Abstract
Contingency analysis is an important building block in the stability and reliability analysis of power grid operations. However, due to the large number of transmission lines, in practice only a limited number of contingencies could be evaluated. This paper proposes a graph theory based contingency selection method to effectively identify the most critical contingencies, which can be used in security-constrained unit commitment (SCUC) problems to derive secure and economic operation decisions of the power grid. Specifically, the power flow transferring path identification algorithm and the vulnerability index are put forward to rank individual contingencies according to potential transmission line overloads. Effectiveness of the proposed contingency selection method is quantified by applying the corresponding SCUC solution to the full security evaluation, i.e., quantifying total post-contingency generation-load imbalance in all contingencies. Numerical results on several benchmark IEEE systems, including 5-bus, 24-bus, and 118-bus systems, show effectiveness of the proposed method. Compared with existing contingency selection methods which usually resort to full power flow calculations, the proposed method relies on power gird topology to effectively identify critical contingencies for facilitating the optimal scheduling of SCUC problems.
WHILE the continued expansion of transmission capacities and the enhancement of power grid interconnections could contribute to improving power system stability and reliability, they also increase topological complexity. Indeed, in a sophisticated networked power grid, unexpected outages of elements such as generators and/or transmission lines, would challenge system operation security, resulting in supply-demand imbalances and even large-area blackouts.
Consequently, contingency analysis has been widely implemented in industry practice to ensure system operation security against any single element failure. However, an exhaustive contingency analysis would force a heavy computational burden, especially for large-scale power grids. Specifically, in security-constrained unit commitment (SCUC) problems, computation time could grow dramatically with the increase in the number of contingencies. Indeed, computational performance of many other related power system applications [
Existing research mainly focused on two types of methods in contingency selection: power flow based methods [
1) Power flow based methods. The power flow based methods often use information on power gird topology, load, generation, as well as operation mechanisms. References [
Indeed, although AC power flow methods [
2) PI based methods. Two categories of PIs have been widely used for contingency selection because of their computational advantages: operative indices based on static or transient states of power systems [
It can be observed that existing contingency selection methods are faced with a trade-off between high accuracy and heavy computational burdens, which is of importance for many power system applications that are time-restricted and need to be security-guaranteed. One of the most important applications is to solve the SCUC problem. Specifically, in the SCUC problem, security constraints are generated referring to the contingency list that contains a limited number of representative contingencies. An inaccurate contingency list with high redundancy could lead to intractable computational burdens and uneconomical solutions, while missing critical contingencies could render insecure solutions. In addition, the total time to calculate SCUC is always restricted [
This paper is motivated by the needs of a more efficient and effective method for contingency selection in the context of SCUC problems. Specifically, different from the power flow based and PI based methods, this paper proposes an contingency selection method that simultaneously considers topological and physical vulnerabilities. Firstly, a power flow transferring path identification algorithm, which is developed based on the algorithm of k shortest paths and the concentric relaxation, is proposed to identify a set of transmission lines that may be overloaded after a line fails. Secondly, an index is proposed to access both topological and physical vulnerabilities of the identified lines and effectively rank contingencies. The most critical ones are then selected into a contingency list. Moreover, effectiveness of the proposed contingency selection method is verified in two steps. In the first step, the SCUC model is solved with the generated contingency list. In the second step, unit commitment and generation dispatch solutions from the SCUC model in the first step are evaluated against all contingencies, which calculate the total post-contingency generation-load imbalance against all contingencies.
The main contributions of this paper are two-fold:
1) The proposed method only uses topological structure and load information, which are naturally available in the SCUC problem. Instead of relying on power flow calculations, the power flow transferring path identification algorithm based on graph theory is used to identify the set of lines that may be overloaded after a transmission line fails. The proposed method can also accurately identify contingencies that cause system islanding and properly recognize their priorities in the contingency list.
2) Unlike the LODF based methods which usually derive the same LODF value for multiple contingencies and thus cannot rank contingencies properly, the proposed vulnerability index can effectively rank contingencies considering topological and physical characteristics of power grids. Moreover, the proposed method can generate dynamic contingency lists for multi-hour SCUC problems, which can derive more secure and economic SCUC solutions with respect to various operation conditions in different hours.
