕天姝, 黄少锋, 等.基于电网生存性评估的关键线路识别方法[J].中国电机工程学报, 2011, 31(7):29-35.Yang Wenhui, Bi Tianshu, Huang Shaofeng, et al.An approach for critical lines identification based on the survivability of power grid[J].Proceedings of the CSEE.2011, 31(7):29-35(in Chinese).
[11]
余兴祥, 刘友波等, 考虑潮流转移结构特征的输电线路脆弱度在线评估[J].电力科学与技术学报, 2011, 26(4):80-87.Yu Xingxiang, Liu Youbo, et al.On-line assessment for transmission line vulnerability with structure characteristics of power flow transfer considering[J].Journal of Electric Power Science And Technology, 2011, 26(4):80-87(in Chinese).
[12]
Salmeron J, Wood K, Baldick R.Analysis of electric grid security under terrorist threat[J].IEEE Trans. on Power Systems, 2004, 19(2):905-912.
[13]
Watts D J, Strogatz S H.Collective dynamics of “small-world” networks[J].Nature, 1998, 393(6684):440-442.
[14]
Barabasi A L, Albert R.Emergence of scaling in random networks[J].Science, 1999, 286(5439):509-512.
[15]
丁明, 韩平平.基于小世界拓扑模型的大型电网脆弱性评估算法[J].电力系统自动化, 2006, 30(8):7-10, 40.Ding Ming, Han Pingping, Small-world topological model based vulnerability assessment algorithm for large-scale power grid[J].Automation of Electric Power Systems, 2006, 30(8):7-10, 40(in Chinese).
[16]
丁明, 韩平平.加权拓扑模型下的小世界电网脆弱性评估[J].中国电机工程学报, 2008, 28(10):20-25.Ding Ming, Han Pingping.Vulnerability assessment to small-world power grid based on weighted topological model[J].Proceedings of the CSEE, 2008, 28(10):20-25(in Chinese).
[17]
曹一家, 陈晓刚, 孙可.基于复杂网络理论的大型电力系统脆弱线路辨识[J].电力自动化设备, 2006, 26(12):1-5, 31.Cao Yijia, Chen Xiaogang, Sun Ke.Identification of vulnerable lines in power grid based on complex network theory[J].Electric Power Automation Equipment.2006, 26(12):1-5, 31(in Chinese).
[18]
沈瑞寒, 刘涤尘, 等.基于加权网络模型的电网潮流转移下危险线路识别[J].电网技术, 2012, 36(5):245-250.Shen Ruihan, Liu Dichen, et al.Weighted network model based recognition of dangerous lines under power flow transferring[J].Power System Technology, 2012, 36(5):245-250(in Chinese).
[19]
倪向萍, 梅生伟, 张雪敏.基于复杂网络理论的输电线路脆弱度评估方法[J].电力系统自动化, 2008, 32(4):1-5.Ni Xiangping, Mei Shengwei, Zhang Xuemin.Transmission lines vulnerability assessment based on complex network theory[J].Automation of Electric Power Systems, 2008, 32(4):1-5(in Chinese).
[20]
薛毅.最优化原理与方法[M].北京:北京工业大学出版社, 2001:36-98, 269-286.Xue Yi.Optimization theory and methods[M].Beijing:Beijing University of Technology Press, 2009:36-98, 269-286(in Chinese).
[21]
徐伟宣, 何建秋, 邹庆云.目标函数带绝对值号的特殊非线性规划问题[J].优选与管理科学, 1987, (3):9-13.Xu Weixuan, He jianQiu, Zou QingYun.Special nonlinear programming problem with absolute value of the objective function[J].Chinese Journal of Management Science, 1987, (3):9-13(in Chinese).
[22]
Pemaio, J A, Fischl R.Fast identification of the steady-state security regions for power system security enhancement[C]//Text of "A" papers from IEEE Winter Power Meeting.New York:IEEE Power Engineering Society, 1976:A.76076-0.
[23]
Wu F Felix, Kumagai S, Steady-State security regions of power system[J].IEEE Trans. on Circuits and Systems.1982, 29(11):703-711.
[24]
李玉, 朱继忠, 秦翼鸿, 等.N及N-l静态安全域研究[J].中国电力工程学报, 1993, 13(2):49-54.Li Yu, Zhu Jizhong, Qin Yihong, et al.Study on N and N-1 steady-state security regions[J].Proceedings of the CSEE.1993, 13(2):49-54(in Chinese).
[25]
Carreras B A, Lynch V E, Dbson I, et al.Modeling blackout dynamics in power transmission networks with simple structure[C]//Proceedings of the 34th Annual Hawaii International Conference on System Sciences.Hawaii:IEEE Computer Society, 2001:719-727.
[26]
梅生伟, 薛安成, 张雪敏.电力系统自组织临界特性与大电网安全[M].北京:清华大学出版社, 2009:114-143.Mei Shengwei, Xue Ancheng, Zhang Xuemin.The self-organized criticality and security of lager power system[M].Beijing:Tsinghua University Press, 2009:114-143(in Chinese).