Introduction

HM is one of the rich regions in terms of new energy resources, which are wind and solar resources, and coal resources. Relying on the perfect Northwest China power transmission channel, HM has accelerated the construction of 10 million kW coal power base, 10 million kW wind power base and 1 million kW solar thermal power generation demonstration base; and has built the largest wind and fire binding transmission HVDC base in China. The development of wind power technology in HM has reached 75.498 million kW, accounting for 62.9% of the total technology development in Northwest China. In terms of solar energy resources, HM has 3170–3380 h of sunshine throughout the year, and is one of the areas with most abundant sunshine hours in China. Although HM power grid offers such great advantages in the development of new energy, the large-scale grid connection and long-distance transmission of new energy raises concerns about the operation security of HM power grid. Therefore, the security and stability of HM power grid has become the focus of our research.

Power system security is a characteristic of power system in the operation process, which reflects the ability of the system to continue supplying power to users with required parameters after experiencing possible disturbances1,2. Although most countries take “safety first” as a policy to guide the operation of power system, some countries even raise the power system to the national strategic defense system3,4, even so, blackouts still occur from time to time, indicating that the ability of current power systems is still unsatisfactory to deal with the emergencies5,6.

At present, with the continuous development of China’s power system and interconnection scale, China’s power workers have built a strong and stable protection and control system based on three lines of defense to ensure a stable operation, which ensures the stability of the power grid and the power quality supplied to users, to a great extent. Tant is so say, power outage accidents in large areas are almost impossible to occur in China. The first line of defense relies on the reliable and rapid action of relay protection elements, to ensure that the system can restore stable operation in time and supply power normally in case of a single fault. Progressively, the second line of defense includes a series of emergency control measures, which can ensure a stable operation of the system at a low cost, after suffering from low probability but serious disturbance. The main measures include machine cutting, load cutting, local splitting and DC modulation. In engineering practice, the control framework of “off-line pre-decision and real-time matching” is often used to form a large number of emergency control strategy tables of the expected faults in the off-line stage. The significance of the third line of defense is that when the system encounters some rare serious faults and can no longer maintain a stable operation, it must prevent the system collapse and minimize the load loss, that is, reasonable disconnection. However, there is no mature scientific connection between the three lines of defense at present. These lines of defense are still event driven and act gradually according to the development of events.

With the rapid development of national economy and the increasing improvement of people’s living standards, people’s demand and dependence on power are becoming greater and greater, and consequently, the requirements for power supply reliability are becoming stronger and stronger7,8. Certainly, due to the impact of natural environment, new energy power generation has some randomness and intermittency. For example, when wind power is connected to the power grid, the security and stability of the power grid will be affected by the wind power characteristics, wind power installed capacity, system scale of wind power connected to the power grid, power structure and layout, and load characteristics, etc. Moreover, the installed capacity of new energy affects the frequency stability of the system, thereby affecting the power quality of power grid and the normal operation of some frequency sensitive loads. In addition, new energy has weak inertia support, strong output uncertainty, poor frequency regulation ability and damping characteristics, resulting in the increasingly prominent problem related to system frequency stability. When the new energy loses its output due to energy shutdown or stall, the frequency of the power system will be reduced, especially when the penetration level of new energy is high, which will directly affect the frequency stability of the system. Hence, the new energy itself cannot provide reactive power compensation to the system, thus it worsens the voltage level, reduces the power quality of the system, and affects the voltage stability of the system. In addition, new energy is a source of interference for the power system, however, when the system fails, and the fault is not removed in time, transient voltage instability will occur. All these issues demand a higher amount of technical attention for the safe and stable operation of new energy power system9,10,11. Modern power system has gradually developed into a complex large-scale system with the characteristics of multi-level structure, multi time scale, multiple control parameters, dynamics, real-time, nonlinearity, openness, wide area, uncertainty, non-autonomy and social economy12,13,14. Therefore, the security level of a power system is difficult to be characterized using a single index. However, the conventional security analyses, whether static security analysis8,15,16,17 or dynamic security analysis18,19,20,21,22, usually can only analyze one aspect of the power system security, which is certainly not enough to describe the power system security as a whole. Therefore, only through comprehensive, multi-level and multi angle analysis of all the aspects of the system including the randomness and fuzziness of components, loads and external conditions, with the help of comprehensive evaluation method, can we obtain an objective and overall understanding of the power system security23.