The remainder of this paper is organized as follows. Section II presents the proposed contingency selection method. Section III applies the generated contingency list to build the SCUC model, and discusses a full contingency security evaluation model to quantify security and economics of the corresponding SCUC solution. Section IV verifies the effectiveness of the proposed method via several benchmark IEEE test systems, and conclusions are drawn in Section V.
According to graph theory, a power grid can be represented as a non-direction and non-weight graph with sets of vertices and edges. The vertex set consists of buses, represented as . The edge set consists of transmission lines, represented as . The adjacency matrix of the graph , , is defined as in (1).
(1) |
In order to accurately reflect physical characteristics of the power grid, an enhanced weighted and directional adjacency matrix is further defined as in (2) by considering reactance and power flow directions of individual transmission lines.
(2) |
where is the weight of transmission line (i, j), which is set as its reactance in this paper.
Although failure of a transmission line will cause redistribution of power flows throughout the entire power system, it is well understood that the majority of power flow transfers through lines that are topologically close. A concept of tier is used to describe topological closeness of a line to the contingency [

Fig. 1 Tiers in concentric relaxation.
According to the concept of concentric relaxation [
B. Identification of Potential Overloaded Lines via Power Flow Transferring Path Identification Algorithm
Assuming that after a line fails, dispatches of generators and loads do not change right away, while the original power flow of this line will be redistributed to remaining lines in the system. Power flows of these remaining lines can be calculated by adding transferred power flows on top of the original ones. A power flow transferring path is defined as a set of lines that connect two ends of a disconnected line and transmit its originally carried power flow. Thus, by assessing power flow transferring paths, we would be able to identify lines that could be potentially overloaded after a line fails.

Fig. 2 Power flow transferring paths of a 9-bus system.
This clearly shows that, when a transmission line fails, lines contained in the shortest path, i.e., with the smallest reactance, will have the largest transferred power flow, thus enduring higher overload possibilities. Therefore, by searching a few shortest paths between two vertices of a disconnected edge, we can identify potential overloaded transmission lines after an contingency occurs.
As discussed above, after the occurrence of a contingency, potential overloaded transmission lines could be identified by searching the shortest paths. The general shortest path problem, which finds a path between two vertices in a non-direction graph with the smallest total edge weight, can be solved by Dijkstra’s algorithm [
The power flow transferring path identification algorithm is proposed to identify potential overloaded transmission lines after a contingency occurs. Firstly, the concentric relaxation is used to refine the adjacency matrix (2). In addition, the algorithm of k shortest paths is modified to identify all power flow transferring paths according to the refined adjacency matrix, instead of only k paths. In other words, power flow transferring paths within the three tiers are all identified. After power flow transferring paths are obtained, we identify the potential overloaded transmission lines by comparing power flow directions. If the original power flow direction of a line is consistent with the transferred power flow, the power flow of the line would increase, and overload may happen when the contingency occurs. Otherwise, power flow will decrease and overload may not occur. It is noteworthy that because topological neighbouring lines have comparable reactance and capacities, it is unlikely that transferred power flow will induce overload in the opposite direction.
The steps to identify potential overloaded transmission lines under a contingency is summarized in
In order to quantify severity of individual contingencies and rank them, the vulnerability index
(3) |
(4) |
(5) |
(6) |
where is the set of potential overloaded transmission lines in contingency c; is the total number of the shortest paths between vertices i and j; is the number of the shortest paths between vertices i and j contain edge l; is the set of loads; is the power flow of line l under normal operation condition; is the load shift distribution factor of load d on line l; is the electricity demand of load d; is the weight of load d; is the load not in the reference bus; and is the GLDF deduced from the generalized generation distribution factor (GGDF) [
In summary, describes topological vulnerabilities of transmission line via betweenness, while further represents physical vulnerabilities based on GLDF. Thus, the vulnerability index
It is emphasized that
(7) |
where is the maximum power flow limit of line l.
The proposed contingency selection process is summarized as follows:
1) Describe topology of the power grid and construct its adjacency matrix based on (2).
