<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article article-type="review-article" dtd-version="2.3" xml:lang="EN" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Energy Res.</journal-id>
<journal-title>Frontiers in Energy Research</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Energy Res.</abbrev-journal-title>
<issn pub-type="epub">2296-598X</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">786439</article-id>
<article-id pub-id-type="doi">10.3389/fenrg.2021.786439</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Energy Research</subject>
<subj-group>
<subject>Methods</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>Electrical DebtRank Algorithm&#x2013;Based Identification of Vulnerable Transmission Lines in Power Systems</article-title>
<alt-title alt-title-type="left-running-head">Li et&#x20;al.</alt-title>
<alt-title alt-title-type="right-running-head">Electrical DebtRank Algorithm</alt-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes">
<name>
<surname>Li</surname>
<given-names>Lijuan</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
<xref ref-type="aff" rid="aff2">
<sup>2</sup>
</xref>
<xref ref-type="corresp" rid="c001">&#x2a;</xref>
<uri xlink:href="https://loop.frontiersin.org/people/1441653/overview"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Zeng</surname>
<given-names>Yiwei</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
<uri xlink:href="https://loop.frontiersin.org/people/1472281/overview"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Chen</surname>
<given-names>Jie</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Li</surname>
<given-names>Yue</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Liu</surname>
<given-names>Hai</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Ding</surname>
<given-names>Gangwei</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
</contrib>
</contrib-group>
<aff id="aff1">
<label>
<sup>1</sup>
</label>College of Automation and Electronic Information, Xiangtan University, <addr-line>Xiangtan</addr-line>, <country>China</country>
</aff>
<aff id="aff2">
<label>
<sup>2</sup>
</label>Hunan National Center for Applied Mathematics, Xiangtan University, <addr-line>Xiangtan</addr-line>, <country>China</country>
</aff>
<author-notes>
<fn fn-type="edited-by">
<p>
<bold>Edited by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1259738/overview">Jian Zhao</ext-link>, Shanghai University of Electric Power, China</p>
</fn>
<fn fn-type="edited-by">
<p>
<bold>Reviewed by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1477199/overview">Ye Cai</ext-link>, Changsha University of Science and Technology, China</p>
<p>
<ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1459789/overview">Xubin Liu</ext-link>, Huazhong University of Science and Technology, China</p>
</fn>
<corresp id="c001">&#x2a;Correspondence: Lijuan Li, <email>lilj@xtu.edu.cn</email>
</corresp>
<fn fn-type="other">
<p>This article was submitted to Process and Energy Systems Engineering, a section of the journal Frontiers in Energy Research</p>
</fn>
</author-notes>
<pub-date pub-type="epub">
<day>24</day>
<month>11</month>
<year>2021</year>
</pub-date>
<pub-date pub-type="collection">
<year>2021</year>
</pub-date>
<volume>9</volume>
<elocation-id>786439</elocation-id>
<history>
<date date-type="received">
<day>30</day>
<month>09</month>
<year>2021</year>
</date>
<date date-type="accepted">
<day>28</day>
<month>10</month>
<year>2021</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#xa9; 2021 Li, Zeng, Chen, Li, Liu and Ding.</copyright-statement>
<copyright-year>2021</copyright-year>
<copyright-holder>Li, Zeng, Chen, Li, Liu and Ding</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/">
<p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these&#x20;terms.</p>
</license>
</permissions>
<abstract>
<p>With the increase of complexity of the power system structure and operation mode, the risk of large-scale power outage accidents rises, which urgently need an accuracy algorithm for identifying vulnerabilities and mitigating risks. Aiming at this, the improved DebtRank (DR) algorithm is modified to adapt to the property of the power systems. The overloading state of the transmission lines plays a notable role of stable operation of the power systems. An electrical DR algorithm is proposed to incorporate the overloading state to the identification of vulnerable lines in the power systems in this article. First, a dual model of power system topology is established, the nodes of which represent the lines in the power systems. Then, besides the normal state and failure state having been considered, the definition of the overloading state is also added, and the line load and network topology are considered in the electrical DR algorithm to identify vulnerable lines. Finally, the correctness and reasonability of the vulnerable lines of the power systems identified by the electrical DR algorithm are proved by the comparative analysis of cascade failure simulation, showing its better advantages in vulnerability assessment of power systems.</p>
</abstract>
<kwd-group>
<kwd>cascade failure</kwd>
<kwd>DebtRank algorithm</kwd>
<kwd>overloading state</kwd>
<kwd>power system</kwd>
<kwd>vulnerability</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1">
<title>Introduction</title>
<p>The security and stability of the power systems have become increasingly challenging as the scale and structural complexity of power systems have been augmented, which results in large-scale power outages and an increased risk with significant social and economic losses (<xref ref-type="bibr" rid="B25">Wang et&#x20;al., 2017</xref>; <xref ref-type="bibr" rid="B14">Li et&#x20;al., 2020</xref>; <xref ref-type="bibr" rid="B28">Zhang et&#x20;al., 2021</xref>). Power outages are typically affected by cascade failures triggered by the failures of critical nodes or critical lines of the power systems (<xref ref-type="bibr" rid="B8">Chopade and Bikdash, 2016</xref>). Line interruptions can impact other components and trigger cascading failures (<xref ref-type="bibr" rid="B12">Hui Ren and Dobson, 2008</xref>), and they are more sensitive to being induced than node (substation) interruptions (<xref ref-type="bibr" rid="B9">Hines et&#x20;al., 2016</xref>). As a result, identifying critical lines is critical for preventing and controlling major outages.</p>
<p>Critical lines, also known as &#x201c;vulnerable lines&#x201d; (<xref ref-type="bibr" rid="B19">Meng, 2018</xref>), are lines which change under operating conditions and have a significant impact on the system, are more likely to trigger cascade failure, and increase system vulnerability. Until now, there are mainly two categories of methods for identifying vulnerable lines in power systems. The first method is based on identifying vulnerable lines and system operating states. The identification of the system operation state is realized with the power flow calculation, and the identification of vulnerable lines in the system operation state is realized by simulating the development trend of the system state to assess the vulnerability systems (<xref ref-type="bibr" rid="B1">Abedi et&#x20;al., 2019</xref>; <xref ref-type="bibr" rid="B6">Cai et&#x20;al., 2021</xref>; <xref ref-type="bibr" rid="B15">Li and Qi, 2021</xref>). The second method is based on network topology (<xref ref-type="bibr" rid="B2">Armaghani et&#x20;al., 2020</xref>), in which assessment indices derived from the complex network theory are applied, such as degree (<xref ref-type="bibr" rid="B13">Kitsak et&#x20;al., 2010</xref>) and betweenness (<xref ref-type="bibr" rid="B3">Bai and Miao, 2015</xref>), either combined with electrical characteristic improvement index or updated indicator weight (<xref ref-type="bibr" rid="B29">Zhu et&#x20;al., 2021</xref>). Evaluating the impact of removing a line or changing the operational state of a line on the network to measure the vulnerability of the line is proposed in the study by <xref ref-type="bibr" rid="B20">Okojie et&#x20;al. (2015)</xref>.</p>
<p>Feature vector ranking methods originating from other fields, such as computer, biology, and finance, have been applied to power systems in recent years as the complexity of the power systems has been increasing. The feature vector approach shows the advantage of identifying critical lines in power systems by considering not only the number of node (line) neighbors but also the impact of neighborhood quality on node (line) importance (<xref ref-type="bibr" rid="B21">Ren and L, 2014</xref>). The feature vector ranking methods combine electrical characteristics, such as power system flow and transmission capacity of power system lines to identify vulnerable lines in power systems (<xref ref-type="bibr" rid="B10">Hu, 2018</xref>). The PageRank algorithm evaluating the impact of web pages in the internet can be modified to identify vulnerable lines or nodes which adapt to the power system&#x2019;s performance (<xref ref-type="bibr" rid="B16">Ma et&#x20;al., 2016</xref>; <xref ref-type="bibr" rid="B17">Ma et&#x20;al., 2017</xref>). The modified weighted PageRank algorithm was applied to measure the importance of nodes in a multi-energy power system (<xref ref-type="bibr" rid="B22">Shen et&#x20;al., 2019</xref>). Furthermore, the PageRank algorithm is modified for finding vulnerable lines in large-scale power systems by extending the interaction graph to a directed weighted graph (<xref ref-type="bibr" rid="B18">Ma et&#x20;al., 2017</xref>). To improve the identification efficiency, a PSNodeRank algorithm has been proposed, which abstracts the power systems into a complicated directed weighted network (<xref ref-type="bibr" rid="B23">Sun et&#x20;al., 2020</xref>).</p>
<p>As a novel feature vector ranking method, the DebtRank (DR) algorithm is proposed in financial networks reflecting debt relationships, which can be used to assess the impact of debt default or bankruptcy of a financial node on other financial nodes of the financial network. The DR algorithm can effectively avoid the error caused by circular calculations among financial nodes by adding the definition of the node state (<xref ref-type="bibr" rid="B5">Battiston et&#x20;al., 2012</xref>).</p>