The so-called comprehensive evaluation refers to the objective, fair and reasonable evaluation of different aspects of the evaluated object. Its core includes the index system of the evaluated object and the selected evaluation method24. At present, the Multi-Criteria Decision-Making (MCDM) method corresponds to a powerful tool being widely used for comprehensive evaluation, such as analytic hierarchy process (AHP)23,24,25,26,27, entropy weight (EW)25,26,27,28, cloud method (CM)24,28, grey relation analysis (GRA)29, analytic network process (ANP)30,31,32, Decision Making Trialand Evaluation Laboratory (DEMETEL)31,32,33,34,35, Više-Kriterijumska Optimizacija I Kompromisno Rešenje (VIKOR)33,34,35,36,37,38,39, and technique for order of preference by similarity to ideal solution (TOPSIS)28,36,37,38,39 evaluation method based on evidence theory. These MCDM evaluation methods are currently being used for ranking of indicators, risk identification and evaluation, sustainable development evaluation between countries, economic evaluation, social evaluation, environmental protection evaluation, technical evaluation, and other issues. However, it has been hardly ever used in the power system security evaluation. In addition, the SWOT analysis with internal (Strengths and Weaknesses) and external factors (Opportunities and Threats) is also a powerful tool, which helps to reveal different strategies for decision-makers and participants40. SWOT analysis is widely used in future prospective in different fields, but is not sufficient for decision making. Alternatively, MCDM methods can be helpful to overcome such problem41,42,43,44,45,46, which are used to make based on pair-wise comparison of both criteria and alternatives43. For this reason, one of the MCDM methods— AHP is used for SWOT analysis in this study. The SWOT-fuzzy AHP has been used to perform the strategic renewable energy resources selection for Pakistan47. Meanwhile, the integrated SWOT-AHP and Fuzzy-TOPSIS approach has been employed for evaluating the strategies for sustainable energy planning in Pakistan48. Nevertheless, there is no single study that utilizes SWOT-AHP approach to evaluate and select the optimal improvement strategy for power system operation security prospective.

In this study, the proposed SWOT-fuzzy AHP-MARCOS methodology is utilized for power system operation security perspective evaluation and investigating the strategic advantages in a case study of HM power grid in Northwest China. The obtained results are compared with VIKOR and TOPSIS methods to validate the proposed integrated SWOT-fuzzy AHP method and measurement of alternatives and ranking according to compromise solution (MARCOS) methodology39.

Proposed method

This section first explains the SWOT method, its components, and its use in the literature. Following that, the proposed methodology is presented.

SWOT analysis

The SWOT analysis is a commonly used strategic analysis method that helps to identify the capabilities or deficiencies of an organization while considering the grid opportunities and threats for the future. However, SWOT analysis method can not quantitatively evaluate the factors, and can not objectively compare the priority between factors. Furthermore, a SWOT matrix may contain different strategies concerning its dimensions and factors, which are prepared based on strength-opportunity (SO), weakness-opportunity (WO), strength-threat (ST) and weakness-threat (WT) strategies; The strategies related to SWOT dimensions are given in Fig. 1.

Figure 1
figure 1

The SWOT strategies.

Some of the advantages of SWOT analysis are listed as follows:

  • It allows attention to the positive and negative aspects of the external and internal environment of the system;

  • By understanding the weaknesses, it helps to identify opportunities to take advantage of strengths and eliminate threats;

  • Determining the SWOT factors of the research object through group discussions provides the basis and support for the strategic decision-making;

  • It can be used at different levels in different industries, organizations, countries or governments, such as individual, national, organizational, and international levels.