2) For each contingency, identify potential overloaded transmission lines using
3) Calculate the vulnerability index
4) Rank contingencies based on vulnerability index
The generated contingency list will be used in the following section.
As mentioned before, the contingency analysis includes two steps: contingency selection and contingency list evaluation. In this section, the effectiveness of the contingency list derived via the proposed contingency selection process is evaluated via SCUC. First, secure operation decisions are derived by solving the SCUC problem with the generated contingency list. Then, a full contingency security evaluation model is conducted to assess solution quality, thus illustrating the effectiveness of the derived contingency list.
The objective of SCUC is to minimize the normal operation cost and post-contingency generation-load imbalance penalty cost as shown in (8).
(8) |
where , , , are the sets of contingency lists, buses, generators, and hours, respectively; is the fuel price of unit g; is the heat rate curve of unit g; is the generation dispatch of unit g at time t under normal operation condition; is the unit commitment status of unit g at time t under normal operation condition; and are the start-up and shutdown costs of unit g at time t under normal operation condition, respectively; VOLL is the penalty cost of generation load imbalance; and and are the slack variables of load imbalance and generation imbalance of bus e at time t in contingency c, respectively.
The constraints for the normal operation condition are as follows:
(9) |
(10) |
(11) |
(12) |
(13) |
(14) |
(15) |
(16) |
(17) |
(18) |
(19) |
where and are the minimum and maximum capacities of unit g, respectively; and are the ramp-up and ramp-down rates of unit g, respectively; and are the on and off time counters of unit g at time , respectively; and are the minimum on and off time limits of unit g, respectively; is the power flow of line l at time t under normal operation condition; and are the sending and receiving buses of transmission line l, respectively; is the set of network components connected at bus e; and are the constant start-up and shutdown costs of unit g, respectively; and are the sending and receiving bus phase angles of line l at time t under normal operation condition, respectively; is the reactance of transmission line l; and are the minimum and maximum bus voltage phase angles of bus e, respectively; is the voltage phase angle of bus e at time t under normal operation condition; is the voltage phase angle of the reference bus at time t under normal operation condition; and is the set of lines.
Constraints (9)-(15) describe operation limits for individual units. The power output of a generator is limited by its minimum and maximum capacities as in (9). Prevailing unit commitment constraints also include the ramp-up and ramp-down limits (10) and (11), the minimum on/off time limits (12) and (13), and the start-up and shutdown costs (14) and (15). Constraint (16) describes that the total power flow injection is equal to the total withdrawn at each node. Constraint (17) indicates that power flows of transmission lines need to meet capacity limits. In this paper, DC power flow model is used to calculate power flows of transmission lines according to line reactance and bus angles, as in (18) and (19).
The constraints under contingencies are as follows:
(20) |
(21) |
(22) |
(23) |
(24) |
(25) |
(26) |
where is the generation dispatch of unit g at time t under contingency c; and are the down and up corrective capabilities of unit g, respectively; is the power flow of line l at time t under contingency c; and are the sending and receiving bus voltage phase angles of line l at time t under contingency c, respectively; is the voltage phase angle of bus e at time t under contingency c; and is the voltage phase angle of the reference bus at time t in contingency c.
Constraints (20)-(26) further ensure that the power system can operate securely after a single contingency occurs. Constraint (20) describes capacity limits of each unit, and constraint (21) indicates corrective capabilities of each unit. Compared with (16), slack variables are added in the nodal power balance
The SCUC problem (8)-(26) with different sets of contingencies derives different unit commitment and generation dispatch solutions under normal operation. These solutions, however, will induce diverse generation-load imbalance performance under other contingencies outside the contingency list used in SCUC. To this end, a full contingency security evaluation model is proposed to assess quality of the SCUC solution in terms of the total generation-load imbalance under all contingencies, thereby evaluating the effectiveness of the generated contingency lists.
The objective of the full contingency security evaluation problem is to minimize the generation-load imbalance under all contingencies as in (27), with respect to the unit commitment and generation dispatch solutions for the normal condition. The constraints include (16)-(26) that are implemented on all contingencies, namely .