<p>Existing methods for identifying vulnerable lines in power systems involve the consequences of both the normal state and failure state of a cascade failure model as well as the impact on the parameters of the line (<xref ref-type="bibr" rid="B13">Kitsak et&#x20;al., 2010</xref>; <xref ref-type="bibr" rid="B3">Bai and Miao, 2015</xref>; <xref ref-type="bibr" rid="B20">Okojie et&#x20;al., 2015</xref>; <xref ref-type="bibr" rid="B29">Zhu et&#x20;al., 2021</xref>). However, in power systems, there is a transition process from the normal state to failure state of the transmission lines. The DR algorithm can consider the intermediate state between the normal state and failure state in the vulnerability assessment process, which enables more appropriate amount and control of approaching errors as well as failure recovery.</p>
<p>The remainder of this article is organized as follows: the DR algorithm is introduced in the <italic>DR Algorithm</italic> section. The electrical DR algorithm is proposed in the <italic>Electrical DebtRank Algorithm for Power Systems</italic> section for assessing the vulnerability of power systems. The <italic>Vulnerable Lines Identification Process Based on the Electrical DR Algorithm</italic> section describes the steps and flow of the electrical DR algorithm for power systems. In the <italic>Case Studies</italic> section, the case studies of the electrical DR algorithm in power systems are analyzed with the IEEE-39 and IEEE-118 bus power systems. Also, the load loss of power systems caused by the vulnerable line fluctuations identified by the electrical DR algorithm is further compared and analyzed. The full article is concluded in the <italic>Conclusion</italic> section.</p>
</sec>
<sec id="s2">
<title>DR Algorithm</title>
<p>The DR algorithm was proposed by Stefano Battiston et&#x20;al. in 2012 to consider the impact of the initial failure node of the financial network on the system (<xref ref-type="bibr" rid="B5">Battiston et&#x20;al., 2012</xref>), and it is currently widely used in the financial field to effectively assess the debt risk of financial institutions. In the DR algorithm, the financial network is described as a directed network, in which the nodes represent individual financial institutions and the edges represent debt transactions between financial institutions (<xref ref-type="bibr" rid="B24">Thurner and Poledna, 2013</xref>). The algorithm that can avoid the impact of initial nodes is overestimated, and some cascade failures are underestimated due to repeated calculations in the system.</p>
<p>The DR algorithm to assess the node impact is shown in <xref ref-type="disp-formula" rid="e1">(1)</xref>:<disp-formula id="e1">
<mml:math id="m1">
<mml:mrow>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mstyle displaystyle="true">
<mml:munder>
<mml:mo>&#x2211;</mml:mo>
<mml:mi>j</mml:mi>
</mml:munder>
<mml:mrow>
<mml:msub>
<mml:mi>h</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>h</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mstyle>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
<label>(1)</label>
</disp-formula>where <italic>v</italic>
<sub>
<italic>i</italic>
</sub> and <italic>v</italic>
<sub>
<italic>j</italic>
</sub> are the economic values of institutions <italic>i</italic> and <italic>j</italic>, respectively. <italic>R</italic>
<sub>
<italic>i</italic>
</sub> is the vulnerability assessment index of institution <italic>i</italic>, which assesses the systematic impact of node <italic>i</italic>. A larger value of <italic>R</italic>
<sub>
<italic>i</italic>
</sub> indicates that the larger the impact caused by node <italic>i</italic>, the more important the node&#x20;is.</p>
<p>In <xref ref-type="disp-formula" rid="e1">(1)</xref>, <italic>R</italic>
<sub>
<italic>i</italic>
</sub> assesses the impact of node <italic>i</italic> on the rest of the system by introducing the second term so that the impact of a node is calculated in the algorithm without the effect caused by a change in the initial state of node <italic>i</italic>, where <italic>t</italic> is the period, <italic>h</italic>
<sub>
<italic>j</italic>
</sub> (<italic>t</italic>) is the continuous variable associated with state variable <italic>s</italic>
<sub>
<italic>i</italic>
</sub> of node <italic>j</italic> at period <italic>t</italic>, <italic>h</italic>
<sub>
<italic>j</italic>
</sub> (<italic>t</italic>)&#x2208;[0,1], and <italic>h</italic>
<sub>
<italic>i</italic>
</sub> (1) is the value of the continuous variable at the initial state of node <italic>i</italic>. The DR algorithm used to avoid the impact caused by the accident is being double-counted by introducing the continuous variable <italic>h</italic>
<sub>
<italic>i</italic>
</sub> and the state variable <italic>s</italic>
<sub>
<italic>i</italic>
</sub>. The dynamic properties of <italic>h</italic>
<sub>
<italic>i</italic>
</sub> and <italic>s</italic>
<sub>
<italic>i</italic>
</sub> are expressed in <xref ref-type="disp-formula" rid="e2">(2)</xref> and <xref ref-type="disp-formula" rid="e3">(3)</xref>, respectively,<disp-formula id="e2">
<mml:math id="m2">
<mml:mrow>
<mml:msub>
<mml:mi>h</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>min</mml:mi>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>h</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x2b;</mml:mo>
<mml:mstyle displaystyle="true">
<mml:munder>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>j</mml:mi>
<mml:mrow>
<mml:mo>&#x7c;</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>s</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>D</mml:mi>
</mml:mrow>
</mml:mrow>
</mml:mrow>
</mml:munder>
<mml:mrow>
<mml:msub>
<mml:mi>W</mml:mi>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>j</mml:mi>
</mml:mrow>
</mml:msub>
<mml:msub>
<mml:mi>h</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:mstyle>
</mml:mrow>
<mml:mo>}</mml:mo>
</mml:mrow>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
<label>(2)</label>
</disp-formula>
<disp-formula id="e3">
<mml:math id="m3">
<mml:mrow>
<mml:msub>
<mml:mi>s</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:mtable>
<mml:mtr>
<mml:mtd>
<mml:mi>D</mml:mi>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>f</mml:mi>
<mml:mtext>&#xa0;</mml:mtext>
<mml:msub>
<mml:mi>h</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3e;</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo>;</mml:mo>
<mml:msub>
<mml:mi>s</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x2260;</mml:mo>
<mml:mi>I</mml:mi>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mi>I</mml:mi>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>f</mml:mi>
<mml:mtext>&#xa0;</mml:mtext>
<mml:msub>
<mml:mi>s</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>D</mml:mi>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mi>s</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:mi>o</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>h</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>w</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>s</mml:mi>
<mml:mi>e</mml:mi>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mrow>
<mml:mo>.</mml:mo>
</mml:mrow>
</mml:math>
<label>(3)</label>
</disp-formula>
</p>
<p>
<italic>W</italic>
<sub>
<italic>ij</italic>
</sub> in <xref ref-type="disp-formula" rid="e2">(2)</xref> is the impact of the undistressed state or inactive state of node <italic>i</italic> on node <italic>j</italic>. <italic>h</italic>
<sub>
<italic>j</italic>
</sub> (<italic>t&#x2212;</italic>1) is the continuous variable of node <italic>j</italic> at moment <italic>t&#x2212;</italic>1, node <italic>j</italic> is the node whose <italic>s</italic>
<sub>
<italic>j</italic>
</sub> is in the undistressed state at moment <italic>t&#x2212;</italic>1, and the value of <italic>h</italic>
<sub>
<italic>i</italic>
</sub>(<italic>t</italic>) is equal to the sum of <italic>h</italic>
<sub>
<italic>i</italic>
</sub>(<italic>t&#x2212;</italic>1) plus the product of all nodes whose state is inactive at moment <italic>t&#x2212;</italic>1 and the impact of node <italic>i</italic> on it. <italic>h</italic>
<sub>
<italic>i</italic>
</sub> (<italic>t</italic>) has a maximum value of 1 in dynamic change.</p>
<p>In <xref ref-type="disp-formula" rid="e3">(3)</xref>
<underline>,</underline> <italic>s</italic>
<sub>
<italic>i</italic>
</sub> is a discrete variable with three states, <italic>s</italic>
<sub>
<italic>i</italic>
</sub> &#x3d; {<italic>U</italic>, <italic>D</italic>, <italic>I</italic>}. <italic>U</italic> denotes the undistressed (normal) state, that is, the state that node <italic>j</italic> works is the normal state. <italic>D</italic> denotes the distressed state, that is, the state that the institution represented by node <italic>i</italic> can continue to operate but the operating state exceeds a safe or set threshold. <italic>I</italic> denotes the inactive (failure) state, that is, the state that the institution represented by node <italic>i</italic> is in the failure state that is not operational at all. The definition of the state variable <italic>s</italic>
<sub>
<italic>i</italic>
</sub> can be introduced for adding a definition of a state that involves the overloading state between the normal state and failure state in operation of power systems.</p>
<p>For the state variable <italic>s</italic>
<sub>
<italic>i</italic>
</sub> (<italic>t</italic>), when the continuous variable <italic>h</italic>
<sub>
<italic>i</italic>
</sub> of node <italic>i</italic> is larger than 0 at time <italic>t</italic> and <italic>s</italic>
<sub>
<italic>i</italic>
</sub> (<italic>t&#x2212;</italic>1) is not in the inactive state, the state variable of <italic>s</italic>
<sub>
<italic>i</italic>
</sub> (<italic>t</italic>) is converted to distressed state <italic>D</italic>. When the state variable <italic>s</italic>
<sub>
<italic>i</italic>