The combination of SWOT analysis and MCDM method, such as AHP, has been used to determine the weight of each SWOT factor. Reference40 reveals that most of the studies use the AHP method for prioritizing the SWOT factors and determining their weights, and recent studies employ the fuzzy AHP method combined with SWOT analysis and other MCDM method, such as TOPSIS, MABAC, DEMATEL, VIKOR and MARCOS. The use of AHP method for calculating the weights of SWOT factors and the need for a selection method such as MARCOS——an integrated SWOT-based fuzzy AHP-MARCOS method illustrates and their advantages are introduced next.

The integrated SWOT-fuzzy AHP-MARCOS method

Various MCDM methods developed for decision-making processes in the literature have been utilized to solve different problems concerning the decision-making in various areas. Moreover, MCDM methods are also widely used in the studies focusing on power system security assessment.

The AHP method

AHP is a popular MCDM technology in comprehensive evaluation research proposed by American operations research scientists in 1970s24. It is one of the most suitable methods for natural resource planning and environmental assessment. This method requires less quantitative data and information, and is simple and practical. The SWOT analysis method needs to be quantified by incorporating the SWOT model into a hierarchical structure through AHP method, and therefore, it is completely reasonable to use AHP method in this study.

The MARCOS method

MARCOS is one of the novel MCDM methods proposed by Stevi´c et al., which is designed to evaluate alternatives concerning multiple decision factors based on ideal and anti-ideal solutions and provides the determination of utility degrees for both of these solutions. Recently, References48 utilized the MARCOS method, and integrated it with the AHP method. Owing to its flexibility about the analysis of the expert preferences without considering the type of scale, it maintains the stability even if the range of standards and alternatives is wide. They validated the advantages of MARCOS methodology compared to traditional multi-criteria techniques including: Multi-Attributive Border Approximation area Comparison (MABAC)26, Additive Ratio Assessment (ARAS)27, Weighted Aggregated Sum Product Assessment (WASPAS)28 and TOPSIS29. MARCOS has been successfully applied in different areas by considering the above-mentioned examples from the literature. However, the use of MARCOS method for the strategy selection emphasizes the contributions and originality of this study. Compared to other selection methods such as TOPSIS, MABAC, COPRAS and VIKOR, the proposed combined method generates quite consistent results. Moreover, it provides a compromise solution concerning ideal and anti-ideal solutions, thereby ensuring a satisfactory performance in a fuzzy environment.

The integrated methodology

In the proposed method, AHP is deployed to obtain the criteria weights with SWOT, and MARCOS is utilized to evaluate the alternatives and select the best alternative to benefit from their strengths. The general framework and the flow of proposed integrated methodology are presented in Fig. 2.

Figure 2
figure 2

The framework of the proposed methodology.

Proposed methodology

This section elaborates the computational steps of the integrated SWOT-fuzzy AHP-MARCOS methodology39.

Step 1: Construct the SWOT matrix and factors determined by the experts.

Step 2: Construct a hierarchical structure concerning the goal and SWOT factors.

Step 3: Obtain the judgments of the experts: determine the priorities of the criteria using the linguistic terms given in Table 1.

Table 1 TFN fuzzy scale.

A Fuzzy comparison matrix \({\tilde{\mathbf{A}}}\) is constructed at this step using the TFN as follows:

$$ {\tilde{\mathbf{A}}} = \left[ {\begin{array}{*{20}l} 1 \hfill & {\tilde{a}_{12} } \hfill & \cdots \hfill & {\tilde{a}_{1n} } \hfill \\ {\tilde{a}_{21} } \hfill & 1 \hfill & \cdots \hfill & {\tilde{a}_{2n} } \hfill \\ \vdots \hfill & \vdots \hfill & \ddots \hfill & \vdots \hfill \\ {\tilde{a}_{n1} } \hfill & {\tilde{a}_{n2} } \hfill & \cdots \hfill & 1 \hfill \\ \end{array} } \right] $$
(1)