(27) |
A smaller objective means less generation-load imbalance against all contingencies, indicating a better SCUC solution that benefits from the more effective contingency list.
The IEEE 5-bus, 24-bus, and 118-bus systems are used to evaluate the effectiveness of proposed method in selecting and evaluating contingencies. The IEEE 5-bus system is used first to show advantages of the proposed method in identifying potential overloaded transmission lines under contingency and in ranking contingencies. The IEEE 24-bus system is used to illustrate the performance of the proposed method in identifying contingencies that cause system islanding. The IEEE 118-bus system finally shows the application of the proposed method on large-scale power grids. All numerical examples are carried out on a personal computer with Intel Core i7 3.20 GHz processor and 16 GB memory.
The IEEE 5-bus system in

Fig. 3 Topology of IEEE 5-bus system.
According to the method in [
In comparison, as shown in
The IEEE 24-bus system in

Fig. 4 Topology of IEEE 24-bus system.
Contingency lists identified via the LODF method and the proposed method are compared in
In order to further evaluate the effectiveness of the contingency lists identified via the above three methods, the 24-hour SCUC models with respect to the three contingency lists are first solved to derive secure and economic operation decisions, which are then evaluated via the full security evaluation process (with a total of 38 contingences for the IEEE 24-bus system). Results of SCUC and full security evaluation are shown in
As shown in
For further comparison, we manually add transmission line 7-8 to contingency lists of LODF method and power flow method to obtain new SCUC decisions and full security evaluation results, as shown in
The dynamic contingency selection for the IEEE 24-bus system is further carried out to evaluate if such time-dependent dynamic contingency lists could help derive better SCUC decision. Specifically, by using more information, the vulnerability index is updated for each hour according to (7). The total computation time is 15.5588 s. For the sake of fair comparison, power flow information is also added to improve the LODF method [
The results of SCUC and full security evaluation are shown in
The proposed dynamic contingency selection method has a better performance than both the improved LODF method and the improved LODF + islanding contingencies. Specifically, with the size of hourly contingency list being 7, the proposed method achieves the smallest load imbalance 34.36 MW with the normal operation SCUC cost of $2613132.76. However, to achieve the same level of load imbalance, the improved LODF method derives a higher normal operation cost of $2616486.16 with average size of hourly contingency list of 9.33. It clearly shows that the proposed method could identify severe contingencies efficiently and accurately, which also derives more economical SCUC solutions at the similar security level.
More importantly, the proposed method could accurately identify critical contingencies to derive secure SCUC solutions more effectively, in terms of less total generation-load imbalance for all contingencies. Indeed, for the IEEE 24-bus system, the most secure SCUC solution will still result in 24.21 MW generation-load imbalance, due to adjustments on transmission line capacity limits. That is, the IEEE 24-bus system has at least a generation-load imbalance of 24.21 MW with respect to all contingencies, even all 38 contingencies are considered to determine the most secure SCUC decision. With the size of 13 contingencies, the proposed method can obtain the smallest generation-load imbalance level, which cannot be achieved by the improved LODF method and the improved LODF + islanding contingencies under similar contingency list size.
The IEEE 118-bus system including 118 buses and 184 branches is used to evaluate effectiveness of the proposed method on large-scale power girds. For large-scale power systems, concentric relaxation can effectively mitigate computational burden in terms of the number of nodes and edges to be searched by the power flow transferring path identification algorithm. Taking contingency of transmission line 4-5 as an example, the nodes and edges searched in power flow transferring path identification algorithm are 21 and 23, respectively. The computation time on contingency selection in static SCUC and dynamic SCUC are 75.6632 s and 286.2671 s, respectively, which shows the potential of the proposed method for online applications of large-scale power grids.
The SCUC results with static and dynamic contingency lists and their corresponding full security evaluation results are shown in
As shown in
Efficient and accurate contingency selection approaches play an important role in designing secure and economic operation strategies of power grids. By analysing limitations of state-of-the-art contingency selection methods, this paper discusses a novel graph theory based contingency selection method for SCUC problem. The full security evaluation model is further adopted to assess the quality of SCUC solutions, thus illustrating effectiveness of the derived contingency list. Numerical results on IEEE benchmark systems show several advantages of the proposed contingency selection method:
1) The proposed power flow transferring path identification algorithm can effectively identify contingencies that cause system islanding conditions.