</sub> (<italic>t&#x2212;</italic>1) of node <italic>i</italic> is in distressed state <italic>D</italic>, the state variable of <italic>s</italic>
<sub>
<italic>i</italic>
</sub>(<italic>t</italic>) is converted to inactive state <italic>I</italic>. In other cases, the state variable of <italic>s</italic>
<sub>
<italic>i</italic>
</sub> (<italic>t</italic>) inherits <italic>s</italic>
<sub>
<italic>i</italic>
</sub>, the value of the state variable at moment <italic>t&#x2212;</italic>1. The value of the state variable <italic>s</italic>
<sub>
<italic>i</italic>
</sub> changes with the value of <italic>h</italic>
<sub>
<italic>i</italic>
</sub>. After a finite period <italic>t</italic>, the dynamics stops and all nodes in the network are in state <italic>U</italic> or state <italic>I</italic>. When a node steps into the distressed state at moment <italic>t&#x2212;</italic>1, this node turns to the inactive state at period&#x20;<italic>t</italic>.</p>
</sec>
<sec id="s3">
<title>Electrical DebtRank Algorithm for Power Systems</title>
<sec id="s3-1">
<title>The Preliminary of the Electrical DR Algorithm</title>
<p>The DR algorithm can effectively assess the vulnerability of the financial network. Because of the differences between the electrical characteristics of power systems and financial networks, the DR algorithm cannot be applied directly in power systems. Therefore, it is necessary to modify the DR algorithm to adapt to the power systems. The modified algorithm applied to power system line vulnerability assessment is known as the electrical DR algorithm. The improvement ideas are as follows:<list list-type="simple">
<list-item>
<p>1) For critical nodes in the financial network, the DR algorithm is used to transmit fluctuations through debt transactions between financial institutions, whereas in the power systems, fluctuations produced by changes in the state of nodes are transmitted through topologies and connection of power systems (<xref ref-type="bibr" rid="B4">Bardoscia et&#x20;al., 2016</xref>).</p>
</list-item>
<list-item>
<p>2) The DR algorithm has three states: undistressed state <italic>U</italic>, distressed state <italic>D</italic>, and inactive state <italic>I</italic>. The load rate of the line is used as the operation state assessment index in the line operation state of power systems; when the line is in the overloading state, the line is in operation but in the poor operation state because of the increased line load rate. The overloading state of the power systems can be defined by introduced distressed state <italic>D</italic> in the DR algorithm.</p>
</list-item>
<list-item>
<p>3) The DR algorithm is utilized to identify the important nodes of the financial networks. In the power systems, disruption of line failure is higher than that of nodes. We want to rank the lines in the power systems in order of impact so that the topology power system is modeled to the dual graph, dual the lines into&#x20;nodes.</p>
</list-item>
</list>
</p>
<sec id="s3-1-1">
<title>State Definition of the Electrical DR Algorithm</title>
<p>The line load factor is related to the failure rate of a power system line. The increase of the load factor of the lines leads to an increase in line heating, which increases the failure probability as well as the probability of line outage (<xref ref-type="bibr" rid="B7">Cheng et&#x20;al., 2006</xref>). <xref ref-type="fig" rid="F1">Figure&#x20;1</xref> depicts the relationship between line failure probability and load factor.</p>
<fig id="F1" position="float">
<label>FIGURE 1</label>
<caption>
<p>Line failure probability curve with power flow.</p>
</caption>
<graphic xlink:href="fenrg-09-786439-g001.tif"/>
</fig>
<p>In <xref ref-type="fig" rid="F1">Figure&#x20;1</xref>, <italic>L</italic>
<sub>min</sub> is the lower threshold of the line power flow crossing limit, that is, the maximum power transmitted by the line to maintain normal state operation. <italic>L</italic>
<sub>max</sub> is the higher threshold of the line power flow crossing limit, that is, the maximum power allowed to be transmitted of the line. The chance of a line outage is presented by <inline-formula id="inf1">
<mml:math id="m4">
<mml:mrow>
<mml:mover accent="true">
<mml:mrow>
<mml:msub>
<mml:mi>F</mml:mi>
<mml:mi>l</mml:mi>
</mml:msub>
</mml:mrow>
<mml:mo stretchy="true">&#xaf;</mml:mo>
</mml:mover>
</mml:mrow>
</mml:math>
</inline-formula>, which is the average statistical value. Between <italic>L</italic>
<sub>min</sub> and <italic>L</italic>
<sub>max</sub>, there is a state in which the power system line is in an operable but overloaded state, that is, the overloading state. With the line load factor rise in the overloading state, the power flow surpasses the thermal stability limit, and the line remains operational but under poor conditions, and the probability of failure rises (<xref ref-type="bibr" rid="B11">Huang et&#x20;al., 2020</xref>). In the result, not only the normal state and failure state in the present method of line vulnerability assessment should be considered but also the overloading state should be addressed.</p>
<p>The states between the DR algorithm, electrical DR algorithm, and present method in power systems are shown in <xref ref-type="table" rid="T1">Table&#x20;1</xref>. The three states, namely, undistressed state <italic>U</italic>, distressed state <italic>D</italic>, and inactive state <italic>I</italic> defined in the DR algorithm are defined as normal state <italic>N</italic>, overloading state <italic>O</italic>, and failure state <italic>F</italic> in the electrical DR algorithm, respectively. Compared with the present vulnerable line identification methods in power systems, the electrical DR algorithm adds the definition of the overloading&#x20;state.</p>
<table-wrap id="T1" position="float">
<label>TABLE 1</label>
<caption>
<p>States between the DR algorithm and electrical DR algorithm and the present method in power systems.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">DR algorithm</th>
<th align="center">Electrical DR algorithm</th>
<th align="center">Present method in power systems</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">Undistressed state <italic>U</italic>
</td>
<td align="left">Normal state <italic>N</italic>
</td>
<td align="left">Normal state <italic>N</italic>
</td>
</tr>
<tr>
<td align="left">Distressed state <italic>D</italic>
</td>
<td align="left">Overloading state <italic>O</italic>
</td>
<td align="left">Not considered</td>
</tr>
<tr>
<td align="left">Inactive state <italic>I</italic>
</td>
<td align="left">Failure state <italic>F</italic>
</td>
<td align="left">Failure state <italic>F</italic>
</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s3-1-2">
<title>Vulnerable Line Assessment Method of Power Systems Compared With the Financial Network</title>
<p>The dual modeling of the power systems is conducted in order to identify the vulnerable lines in the power systems. In the dual model of power systems, each line is represented by a node in the dual topology model. The relationship between transmission lines in the actual power systems is the edge of the dual topology model. To accurately depict the electrical performance of power systems, the direction of the power flow of the line is defined as the direction of the edge in the dual&#x20;graph.</p>
<p>Both financial network and power systems are topological graphs when modeling based on the complex network theory. From the complex network theory, the comparative relationship between the dual topology model of power systems and the financial network is shown in <xref ref-type="table" rid="T2">Table&#x20;2</xref>. The financial institution nodes correspond to the power system lines, and the debt relationship between the financial institutions corresponds to the power flow relationship between the&#x20;lines.</p>
<table-wrap id="T2" position="float">
<label>TABLE 2</label>
<caption>
<p>Consistent correspondence between the dual topology of the power system, the power system topology, and the financial network.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">Financial network</th>
<th align="center">Power system topology</th>
<th align="center">Power system dual topology</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">Institutions</td>
<td align="left">Lines</td>
<td align="left">Nodes</td>
</tr>
<tr>
<td align="left">Debt relationship</td>
<td align="left">Interline connection relations</td>
<td align="left">Lines</td>
</tr>
<tr>
<td align="left">Institution economic value</td>
<td align="left">Line power flow ratio</td>
<td align="left">Node power flow ratio</td>
</tr>
<tr>
<td align="left">Total value of the asset</td>
<td align="left">Total power of the line and its connected lines</td>
<td align="left">Total power of the node and its connected nodes</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The assessment index of vulnerable lines in power systems is developed by applying the principle of ranking the impact of important institutions in the financial network based on the similarities between the power systems and the financial network. Nodes <italic>i</italic> and <italic>j</italic> in financial institutions in <xref ref-type="disp-formula" rid="e1">(1)</xref> map lines <italic>l</italic> and <italic>k</italic> in power systems, corresponding to nodes <italic>l</italic> and <italic>k</italic> in the power system dual topology graph. The comparison of the financial network and power system topology is shown in <xref ref-type="table" rid="T2">Table&#x20;2</xref>. <italic>R</italic>
<sub>
<italic>l</italic>
</sub> is the impact indicator of line <italic>l</italic> in power systems, which measures the impact on the power systems due to the fluctuation of line <italic>l</italic>. A large value of <italic>R</italic>
<sub>
<italic>l</italic>
</sub> means that the impact caused by line <italic>l</italic> is greater and the line is more important.</p>
</sec>
</sec>
<sec id="s3-2">
<title>Improvement of the DR Algorithm</title>
<p>The DR algorithm needs to be modified to adapt to the characteristics of the power systems.</p>