where \(\tilde{a}_{ij} = 1\), if i = j and \(\tilde{a}_{ij} = \tilde{1},{\kern 1pt} {\kern 1pt} \tilde{3},{\kern 1pt} {\kern 1pt} {\kern 1pt} \tilde{5},{\kern 1pt} {\kern 1pt} {\kern 1pt} \tilde{7},{\kern 1pt} {\kern 1pt} {\kern 1pt} \tilde{9}\) or \(\tilde{a}_{ij} = \tilde{1}^{ - 1} ,{\kern 1pt} {\kern 1pt} \tilde{3}^{ - 1} ,{\kern 1pt} {\kern 1pt} {\kern 1pt} \tilde{5}^{ - 1} ,{\kern 1pt} {\kern 1pt} {\kern 1pt} \tilde{7}^{ - 1} ,{\kern 1pt} {\kern 1pt} {\kern 1pt} \tilde{9}^{ - 1}\) where i ≠ j.

After constructing the fuzzy comparison matrix, AHP method and a MATLAB program are used to calculate the weights of fuzzy AHP.

Step 4: Get the judgments of the experts to evaluate the alternatives using Table 2, to obtain the group decision matrix \({\tilde{\mathbf{X}}}\), where \({\tilde{\mathbf{A}}}(AI)\) and \({\tilde{\mathbf{A}}}(AAI)\) are the ideal and anti-ideal solutions, respectively.

$$ \begin{gathered} ext.{\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} \tilde{C}_{1} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} \tilde{C}_{2} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} \cdots {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} \tilde{C}_{n} \hfill \\ {\tilde{\mathbf{X}}} = \begin{array}{*{20}l} {{\tilde{\mathbf{A}}}(AAI)} \hfill \\ {{\tilde{\mathbf{A}}}_{1} } \hfill \\ {{\tilde{\mathbf{A}}}_{2} } \hfill \\ \vdots \hfill \\ {{\tilde{\mathbf{A}}}_{m} } \hfill \\ {{\tilde{\mathbf{A}}}(AI)} \hfill \\ \end{array} \left[ {\begin{array}{*{20}c} {\tilde{X}_{ai1} } & {\tilde{X}_{ai2} } & \cdots & {\tilde{X}_{ain} } \\ {\tilde{X}_{11} } & {\tilde{X}_{12} } & \cdots & {\tilde{X}_{1n} } \\ {\tilde{X}_{21} } & {\tilde{X}_{22} } & \cdots & {\tilde{X}_{ai1} } \\ \vdots & \vdots & \ddots & \vdots \\ {\tilde{X}_{m1} } & {\tilde{X}_{m2} } & \cdots & {\tilde{X}_{mn} } \\ {\tilde{X}_{id1} } & {\tilde{X}_{id2} } & \cdots & {\tilde{X}_{idn} } \\ \end{array} } \right] \hfill \\ \end{gathered} $$
(2)
$$ {\tilde{\mathbf{A}}}(AAI) = \left\{ {\begin{array}{*{20}c} {\mathop {\min }\limits_{i} \tilde{x}_{ij} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} if{\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} j \in B{\kern 1pt} } \\ {\mathop {\max }\limits_{i} \tilde{x}_{ij} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} if{\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} j \in C} \\ \end{array} } \right. $$
(3)
$$ {\tilde{\mathbf{A}}}(IA) = \left\{ {\begin{array}{*{20}c} {\mathop {\max }\limits_{i} \tilde{x}_{ij} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} if{\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} j \in B} \\ {\mathop {\min }\limits_{i} \tilde{x}_{ij} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} if{\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} j \in C} \\ \end{array} } \right. $$
(4)
Table 2 Evaluation scale for alternatives.