2) The vulnerability index R can effectively rank contingencies and consequently help identify the critical ones with the highest priorities.
3) The proposed contingency selection approach can also help derive dynamic contingency lists according to distinct system status at different time periods, and can thus derive more secure and economic SCUC solutions than that from the static contingency list.
4) Because of its high computational performance, the proposed method could be potentially used for online applications such as security assessment and special protection system implementation.
5) Future work could investigate the impacts of load and renewable generation uncertainties on the contingency selection as well as the SCUC solutions.
References
K. W. Hedman, M. C. Ferris, R. P. O’Neill et al., “Co-optimization of generation unit commitment and transmission switching with [Baidu Scholar]
reliability,” IEEE Transactions on Power Systems, vol. 25, no. 2, pp. 1052-1063, May 2010. [Baidu Scholar]
M. Khanabadi, H. Ghasemi, and M. Doostizadeh, “Optimal transmission switching considering voltage security and [Baidu Scholar]
contingency analysis,” IEEE Transactions on Power Systems, vol. 28, no. 1, pp. 542-550, Feb. 2013. [Baidu Scholar]
N. Fan, H. Xu, F. Pan et al., “Economic analysis of the [Baidu Scholar]
power grid contingency selection and evaluation by graph algorithms and interdiction methods,” Energy Systems, vol. 2, no. 3, pp. 313-324, Nov. 2011. [Baidu Scholar]
Z. Li, J. Wang, H. Sun et al., “Transmission contingency analysis based on integrated transmission and distribution power flow in smart grid,” IEEE Transactions on Power Systems, vol. 30, no. 6, pp. 3356-3367, Nov. 2015. [Baidu Scholar]
Z. Li, J. Wang, H. Sun et al., “Transmission contingency screening considering impacts of distribution grids,” IEEE Transactions on Power Systems, vol. 31, no. 2, pp. 1659-1660, Mar. 2016. [Baidu Scholar]
M. Sahraei-Ardakani, X. Li, P. Balasubramanian et al., “Real-time contingency analysis with transmission switching on real power system data,” IEEE Transactions on Power Systems, vol. 31, no. 3, pp. 2501-2502, May 2016. [Baidu Scholar]
Y. Zhao, C. Yuan, G. Liu et al., “Graph-based preconditioning conjugate gradient algorithm for “ [Baidu Scholar]
” contingency analysis,” in Proceedings of 2018 IEEE PES General Meeting, Portland, USA, Aug. 2018, pp. 1-5. [Baidu Scholar]
M. Wang, M. Yang, J. Wang et al., “Contingency analysis considering the transient thermal behavior of overhead transmission lines,” IEEE Transactions on Power Systems, vol. 33, no. 5, pp. 4982-4993, Sept. 2018. [Baidu Scholar]
A. M. Al-Shaalan, “Contingency selection and ranking for composite power system reliability evaluation,” Journal of King Saud University-Engineering Sciences, vol. 32, no. 2, pp. 141-147, Nov. 2018. [Baidu Scholar]
P. Mitra, V. Vittal, B. Keel et al., “A systematic approach to [Baidu Scholar]
analysis for power system security assessment,” IEEE Power and Energy Technology Systems Journal, vol. 3, no. 2, pp. 71-80, Jun. 2016. [Baidu Scholar]
C. M. Davis and T. J. Overbye, “Multiple element contingency screening,” IEEE Transactions on Power Systems, vol. 26, no. 3, pp. 1294-1301, Aug. 2011. [Baidu Scholar]
P. Kaplunovich and K. Turitsyn, “Fast and reliable screening of [Baidu Scholar]
contingencies,” IEEE Transactions on Power Systems, vol. 31, no. 6, pp. 4243-4252, Nov. 2016. [Baidu Scholar]