<p>Considering the load capacity of the line, the larger the power flow transmitted by the line, the greater the impact caused. In the power system, there is a connection between line <italic>l</italic> and line <italic>k</italic>, defining the impact of line <italic>l</italic> on line <italic>k</italic> as <italic>Y</italic>
<sub>
<italic>lk</italic>
</sub>.<disp-formula id="e4">
<mml:math id="m5">
<mml:mrow>
<mml:msub>
<mml:mi>Y</mml:mi>
<mml:mrow>
<mml:mi>l</mml:mi>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mi>P</mml:mi>
<mml:mi>l</mml:mi>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>P</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mstyle>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
<mml:mo>}</mml:mo>
</mml:mrow>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
<label>(4)</label>
</disp-formula>
</p>
<p>where <italic>P</italic>
<sub>
<italic>l</italic>
</sub> and <italic>P</italic>
<sub>
<italic>k</italic>
</sub> are the power flow of lines <italic>l</italic> and <italic>k</italic> after the line <italic>l</italic> fluctuations, respectively, and <inline-formula id="inf2">
<mml:math id="m6">
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>P</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mstyle>
</mml:mrow>
</mml:math>
</inline-formula> is the total amount of line <italic>k</italic> power flow for the line connected to line <italic>k</italic>. The maximum value of <italic>Y</italic>
<sub>
<italic>lk</italic>
</sub> is&#x20;1.</p>
<p>According to the DR algorithm, two variables <italic>h</italic>
<sub>
<italic>i</italic>
</sub> and <italic>s</italic>
<sub>
<italic>i</italic>
</sub> are introduced to prevent the impact from being double-counted, avoiding the overestimation of the effect produced by the original disturbance and an underestimation of the damage generated by cascade failure. In the electrical DR algorithm, <italic>h</italic>
<sub>
<italic>l</italic>
</sub> (<italic>t</italic>) is defined as the continuous variable of line <italic>l</italic> at moment <italic>t</italic>, associated with the line <italic>k</italic> state variable <italic>s</italic>
<sub>
<italic>k</italic>
</sub>. <italic>h</italic>
<sub>
<italic>l</italic>
</sub> (<italic>t</italic>) represents the dynamic changes of the power systems represented in the <italic>t</italic>
<sup>
<italic>th</italic>
</sup> period and is related to the value of line <italic>l</italic> at period <italic>t</italic> and the previous state of the line and whether other lines are in the overloading state. The power flow of line increase will lead to an increase in the probability of line heating meltdown (<xref ref-type="bibr" rid="B11">Huang et&#x20;al., 2020</xref>). When the cascade failure occurs, the redistribution of power flow will impact the neighboring line state.<disp-formula id="e5">
<mml:math id="m7">
<mml:mrow>
<mml:msub>
<mml:mi>h</mml:mi>
<mml:mi>l</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>min</mml:mi>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>,</mml:mo>
<mml:msub>
<mml:mi>h</mml:mi>
<mml:mi>l</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x2b;</mml:mo>
<mml:mstyle displaystyle="true">
<mml:munder>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>k</mml:mi>
<mml:mrow>
<mml:mo>&#x7c;</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>s</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>O</mml:mi>
</mml:mrow>
</mml:mrow>
</mml:mrow>
</mml:munder>
<mml:mrow>
<mml:msub>
<mml:mi>Y</mml:mi>
<mml:mrow>
<mml:mi>l</mml:mi>
<mml:mi>k</mml:mi>
</mml:mrow>
</mml:msub>
<mml:msub>
<mml:mi>h</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:mstyle>
</mml:mrow>
<mml:mo>}</mml:mo>
</mml:mrow>
<mml:mo>.</mml:mo>
</mml:mrow>
</mml:math>
<label>(5)</label>
</disp-formula>
</p>
<p>The more the line which is connected with line <italic>l</italic> enters to an overloading state at period <italic>t&#x2212;</italic>1, the larger the value of <italic>h</italic>
<sub>
<italic>l</italic>
</sub> (<italic>t</italic>) in the dynamic change is. The maximum value of <italic>h</italic>
<sub>
<italic>l</italic>
</sub> (<italic>t</italic>) in the dynamic change is 1. The state variable <italic>s</italic>
<sub>
<italic>l</italic>
</sub> is determined by the continuous variable <italic>h</italic>
<sub>
<italic>l</italic>
</sub>, and <italic>s</italic>
<sub>
<italic>l</italic>
</sub> (<italic>t</italic>) can be shown in <xref ref-type="disp-formula" rid="e6">(6)</xref>:<disp-formula id="e6">
<mml:math id="m8">
<mml:mrow>
<mml:msub>
<mml:mi>s</mml:mi>
<mml:mi>l</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:mtable>
<mml:mtr>
<mml:mtd>
<mml:mi>O</mml:mi>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>f</mml:mi>
<mml:mtext>&#xa0;</mml:mtext>
<mml:msub>
<mml:mi>h</mml:mi>
<mml:mi>l</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3e;</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mover accent="true">
<mml:mi>F</mml:mi>
<mml:mo>&#xaf;</mml:mo>
</mml:mover>
</mml:mrow>
<mml:mi>l</mml:mi>
</mml:msub>
<mml:mo>;</mml:mo>
<mml:msub>
<mml:mi>s</mml:mi>
<mml:mi>l</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x2260;</mml:mo>
<mml:mi>F</mml:mi>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mi>F</mml:mi>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mi>f</mml:mi>
<mml:mtext>&#xa0;</mml:mtext>
<mml:msub>
<mml:mi>s</mml:mi>
<mml:mi>l</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mi>O</mml:mi>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mi>s</mml:mi>
<mml:mi>l</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:mi>o</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>h</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>w</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>s</mml:mi>
<mml:mi>e</mml:mi>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mrow>
<mml:mo>.</mml:mo>
</mml:mrow>
</mml:math>
<label>(6)</label>
</disp-formula>
</p>
<p>The state variable <italic>s</italic>
<sub>
<italic>l</italic>
</sub> is determined by the continuous variable <italic>h</italic>
<sub>
<italic>l</italic>
</sub>. The state variable <italic>s</italic>
<sub>
<italic>l</italic>
</sub> represents the three states of line <italic>l</italic>, where <italic>N</italic> is the normal state, indicating that line <italic>l</italic> can operate properly. <italic>O</italic> represents an overloading state, in which line <italic>l</italic> can continue to operate but the state surpasses a specified thermal stability area, increasing the likelihood of failure. <italic>F</italic> represents a failure state, in which line <italic>l</italic> is unable to operate.</p>
<p>Equation <xref ref-type="disp-formula" rid="e6">(6)</xref> expresses the conversion connection between the three states. When the <italic>h</italic>
<sub>
<italic>l</italic>
</sub> (<italic>t</italic>) of line <italic>l</italic> is larger than the average line outage probability <inline-formula id="inf3">
<mml:math id="m9">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mover accent="true">
<mml:mi>F</mml:mi>
<mml:mo>&#xaf;</mml:mo>
</mml:mover>
</mml:mrow>
<mml:mi>l</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> at time <italic>t</italic> and the previous state, <italic>s</italic>
<sub>
<italic>l</italic>
</sub> (<italic>t&#x2212;</italic>1) of <italic>s</italic>
<sub>
<italic>l</italic>
</sub> (<italic>t</italic>) is not in state <italic>F</italic>. The state variable <italic>s</italic>
<sub>
<italic>l</italic>
</sub>(<italic>t&#x2212;</italic>1) of the next state <italic>s</italic>
<sub>
<italic>l</italic>
</sub>(<italic>t</italic>) is converted to state <italic>O</italic>. When the state variable <italic>s</italic>
<sub>
<italic>l</italic>
</sub> (<italic>t&#x2212;</italic>1) of line <italic>l</italic> is in state <italic>O</italic>, the state variable <italic>s</italic>
<sub>
<italic>l</italic>
</sub> (<italic>t&#x2212;</italic>1) of the next state <italic>s</italic>
<sub>
<italic>l</italic>
</sub> (<italic>t</italic>) is converted to state <italic>F</italic>. In other cases, when <italic>s</italic>
<sub>
<italic>l</italic>
</sub> (<italic>t&#x2212;</italic>1) is a failure state or the <italic>h</italic>
<sub>
<italic>l</italic>
</sub> (<italic>t</italic>) is less than the average outage probability <inline-formula id="inf4">
<mml:math id="m10">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mover accent="true">
<mml:mi>F</mml:mi>
<mml:mo>&#xaf;</mml:mo>
</mml:mover>
</mml:mrow>
<mml:mi>l</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, the state variable of <italic>s</italic>
<sub>
<italic>l</italic>
</sub> (<italic>t</italic>) inherits the value of the state variable of <italic>s</italic>
<sub>
<italic>l</italic>
</sub> at moment <italic>t&#x2212;</italic>1.</p>
<p>According to equations 4&#x2013;6, the electrical DR algorithm can be expressed as<disp-formula id="e7">
<mml:math id="m11">
<mml:mrow>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mi>l</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mstyle displaystyle="true">
<mml:msub>
<mml:mo>&#x2211;</mml:mo>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mrow>
<mml:msub>
<mml:mi>h</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:msub>
<mml:mi>p</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>h</mml:mi>
<mml:mi>l</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:mstyle>
<mml:msub>
<mml:mi>p</mml:mi>
<mml:mi>l</mml:mi>
</mml:msub>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
<label>(7)</label>
</disp-formula>
<disp-formula id="e8">
<mml:math id="m12">
<mml:mrow>
<mml:msub>
<mml:mi>p</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mi>P</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:msubsup>
<mml:mi>P</mml:mi>
<mml:mi>k</mml:mi>
<mml:mo>&#x2032;</mml:mo>
</mml:msubsup>
</mml:mrow>
</mml:mstyle>
</mml:mrow>
</mml:mfrac>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
<label>(8)</label>
</disp-formula>
<disp-formula id="e9">
<mml:math id="m13">
<mml:mrow>
<mml:msub>
<mml:mi>p</mml:mi>
<mml:mi>l</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mi>P</mml:mi>