Step 5: Normalize the \({\tilde{\mathbf{X}}}\) to obtain \({\tilde{\mathbf{N}}} = \left[ {\tilde{n}_{ij} } \right]_{m \times n}\) as follows:

$$ \tilde{n}_{ij} = \left( {n_{ij}^{l} ,n_{ij}^{m} ,n_{ij}^{u} } \right) = \frac{{\tilde{x}_{id} }}{{\tilde{x}_{ij} }} = \left( {\frac{{x_{id}^{l} }}{{x_{ij}^{u} }},\frac{{x_{id}^{l} }}{{x_{ij}^{m} }},\frac{{x_{id}^{l} }}{{x_{ij}^{l} }}} \right)if{\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} j \in {\text{Cost}}{\kern 1pt} {\kern 1pt} {\kern 1pt} {\text{criteria}} $$
(5)
$$ \tilde{n}_{ij} = \left( {n_{ij}^{l} ,n_{ij}^{m} ,n_{ij}^{u} } \right) = \frac{{\tilde{x}_{ij} }}{{\tilde{x}_{id} }} = \left( {\frac{{x_{ij}^{l} }}{{x_{id}^{u} }},\frac{{x_{ij}^{m} }}{{x_{id}^{u} }},\frac{{x_{ij}^{u} }}{{x_{id}^{u} }}} \right)if{\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} {\kern 1pt} j \in {\text{Benefit}}{\kern 1pt} {\kern 1pt} {\kern 1pt} {\text{criteria}} $$
(6)

Step 6: Obtain the weighted fuzzy matrix \({\tilde{\mathbf{V}}}\) where weight coefficients of the criterion \(\tilde{\omega }_{j} = \left( {\omega_{j}^{l} ,\omega_{j}^{m} ,\omega_{j}^{u} } \right)\) are calculated using fuzzy-AHP method:

$$ {\tilde{\mathbf{V}}} = \left[ {\tilde{v}_{ij} } \right]_{m \times n} = \left( {v_{ij}^{l} ,v_{ij}^{m} ,v_{ij}^{u} } \right) = \tilde{n}_{ij} \otimes \tilde{\omega }_{j} $$
(7)

Step 7: Calculate the utility degree \({\tilde{\mathbf{K}}}_{i}\):

$$ \tilde{K}_{i}^{ - } = \frac{{\tilde{S}_{i} }}{{\tilde{S}_{ai} }} = \left( {\frac{{s_{i}^{l} }}{{s_{ai}^{u} }},\frac{{s_{i}^{m} }}{{s_{ai}^{m} }},\frac{{s_{i}^{u} }}{{s_{ai}^{l} }}} \right) $$
(8)
$$ \tilde{K}_{i}^{ + } = \frac{{\tilde{S}_{i} }}{{\tilde{S}_{id} }} = \left( {\frac{{s_{i}^{l} }}{{s_{id}^{u} }},\frac{{s_{i}^{m} }}{{s_{id}^{m} }},\frac{{s_{i}^{u} }}{{s_{id}^{l} }}} \right) $$
(9)

where \(\tilde{S}_{i} = (s_{i}^{l} ,s_{i}^{m} ,s_{i}^{u} )\) indicates the addition of elements of \({\tilde{\mathbf{V}}}\):

$$ \tilde{S}_{i} = \sum\limits_{i = 1}^{n} {\tilde{v}_{ij} } $$
(10)

Step 8: Determine the utility functions for ideal \(f(\tilde{K}_{i}^{ + } )\) and anti-ideal \(f(\tilde{K}_{i}^{ - } )\) solutions as follows:

$$ f\left( {\tilde{K}_{i}^{ + } } \right) = \frac{{\tilde{K}_{i}^{ - } }}{{df_{crisp} }} = \left( {\frac{{k_{i}^{ - l} }}{{df_{crisp} }},\frac{{k_{i}^{ - m} }}{{df_{crisp} }},\frac{{k_{i}^{ - u} }}{{df_{crisp} }}} \right) $$
(11)
$$ f\left( {\tilde{K}_{i}^{ - } } \right) = \frac{{\tilde{K}_{i}^{ + } }}{{df_{crisp} }} = \left( {\frac{{k_{i}^{ + l} }}{{df_{crisp} }},\frac{{k_{i}^{ + m} }}{{df_{crisp} }},\frac{{k_{i}^{ + u} }}{{df_{crisp} }}} \right) $$
(12)