T. Y. Hsiao, C. A. Hsieh, and Chan-Nan Lu, “A risk-based contingency selection method for SPS applications,” IEEE Transactions on Power Systems, vol. 21, no. 2, pp. 1009-1010, May 2006. [Baidu Scholar]
N. Amjady and M. Esmaili, “Application of a new sensitivity analysis framework for voltage contingency ranking,” IEEE Transactions on Power Systems, vol. 20, no. 2, pp. 973-983, May 2005. [Baidu Scholar]
D. Liu, C. K. Tse, and X. Zhang, “Robustness assessment and enhancement of power grids from a complex network’s perspective using decision trees,” IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 66, no. 5, pp. 833-837, May 2019. [Baidu Scholar]
L. Nan, T. Liu, and C. He, “Identification of transmission sections based on power grid partitioning,” International Transactions on Electrical Energy Systems, vol. 29, no. 2, pp. 2793, Dec. 2018. [Baidu Scholar]
E. P. R. Coelho, M. H. M. Paiva, M. E. V. Segatto et al., “A new approach for contingency analysis based on centrality measures,” IEEE Systems Journal, vol. 13, no. 2, pp. 1915-1923, Jun. 2019. [Baidu Scholar]
G. A. Pagani and M. Aiello, “The power grid as a complex network: a survey,” Physica A: Statistical Mechanics and Its Applications, vol. 392, no. 11, pp. 2688-2700, Jun. 2013. [Baidu Scholar]
G. Irisarri, D. Levner, and A. M. Sasson, “Automatic contingency selection for on-line security analysis–real-time tests,” IEEE Transactions on Power Apparatus and Systems, vol. PAS-98, no. 5, pp. 1552-1559, Sept. 1979. [Baidu Scholar]
G. D. Irisarri and A. M. Sasson, “An automatic contingency selection method for on-line security analysis,” IEEE Transactions on Power Apparatus and Systems, vol. PAS-100, no. 4, pp. 1838-1844, Apr. 1981. [Baidu Scholar]
NYISO. (2013, Jun.). Market participants user’s guide. [Online]. Available: https://www.nyiso.com/documents/20142/3625950/mpug.pdf/ [Baidu Scholar]
L. Wu, G. K. Venayagamoorthy, R. G. Harley et al., “Cellular computational networks based voltage contingency ranking regarding power system security,” in Proceedings of 2018 Clemson University Power Systems Conference (PSC), Charleston, USA, Sept. 2018, pp. 1-8, [Baidu Scholar]
J. Zaborszky, K. Whang, and K. Prasad, “Fast contingency evaluation using concentric relaxation,” IEEE Transactions on Power Apparatus and Systems, vol. PAS-99, no. 1, pp. 28-36, Jan. 1980. [Baidu Scholar]
A. J. Wood and B. F. Wollenberg, Power Generation, Operation, and Control, New York: John Wiley & Sons, pp. 97-108, 2012. [Baidu Scholar]
E. W. Dijkstra, “A note on two problems in connexion with graphs,” Numerische Mathematik, vol. 1, no. 1, pp. 269-271, Jan. 1959. [Baidu Scholar]
D. Eppstein, “Finding the K shortest paths,” SIAM Journal on Computing, vol. 28, no. 2, pp.652-673, May 1998. [Baidu Scholar]
Y. Yamane and H. Kitajima. (2019, Aug.). A new k-shortest path search approach based on graph reduction. [Online]. Available: https://arxiv.org/abs/1908.06460v1 [Baidu Scholar]
M. E. J. Newman, “A measure of betweenness centrality based on random walks,” Society Networks, vol. 27, no. 1, pp. 39-54, Jan. 2005. [Baidu Scholar]
W. Y. Ng, “Generalized generation distribution factors for power system security evaluations,” IEEE Power Engineering Review, vol. PER-1, no. 3, pp. 18-19, Mar. 1981. [Baidu Scholar]
J. Guo, Y. Fu, Z. Li et al., “Direct calculation of line outage distribution factors,” IEEE Transactions on Power Systems, vol. 24, no. 3, pp. 1633-1634, Aug. 2009. [Baidu Scholar]