<mml:mi>l</mml:mi>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:msubsup>
<mml:mi>P</mml:mi>
<mml:mi>l</mml:mi>
<mml:mo>&#x2032;</mml:mo>
</mml:msubsup>
</mml:mrow>
</mml:mstyle>
</mml:mrow>
</mml:mfrac>
<mml:mo>,</mml:mo>
</mml:mrow>
</mml:math>
<label>(9)</label>
</disp-formula>where <italic>p</italic>
<sub>
<italic>k</italic>
</sub> and <italic>p</italic>
<sub>
<italic>l</italic>
</sub> represent the power flow of line <italic>k</italic> and line <italic>l</italic>, respectively. <inline-formula id="inf5">
<mml:math id="m14">
<mml:mrow>
<mml:mo>&#x2211;</mml:mo>
<mml:msubsup>
<mml:mi>P</mml:mi>
<mml:mi>k</mml:mi>
<mml:mo>&#x2032;</mml:mo>
</mml:msubsup>
</mml:mrow>
</mml:math>
</inline-formula> and <inline-formula id="inf6">
<mml:math id="m15">
<mml:mrow>
<mml:mo>&#x2211;</mml:mo>
<mml:msubsup>
<mml:mi>P</mml:mi>
<mml:mi>l</mml:mi>
<mml:mo>&#x2032;</mml:mo>
</mml:msubsup>
</mml:mrow>
</mml:math>
</inline-formula> represent the total ratio of power flow of line <italic>k</italic> and line <italic>l</italic>, respectively. As mentioned in <xref ref-type="disp-formula" rid="e7">(7)</xref>, the electrical DR algorithm can calculate the value of <italic>R</italic>
<sub>
<italic>l</italic>
</sub> for each line. The larger the <italic>R</italic>
<sub>
<italic>l</italic>
</sub> value, the more vulnerable the line ranking results can be, resulting in the power systems.</p>
</sec>
</sec>
<sec id="s4">
<title>Vulnerable Line Identification Process Based on the Electrical DR Algorithm</title>
<p>To evaluate the vulnerability of power system lines, the process of the modified method is shown as follows:<list list-type="simple">
<list-item>
<p>1) Establishing power system dual topology model. The dual topology model of power systems is established by taking the lines in the actual power systems corresponding to the nodes in the dual topology model. The relationship between lines formed through the nodes as the edges of the dual&#x20;model.</p>
</list-item>
<list-item>
<p>2) Selecting the initial disturbance line. In the power system dual model, select the line in order and set to an overloading state as the initial disturbance node. Then, the power flow after node fluctuation can be calculated.</p>
</list-item>
<list-item>
<p>3) Assigning variables <italic>h</italic>
<sub>
<italic>l</italic>
</sub> and <italic>s</italic>
<sub>
<italic>l</italic>
</sub>. Initial values to variables <italic>h</italic>
<sub>
<italic>l</italic>
</sub> and <italic>s</italic>
<sub>
<italic>l</italic>
</sub> for each node of the dual topology model are assigned. In order to ensure the independence and accuracy of each calculation, this article assigns <italic>h</italic>
<sub>
<italic>l</italic>
</sub> and <italic>s</italic>
<sub>
<italic>l</italic>
</sub> to each node in the dual&#x20;model.</p>
</list-item>
<list-item>
<p>4) Calculating the impact matrix <bold>
<italic>Y</italic>
</bold>. Based on the node connection matrix of the dual model, the influence <italic>Y</italic>
<sub>
<italic>lk</italic>
</sub> between each node is calculated and the influence matrix <bold>
<italic>Y</italic>
</bold> is derived.</p>
</list-item>
<list-item>
<p>5) The <italic>R</italic>
<sub>
<italic>l</italic>
</sub> value of each node of the dual topology model is calculated from the equations 4&#x2013;9.</p>
</list-item>
<list-item>
<p>6) Sorting of node <italic>R</italic>
<sub>
<italic>l</italic>
</sub> values. The values of <italic>R</italic>
<sub>
<italic>l</italic>
</sub> are sorted according to the calculated values; the larger the value, the greater the impact on the performance of the power systems and the more important it&#x20;is.</p>
</list-item>
</list>
</p>
</sec>
<sec id="s5">
<title>Case Studies</title>
<p>This article identifies IEEE-39 and IEEE-118 bus power systems&#x2019; vulnerable lines by the electrical DR algorithm. The results are performed to verify the effectiveness of this algorithm.</p>
<p>The overloading state takes the line load factor larger or equal to 0.8 and less than 1. The average statistical value of the line outage probability <inline-formula id="inf7">
<mml:math id="m16">
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mover accent="true">
<mml:mi>F</mml:mi>
<mml:mo>&#xaf;</mml:mo>
</mml:mover>
</mml:mrow>
<mml:mi>l</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is 1.81 &#xd7; 10<sup>&#x2212;4</sup> (<xref ref-type="bibr" rid="B11">Huang et&#x20;al., 2020</xref>); the <italic>s</italic>
<sub>
<italic>k</italic>
</sub> (1) of lines is normal state <italic>N</italic>. The <italic>s</italic>
<sub>
<italic>l</italic>
</sub> (1) of the initial disturbance is the overloading state <italic>O</italic>. Considering other random factors when the system random power flow changes, the continuous variable <italic>h</italic>
<sub>
<italic>l</italic>
</sub>(1) is distributed on&#x20;[0,1].</p>
<sec id="s5-1">
<title>Electrical DR Algorithm Applied to the IEEE-39 Bus Power System</title>
<p>The network topology graph of the IEEE-39 bus power system with 46 lines is as shown in <xref ref-type="fig" rid="F2">Figure&#x20;2</xref>. The dual topology model of the IEEE-39 bus power system is established, in which the lines of the actual power systems are transformed into&#x20;nodes.</p>
<fig id="F2" position="float">
<label>FIGURE 2</label>
<caption>
<p>IEEE-39 bus power system network topology.</p>
</caption>
<graphic xlink:href="fenrg-09-786439-g002.tif"/>
</fig>
<p>Based on equations <xref ref-type="disp-formula" rid="e4">(4</xref>&#x2013;<xref ref-type="disp-formula" rid="e9">9)</xref>, the <italic>R</italic>
<sub>
<italic>l</italic>
</sub> values of the 46 lines in the IEEE-39 bus power system (46 nodes in the dual topology graph) are shown in <xref ref-type="fig" rid="F3">Figure&#x20;3</xref>. The larger the <italic>R</italic>
<sub>
<italic>l</italic>
</sub> value, the more influential and important the line is. According to the magnitude of their <italic>R</italic>
<sub>
<italic>l</italic>
</sub> values, the top 10 vulnerable lines are ranked in <xref ref-type="table" rid="T3">Table&#x20;3</xref>. To verify the effectiveness of the algorithm proposed in this article for identifying vulnerable lines, the identification results of vulnerable lines by the electrical DR algorithm are compared with the top 10 lines identified by the modified PageRank algorithm (<xref ref-type="bibr" rid="B21">Ren and L, 2014</xref>), the modified LeaderRank algorithm (<xref ref-type="bibr" rid="B27">Wei et&#x20;al., 2021</xref>), and the electrical betweenness (<xref ref-type="bibr" rid="B26">Wang et&#x20;al., 2014</xref>) method for vulnerable line ranking.</p>
<fig id="F3" position="float">
<label>FIGURE 3</label>
<caption>
<p>
<italic>R</italic>
<sub>
<italic>l</italic>
</sub> value of the IEEE-39 bus power system.</p>
</caption>
<graphic xlink:href="fenrg-09-786439-g003.tif"/>
</fig>
<table-wrap id="T3" position="float">
<label>TABLE 3</label>
<caption>
<p>Result comparison of four identification algorithms for the IEEE-39 bus power system.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">Rank</th>
<th align="center">Electrical DR algorithm</th>
<th align="center">Modified PageRank algorithm</th>
<th align="center">Modified LeaderRank algorithm</th>
<th align="center">Electrical betweenness method</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">1</td>
<td align="char" char="(">29(16&#x2013;24)</td>
<td align="char" char="(">46(29&#x2013;38)</td>
<td align="char" char="(">37(22&#x2013;35)</td>
<td align="char" char="(">26(16&#x2013;17)</td>
</tr>
<tr>
<td align="left">2</td>
<td align="char" char="(">14(6&#x2013;31)</td>
<td align="char" char="(">20(10&#x2013;32)</td>
<td align="char" char="(">20(10&#x2013;32-)</td>
<td align="char" char="(">24(14&#x2013;15)</td>
</tr>
<tr>
<td align="left">3</td>
<td align="char" char="(">35(21&#x2013;22)</td>
<td align="char" char="(">14(6&#x2013;31)</td>
<td align="char" char="(">33(19&#x2013;33)</td>
<td align="char" char="(">6(3&#x2013;4)</td>
</tr>
<tr>
<td align="left">4</td>
<td align="char" char="(">34(20&#x2013;34)</td>
<td align="char" char="(">3(2&#x2013;3)</td>
<td align="char" char="(">27(16&#x2013;19)</td>
<td align="char" char="(">1(1&#x2013;2)</td>
</tr>
<tr>
<td align="left">5</td>
<td align="char" char="(">25(15&#x2013;16)</td>
<td align="char" char="(">5(2&#x2013;30)</td>
<td align="char" char="(">46(29&#x2013;38)</td>
<td align="char" char="(">27(16&#x2013;19)</td>
</tr>
<tr>
<td align="left">6</td>
<td align="char" char="(">31(17&#x2013;27)</td>
<td align="char" char="(">27(16&#x2013;19)</td>
<td align="char" char="(">41(25&#x2013;37)</td>
<td align="char" char="(">16(8&#x2013;9)</td>
</tr>
<tr>
<td align="left">7</td>
<td align="char" char="(">45(28&#x2013;29)</td>
<td align="char" char="(">33(19&#x2013;33)</td>
<td align="char" char="(">39(23&#x2013;36)</td>
<td align="char" char="(">46(29&#x2013;38)</td>
</tr>
<tr>
<td align="left">8</td>
<td align="char" char="(">28(16&#x2013;21)</td>
<td align="char" char="(">37(22&#x2013;35)</td>
<td align="char" char="(">35(21&#x2013;22)</td>
<td align="char" char="(">37(22&#x2013;35)</td>
</tr>
<tr>
<td align="left">9</td>
<td align="char" char="(">8(4&#x2013;5)</td>
<td align="char" char="(">42(26&#x2013;27)</td>
<td align="char" char="(">45(28&#x2013;29)</td>
<td align="char" char="(">39(23&#x2013;36)</td>
</tr>
<tr>
<td align="left">10</td>
<td align="char" char="(">21(11&#x2013;12)</td>
<td align="char" char="(">34(20&#x2013;34)</td>
<td align="char" char="(">34(20&#x2013;34)</td>
<td align="char" char="(">41(25&#x2013;27)</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>According to <xref ref-type="table" rid="T3">Table&#x20;3</xref>, the top 10 lines of the rank of two lines (the second and third ranking of the line) are generator 31 and 35 out of the line, respectively. The failure of the lines will severely affect the system power output shortage, resulting in a major power outage accident. There are three lines for the power system to connect the important load nodes, bearing a heavy power transmission task. These line breaks will reduce the connectivity of the power system, threatening the safe and stable operation of the system and destroying the power balance of the power systems. For example, line 29 in the first order is the connection line between load nodes 16 and 24. Disconnection of load node 16, which connects five nodes in the power systems and is one of the most significant nodes in the system, will split the system into two pieces, creating power flow fluctuations and large system topology changes.</p>
<p>The top 10 vulnerable lines identified by the four algorithms in <xref ref-type="table" rid="T3">Table&#x20;3</xref> are removed according to the ranking of each algorithm. Cascade failure simulations are performed 500 times, resulting in the changes in the percentage of load loss and the cumulative probability of load loss. The comparison of different algorithms is shown in <xref ref-type="fig" rid="F4">Figure&#x20;4</xref>.</p>
<fig id="F4" position="float">
<label>FIGURE 4</label>
<caption>
<p>IEEE-39 bus power system line fluctuation load loss result comparison; electrical DR algorithm applied to the IEEE-118 bus power system.</p>
</caption>
<graphic xlink:href="fenrg-09-786439-g004.tif"/>
</fig>
<p>
<xref ref-type="fig" rid="F4">Figure&#x20;4</xref> shows that removing the 10 vulnerable lines identified by using the electrical DR algorithm results in a maximum load loss of 31%, which is significantly higher than the maximum load loss of 24% for the modified PageRank algorithm and 26% for the modified LeaderRank algorithm. The maximum load loss of the electrical DR algorithm is also higher than the maximum load loss of 29% for the electrical betweenness method. When the system load loss percentage is 0.13%, the cumulative likelihood of load loss for the top 10 line variations indicated by the electrical DR algorithm is slightly higher than that of the modified LeaderRank algorithm and the modified PageRank algorithm. When the load loss is larger than 17%, the cumulative probability of load loss is significantly higher than that of the modified PageRank algorithm, the modified LeaderRank algorithm, and the electrical betweenness method. The electrical DR algorithm shows a significant advantage. It can be seen that the probability of cascade failure that may result from vulnerable lines identified using the electrical DR algorithm is greater.</p>
</sec>
<sec id="s5-2">
<title>Electrical DR Algorithm Applied to the IEEE-118 Bus Power System</title>
<p>Based on equations <xref ref-type="disp-formula" rid="e4">(4</xref>&#x2013;<xref ref-type="disp-formula" rid="e9">9)</xref>, the <italic>R</italic>
<sub>
<italic>l</italic>
</sub> values of the 179 lines in the IEEE-118 bus power system are shown in <xref ref-type="fig" rid="F5">Figure&#x20;5</xref>, where the larger the <italic>R</italic>
<sub>
<italic>l</italic>
</sub> value, the more influential it is in the system and the more important the line&#x20;is.</p>
<fig id="F5" position="float">
<label>FIGURE 5</label>
<caption>
<p>
<italic>R</italic>
<sub>
<italic>l</italic>
</sub> value of the IEEE-118 bus power system.</p>
</caption>
<graphic xlink:href="fenrg-09-786439-g005.tif"/>
</fig>
<p>According to the simulation results of the IEEE-39 bus power system as well as the variation of load loss percentage and load loss accumulation probability and the comparison graph in the <italic>Electrical DR Algorithm Applied to IEEE-39 Bus Power System</italic> section, the electrical betweenness method is slightly superior and is more popular among the four algorithms involved in the comparison. As a result, the electrical betweenness method is compared to the electrical DR algorithm in the validation comparison simulation of the IEEE-118 bus power system.</p>
<p>To verify the effectiveness of the identified vulnerable line algorithm proposed in this article, the vulnerable line identification results obtained in this article are compared with those of the top 10 lines in the vulnerable line ranking identified by electrical betweenness (<xref ref-type="bibr" rid="B26">Wang et&#x20;al., 2014</xref>), as shown in <xref ref-type="table" rid="T4">Table&#x20;4</xref>. The lines are ranked according to the magnitude of their <italic>R</italic>
<sub>
<italic>l</italic>
</sub> values. The transmission lines ranked among the top 10 in the simulation results are shown in <xref ref-type="table" rid="T4">Table&#x20;4</xref>. As shown in <xref ref-type="table" rid="T4">Table&#x20;4</xref>, we can see that the vulnerable lines obtained from the modified electrical DR algorithm have five lines for generator outgoing lines and other five lines connecting important load nodes in the power systems which bear a heavy power transmission task. These lines will bring huge load loss after disconnecting, such as the first ranking of line 33 is the outgoing line between generator 25 and generator 27. Once the disconnection of line 33 severely restricts the power outgoing from generator 27, the disconnection will lead to a wide range of power flow transfers, causing cascade failure.</p>
<table-wrap id="T4" position="float">
<label>TABLE 4</label>
<caption>
<p>
<italic>R</italic>
<sub>
<italic>l</italic>
</sub> values of the IEEE-118 network are compared with those of the electrical betweenness method.</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">Rank</th>
<th align="center">Electrical DR algorithm</th>
<th align="center">Electrical betweenness method</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">1</td>
<td align="char" char="(">33(25&#x2013;27)</td>
<td align="char" char="(">104(65&#x2013;68)</td>
</tr>
<tr>
<td align="left">2</td>
<td align="char" char="(">40(29&#x2013;31)</td>
<td align="char" char="(">126(68&#x2013;81)</td>
</tr>
<tr>
<td align="left">3</td>
<td align="char" char="(">108(69&#x2013;70)</td>
<td align="char" char="(">127(80&#x2013;81)</td>
</tr>
<tr>
<td align="left">4</td>
<td align="char" char="(">66(42&#x2013;49)</td>
<td align="char" char="(">133(36&#x2013;85)</td>
</tr>
<tr>
<td align="left">5</td>
<td align="char" char="(">103(66&#x2013;67)</td>
<td align="char" char="(">54(30&#x2013;38)</td>
</tr>
<tr>
<td align="left">6</td>
<td align="char" char="(">38(26&#x2013;30)</td>
<td align="char" char="(">97(64&#x2013;65)</td>
</tr>
<tr>
<td align="left">7</td>
<td align="char" char="(">70(49&#x2013;50)</td>
<td align="char" char="(">102(65&#x2013;66)</td>
</tr>
<tr>
<td align="left">8</td>
<td align="char" char="(">183(68&#x2013;116)</td>
<td align="char" char="(">98(49&#x2013;66)</td>
</tr>
<tr>
<td align="left">9</td>
<td align="char" char="(">52(37&#x2013;39)</td>
<td align="char" char="(">37(8&#x2013;30)</td>
</tr>
<tr>
<td align="left">10</td>
<td align="char" char="(">15(7&#x2013;12)</td>
<td align="char" char="(">107(68&#x2013;69)</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The top 10 vulnerable lines identified by the two algorithms in <xref ref-type="table" rid="T4">Table&#x20;4</xref> are removed and simulated for cascade failure 500 times. <xref ref-type="fig" rid="F6">Figure&#x20;6</xref> shows the change in the percentage of load loss and the cumulative probability of load loss due to the removal of&#x20;the top 10 vulnerable lines by the two algorithms and the comparison.</p>
<fig id="F6" position="float">
<label>FIGURE 6</label>
<caption>
<p>IEEE-118 bus power system line fluctuation load loss comparison.</p>
</caption>
<graphic xlink:href="fenrg-09-786439-g006.tif"/>
</fig>
<p>As can be seen in <xref ref-type="fig" rid="F6">Figure&#x20;6</xref>, the removal of the 10 vulnerable lines identified using the electrical DR algorithm caused the maximum load loss percentage of 20.5%, which is significantly larger than the maximum load loss of 14% for the electrical betweenness method. The top 10 lines identified by the electrical DR algorithm fluctuate in the system load loss percentage at 0.8%, and the cumulative probability of load loss is slightly higher than that of the electrical betweenness method. The cumulative probabilities after a load loss greater than 8% are consistently higher than those of the electrical betweenness method, and the electrical DR algorithm shows clear advantages. Moreover, removal of the 10 vulnerable lines identified using the electrical DR algorithm resulted in a maximum load loss percentage of 21%, which was significantly better than the maximum load loss percentage of 14% for the electrical betweenness method, showing that the vulnerable lines identified using the electrical DR algorithm are more vulnerable and the potential of line break will cause a greater probability of cascade failure.</p>
<p>The top 10 lines identified by the two algorithms in <xref ref-type="table" rid="T4">Table&#x20;4</xref> are removed in order of vulnerable line value <italic>R</italic>
<sub>
<italic>l</italic>
</sub> and electrical dielectric number. <xref ref-type="fig" rid="F7">Figure&#x20;7</xref> shows the variation of load loss due to stepwise removal of the top 10 vulnerable lines sorted by both methods. In <xref ref-type="fig" rid="F7">Figure&#x20;7</xref>, the load loss of the electrical DR algorithm is close to that of the electrical betweenness method when the first five vulnerable lines are removed, indicating that the impact on the power systems is almost the same when the first five vulnerable lines are removed. However, when the removal of vulnerable lines continues, the load loss caused by the electrical DR algorithm is significantly higher than that of the electrical betweenness method. It shows that the impact of vulnerable lines identified by the electrical DR algorithm is larger than that of the electrical betweenness method, especially in preventing large-scale power outages.</p>
<fig id="F7" position="float">
<label>FIGURE 7</label>
<caption>
<p>IEEE-118 power system removes the first 10 vulnerable lines; load loss comparison diagram.</p>
</caption>
<graphic xlink:href="fenrg-09-786439-g007.tif"/>
</fig>
</sec>
</sec>
<sec sec-type="conclusion" id="s6">
<title>Conclusion</title>
<p>In large-scale power systems, cascade failure caused by transmission line accidents leads to an occurrence of large outage, which can cause serious economic and social losses. Based on the dual model, this article proposes the electrical DR algorithm for identification of vulnerable lines in power systems. The overloading state is considered to fill the gap between the normal state and failure state, which is more in accordance with the transmission line change of the operation state. From the results of cascade failure simulation, the method performs better in the identification of vulnerable lines, in which the load loss of the vulnerable lines identified by the electrical DR algorithm is relatively higher, and cumulative probability of load loss is higher under the conditions with the same load loss percentage. The electrical DR algorithm can be used not only for identification of vulnerable lines but also for identification of vulnerable nodes. The algorithm proposed in this article enriches and develops the vulnerability assessment for power systems, which shows extensive potential applications for effectively preventing cascade failure caused by weak&#x20;lines.</p>
</sec>
</body>
<back>
<sec id="s7">
<title>Data Availability Statement</title>
<p>The raw data supporting the conclusion of this article will be made available by the authors, without undue reservation.</p>
</sec>
<sec id="s8">
<title>Author Contributions</title>
<p>LL contributed to the conception of the study and significantly to analysis and manuscript preparation; YZ performed the experiment, analyzed the data, and wrote the manuscript; JC perfected the manuscript writing; YL helped perform the analysis with constructive discussions; HL performed writing&#x2014;review and editing; and GD performed investigation.</p>
</sec>
<sec id="s9">
<title>Funding</title>
<p>The National Natural Science Foundation of China (NSFC) (52077189) and the Natural Science Foundation of Hunan Province of China (NSFHP) (2020JJ4577) provided financial support. The project of Hunan National Center for Applied Mathematics (2020ZYT003).</p>
</sec>
<sec sec-type="COI-statement" id="s10">
<title>Conflict of Interest</title>
<p>The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec sec-type="disclaimer" id="s11">
<title>Publisher&#x2019;s Note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations or those of the publisher, the editors, and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.</p>
</sec>
<ref-list>
<title>References</title>
<ref id="B1">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Abedi</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Gaudard</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Romerio</surname>
<given-names>F.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>Review of Major Approaches to Analyze Vulnerability in Power System</article-title>. <source>Reliability Eng. Syst. Saf.</source> <volume>183</volume>, <fpage>153</fpage>&#x2013;<lpage>172</lpage>. <pub-id pub-id-type="doi">10.1016/j.ress.2018.11.019</pub-id> </citation>
</ref>
<ref id="B2">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Armaghani</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Hesami Naghshbandy</surname>
<given-names>A.</given-names>
</name>
<name>
<surname>Shahrtash</surname>
<given-names>S. M.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>A Novel Multi-Stage Adaptive Transmission Network Expansion Planning to Countermeasure Cascading Failure Occurrence</article-title>. <source>Int. J.&#x20;Electr. Power Energ. Syst.</source> <volume>115</volume>, <fpage>105415</fpage>. <pub-id pub-id-type="doi">10.1016/j.ijepes.2019.105415</pub-id> </citation>
</ref>
<ref id="B3">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Bai</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Miao</surname>
<given-names>S.</given-names>
</name>
</person-group> (<year>2015</year>). <article-title>Hybrid Flow Betweenness Approach for Identification of Vulnerable Line in Power System</article-title>. <source>IET Generation, Transm. Distribution</source> <volume>9</volume> (<issue>12</issue>), <fpage>1324</fpage>&#x2013;<lpage>1331</lpage>. <pub-id pub-id-type="doi">10.1049/iet-gtd.2014.1016</pub-id> </citation>
</ref>
<ref id="B4">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Bardoscia</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Caccioli</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Perotti</surname>
<given-names>J.&#x20;I.</given-names>
</name>
<name>
<surname>Vivaldo</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Caldarelli</surname>
<given-names>G.</given-names>
</name>
</person-group> (<year>2016</year>). <article-title>Distress Propagation in Complex Networks: the Case of Non-linear DebtRank</article-title>. <source>PloS one</source> <volume>11</volume> (<issue>10</issue>), <fpage>e0163825</fpage>. <pub-id pub-id-type="doi">10.1371/journal.pone.0163825</pub-id> </citation>
</ref>
<ref id="B5">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Battiston</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Puliga</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Kaushik</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Tasca</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Caldarelli</surname>
<given-names>G.</given-names>
</name>
</person-group> (<year>2012</year>). <article-title>Debtrank: Too central to Fail? Financial Networks, the Fed and Systemic Risk</article-title>. <source>Sci. Rep.</source> <volume>2</volume> (<issue>1</issue>), <fpage>541</fpage>&#x2013;<lpage>546</lpage>. <pub-id pub-id-type="doi">10.1038/srep00541</pub-id> </citation>
</ref>
<ref id="B6">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Cai</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Tang</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Tan</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Cao</surname>
<given-names>Y.</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>Increasing Renewable Energy Consumption Coordination with the Monthly Interprovincial Transaction Market</article-title>. <source>Front. Energ. Res.</source> <volume>9</volume>. <pub-id pub-id-type="doi">10.3389/fenrg.2021.719419</pub-id> </citation>
</ref>
<ref id="B7">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Cheng</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>He</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Sun</surname>
<given-names>Y.</given-names>
</name>
</person-group> (<year>2006</year>). <article-title>Impact of Transmission Line&#x2019;s Real-Time Reliability Model Parameter upon Power System Operational Reliability Evaluation</article-title>. <source>Power Syst. Techn.</source> (<issue>13</issue>), <fpage>8</fpage>&#x2013;<lpage>13</lpage>. <pub-id pub-id-type="doi">10.13335/j.1000-3673.pst.2006.13.002</pub-id> </citation>
</ref>
<ref id="B8">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Chopade</surname>
<given-names>P.</given-names>
</name>
<name>
<surname>Bikdash</surname>
<given-names>M.</given-names>
</name>
</person-group> (<year>2016</year>). <article-title>New Centrality Measures for Assessing Smart Grid Vulnerabilities and Predicting Brownouts and Blackouts</article-title>. <source>Int. J.&#x20;Crit. Infrastructure Prot.</source> <volume>12</volume>, <fpage>29</fpage>&#x2013;<lpage>45</lpage>. <pub-id pub-id-type="doi">10.1016/j.ijcip.2015.12.001</pub-id> </citation>
</ref>
<ref id="B9">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hines</surname>
<given-names>P. D.</given-names>
</name>
<name>
<surname>Dobson</surname>
<given-names>I.</given-names>
</name>
<name>
<surname>Rezaei</surname>
<given-names>P.</given-names>
</name>
</person-group> (<year>2016</year>). <article-title>Cascading Power Outages Propagate Locally in an Influence Graph that Is Not the Actual Grid Topology</article-title>. <source>IEEE Trans. Power Syst.</source> <volume>32</volume> (<issue>2</issue>), <fpage>958</fpage>&#x2013;<lpage>967</lpage>. <pub-id pub-id-type="doi">10.1109/tpwrs.2016.2578259</pub-id> </citation>
</ref>
<ref id="B10">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hu</surname>
<given-names>J.&#x20;P.</given-names>
</name>
</person-group> (<year>2018</year>). <article-title>Automatic Identification and Simulation of Transmission Line Fault in Large Scale Power System Survey on Learning-To-Rank Based Recommendation Algorithms</article-title>. <source>Computer Simulation</source> <volume>35</volume> (<issue>02</issue>), <fpage>59</fpage>&#x2013;<lpage>62</lpage>. </citation>
</ref>
<ref id="B11">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Huang</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Guo</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Xu</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Di</surname>
<given-names>F.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Economic Dispatch for Disaster Prevention Considering Load Rate Homogeneity of Power Grid and N-1 Security Constraints</article-title>. <source>Automation Electric Power Syst.</source> <volume>344</volume> (<issue>13</issue>), <fpage>56</fpage>&#x2013;<lpage>63</lpage>. <pub-id pub-id-type="doi">10.7500/AEPS20190923003</pub-id> </citation>
</ref>
<ref id="B12">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hui Ren</surname>
<given-names>H.</given-names>
</name>
<name>
<surname>Dobson</surname>
<given-names>I.</given-names>
</name>
</person-group> (<year>2008</year>). <article-title>Using Transmission Line Outage Data to Estimate Cascading Failure Propagation in an Electric Power System</article-title>. <source>IEEE Trans. Circuits Syst.</source>
<volume>55</volume> (<issue>9</issue>), <fpage>927</fpage>&#x2013;<lpage>931</lpage>. <pub-id pub-id-type="doi">10.1109/tcsii.2008.924365</pub-id> </citation>
</ref>
<ref id="B13">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Kitsak</surname>
<given-names>M.</given-names>
</name>
<name>
<surname>Gallos</surname>
<given-names>L. K.</given-names>
</name>
<name>
<surname>Havlin</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Liljeros</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Muchnik</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Stanley</surname>
<given-names>H. E.</given-names>
</name>
<etal/>
</person-group> (<year>2010</year>). <article-title>Identification of Influential Spreaders in Complex Networks</article-title>. <source>Nat. Phys</source> <volume>6</volume> (<issue>11</issue>), <fpage>888</fpage>&#x2013;<lpage>893</lpage>. <pub-id pub-id-type="doi">10.1038/nphys1746</pub-id> </citation>
</ref>
<ref id="B14">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Zhou</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Wu</surname>
<given-names>Q.</given-names>
</name>
<name>
<surname>Shen</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>H.</given-names>
</name>
<etal/>
</person-group> (<year>2020</year>). <article-title>An Adaptive Time-Resolution Method for Ultra-short-term Wind Power Prediction</article-title>. <source>Int. J.&#x20;Electr. Power Energ. Syst.</source> <volume>118</volume>, <fpage>105814</fpage>. <pub-id pub-id-type="doi">10.1016/j.ijepes.2019.105814</pub-id> </citation>
</ref>
<ref id="B15">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>Qi</surname>
<given-names>Z.</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>Impact of Cascading Failure Based on Line Vulnerability index on Power Grids</article-title>. <source>Energy Syst</source>. <pub-id pub-id-type="doi">10.1007/s12667-021-00435-x</pub-id> </citation>
</ref>
<ref id="B16">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ma</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Shen</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Gao</surname>
<given-names>F.</given-names>
</name>
</person-group> (<year>2016</year>). <article-title>Rapid Identification of Vulnerable Lines in Power Grid Using Modified PageRank Algorithm&#x2014;&#x2014;Part I: Theoretical Foundation</article-title>. <source>Proc. CSEE</source> <volume>36</volume> (<issue>23</issue>), <fpage>6363</fpage>&#x2013;<lpage>6370&#x2b;6601</lpage>. <pub-id pub-id-type="doi">10.13334/j.0258-8013.pcsee.161352</pub-id> </citation>
</ref>
<ref id="B17">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ma</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Shen</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Gao</surname>
<given-names>F.</given-names>
</name>
</person-group> (<year>2017</year>). <article-title>Rapid Identification of Vulnerable Lines in Power Grid Using Modified PageRank Algorithm&#x2014;&#x2014;Part II: Factors Affecting Identification Results. Proceedings of the CSEE</article-title>. <source>Proc. CSEE</source> <volume>37</volume> (<issue>1</issue>), <fpage>36</fpage>&#x2013;<lpage>45</lpage>. <pub-id pub-id-type="doi">10.13334/j.0258-8013.pcsee.161353</pub-id> </citation>
</ref>
<ref id="B18">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ma</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Shen</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Mei</surname>
<given-names>S.</given-names>
</name>
</person-group> (<year>2017</year>). <article-title>Fast screening of vulnerable transmission lines in power grids: A pagerank-based approach</article-title>. <source>IEEE Trans. Smart Grid</source> <volume>10</volume> (<issue>2</issue>), <fpage>1982</fpage>&#x2013;<lpage>1991</lpage>. <pub-id pub-id-type="doi">10.1109/tsg.2017.2785267</pub-id> </citation>
</ref>
<ref id="B19">
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Meng</surname>
<given-names>X.</given-names>
</name>
</person-group> (<year>2018</year>). &#x201c;<article-title>Vulnerable Link Identification and Control Study of Power Grid Based on Transient Potential Energy</article-title>,&#x201d; <comment>[dissertation/doctoral thesis]</comment>. <publisher-loc>Beijing</publisher-loc>: <publisher-name>Beijing jiaotong university</publisher-name>. </citation>
</ref>
<ref id="B20">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Okojie</surname>
<given-names>D. E.</given-names>
</name>
<name>
<surname>Jimoh</surname>
<given-names>A. A.</given-names>
</name>
<name>
<surname>Hamam</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Yusuff</surname>
<given-names>A. A.</given-names>
</name>
</person-group> (<year>2015</year>). &#x201c;<article-title>Identification of vulnerable transmission lines in power system switching operations</article-title>,&#x201d; in <conf-name>2015 4th International Conference on Electric Power and Energy Conversion Systems (EPECS)</conf-name>. <pub-id pub-id-type="doi">10.1109/EPECS.2015.7368506</pub-id> </citation>
</ref>
<ref id="B21">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ren</surname>
<given-names>X.</given-names>
</name>
<name>
<surname>L</surname>
<given-names>L.</given-names>
</name>
</person-group> (<year>2014</year>). <article-title>Review of ranking nodes in complex networks</article-title>. <source>Sci. china press</source> <volume>59</volume>, <fpage>1175</fpage>&#x2013;<lpage>1197</lpage>. <pub-id pub-id-type="doi">10.1360/972013-1280</pub-id> </citation>
</ref>
<ref id="B22">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Shen</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Gu</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Zhao</surname>
<given-names>P.</given-names>
</name>
</person-group> (<year>2019</year>). <article-title>Structural vulnerability assessment of multi-energy system using a PageRank algorithm</article-title>. <source>Energ. Proced.</source> <volume>158</volume>, <fpage>6466</fpage>&#x2013;<lpage>6471</lpage>. <pub-id pub-id-type="doi">10.1016/j.egypro.2019.01.132</pub-id> </citation>
</ref>
<ref id="B23">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Sun</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Liang</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Fu</surname>
<given-names>Y.</given-names>
</name>
</person-group> (<year>2020</year>). <article-title>Research on identification method of key nodes of power system based on PSNodeRank algorithm</article-title>. <source>J.&#x20;Electric Sci. Techn.</source> <volume>35</volume> (<issue>02</issue>), <fpage>157</fpage>&#x2013;<lpage>162</lpage>. <pub-id pub-id-type="doi">10.19781/j.issn.1673-9140.2020.02.021</pub-id> </citation>
</ref>
<ref id="B24">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Thurner</surname>
<given-names>S.</given-names>
</name>
<name>
<surname>Poledna</surname>
<given-names>S.</given-names>
</name>
</person-group> (<year>2013</year>). <article-title>DebtRank-transparency: Controlling systemic risk in financial networks</article-title>. <source>Sci. Rep.</source> <volume>3</volume> (<issue>1</issue>), <fpage>1888</fpage>. <pub-id pub-id-type="doi">10.1038/srep01888</pub-id> </citation>
</ref>
<ref id="B25">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wang</surname>
<given-names>F.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>L.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Wu</surname>
<given-names>Q.</given-names>
</name>
<name>
<surname>Cao</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Zhou</surname>
<given-names>B.</given-names>
</name>
<etal/>
</person-group> (<year>2017</year>). <article-title>Fractal characteristics analysis of blackouts in interconnected power grid</article-title>. <source>IEEE Trans. Power Syst.</source> <volume>33</volume> (<issue>1</issue>), <fpage>1085</fpage>&#x2013;<lpage>1086</lpage>. <pub-id pub-id-type="doi">10.1109/tpwrs.2017.2704901</pub-id> </citation>
</ref>
<ref id="B26">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wang</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Yang</surname>
<given-names>Y.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>J.</given-names>
</name>
</person-group> (<year>2014</year>). <article-title>Vulnerable line identification of complex power grid based on electrical betweenness</article-title>. <source>Power Syst. Prot. Control.</source> <volume>42</volume> (<issue>20</issue>), <fpage>1</fpage>&#x2013;<lpage>6</lpage>. </citation>
</ref>
<ref id="B27">
<citation citation-type="web">
<person-group person-group-type="author">
<name>
<surname>Wei</surname>
<given-names>Z.</given-names>
</name>
<name>
<surname>Ju</surname>
<given-names>Q.</given-names>
</name>
<name>
<surname>Yi</surname>
<given-names>G.</given-names>
</name>
<name>
<surname>Guan</surname>
<given-names>X.</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>Identification of Critical Lines in Power Grid Based on Modified LeaderRank Algorithm. High Voltage Engineering</article-title>. <comment>Available at: <ext-link ext-link-type="uri" xlink:href="http://kns.cnki.net/kcms/detail/42.1239.TM.20210112.1037.007.html">http://kns.cnki.net/kcms/detail/42.1239.TM.20210112.1037.007.html</ext-link> (Accessed January 12, 2021)</comment>. </citation>
</ref>
<ref id="B28">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname>
<given-names>K.</given-names>
</name>
<name>
<surname>Zhou</surname>
<given-names>B.</given-names>
</name>
<name>
<surname>Or</surname>
<given-names>S. W.</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>C.</given-names>
</name>
<name>
<surname>Chung</surname>
<given-names>C. Y.</given-names>
</name>
<name>
<surname>Voropai</surname>
<given-names>N. I.</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>Optimal Coordinated Control of Multi-Renewable-to-Hydrogen Production System for Hydrogen Fueling Stations</article-title>. <source>IEEE Trans. Ind. Applicat.</source>, <fpage>1</fpage>. <pub-id pub-id-type="doi">10.1109/TIA.2021.3093841</pub-id> </citation>
</ref>
<ref id="B29">
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhu</surname>
<given-names>D.</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>R.</given-names>
</name>
<name>
<surname>Duan</surname>
<given-names>J.</given-names>
</name>
<name>
<surname>Cheng</surname>
<given-names>W.</given-names>
</name>
</person-group> (<year>2021</year>). <article-title>Comprehensive weight method based on game theory for identify critical transmission lines in power system</article-title>. <source>Int. J.&#x20;Electr. Power Energ. Syst.</source> <volume>124</volume>, <fpage>106362</fpage>. <pub-id pub-id-type="doi">10.1016/j.ijepes.2020.106362</pub-id> </citation>
</ref>
</ref-list>
</back>
</article>