Step 9: Calculate the utility functions \(f\left( {K_{i} } \right)\) to determine the rank of the alternatives:

$$ f\left( {K_{i} } \right) = \frac{{K_{i}^{ + } + K_{i}^{ - } }}{{1 + \frac{{1 - f(K_{i}^{ + } )}}{{f(K_{i}^{ + } )}} + \frac{{1 - f(K_{i}^{ - } )}}{{f(K_{i}^{ - } )}}}} $$
(13)

Application of the proposed methodology

This section explains the HM power grid and its effect on the power system security. Following that, the conducted case study is illustrated.

Introduction of HM power grid

In this section, the power system security is evaluated considering the actual specifications of HM power grid in China, which is a mainland city with a wealth of new energy resources. The HM power grid located in the hub of the “silk road” the ancient times. The unique natural environment makes the HM power grid extremely rich in wind and solar energy resources. In addition, it has a vast area and relatively flat terrain, where large scale wind farms and photovoltaic farms are distributed, and the distribution scale is gradually expanding. Moreover, HM is the first cross-regional UHV transmission channel to absorb wind power and other new energy resources in Northwest China. Also, it facilitates the first new energy and thermal power bundling through UHVDC power transmission project in China49.

According to the 13th five-year plan of HM Region, it was expected that the installed capacity of wind power would reach 12,100 MW and that of photovoltaic power would reach 9000 MW by 2020, of which the growth rate from 2012 to 2019 would increase year by year. Figure 3 shows the growth rate curve of wind and photovoltaic power installed capacity at HM power grid. The wind power scale and photovoltaic installed capacity of HM region continued to grow rapidly from 2012 to 2019, where the growth rate of wind power installed capacity was greater than that of the photovoltaic power. It can be seen that HM region, as the main gathering place of wind energy, is the key to new energy power generation in the whole China. As a hub connected with the mainland power grid, the energy security of HM region evidently affects the energy security of the whole China power system transmission.

Figure 3
figure 3

Growth rate of wind energy and solar energy scale in HM region.

SWOT factors

The SWOT factors are determined using the collected expert opinions, related studies and industry reports. These factors are listed in Fig. 4.

Figure 4
figure 4

Constructed hierarchical model of SWOT matrix.

Case study

After gathering the SWOT factors, organizations usually use the AHP method to quantify the priority order of strategies and calculate the weights of the factors.

The SWOT matrix and its hierarchical structure constructed by 24 factors and 8 improvement strategies are shown in Fig. 4. A group of experts determine the priorities of SWOT dimensions and factors based on Table 1. The calculated weight values calculated and the results are given in Tables 3, 4, 5, 6, and 7. (C.R. ≤ 0.1).

Table 3 Evaluation of SWOT dimensions.
Table 4 Evaluation criteria of the Strengths.
Table 5 Evaluation criteria of the Weaknesses.
Table 6 Evaluation criteria of the opportunities.
Table 7 Evaluation criteria of the Threats.

Furthermore, Fig. 5 presents to show the distribution of the weights of SWOT dimensions and factors based on their global weights.

Figure 5
figure 5

Weight distribution of the SWOT dimensions and factors.

The ranked order of SWOT is obtained as S > O > T > W. Through the strengths of HM power grid, seizing more opportunities and daring to threats will effectively overcome the weaknesses and make the online education more successful. Here, the ranked order of the strength factors is obtained as S3 > S6 > S5 > S2 > S1 > S4. Firstly, vigorously develop the rich potential of new energy resources in HM power grid and develop the local new energy resources through advanced technology. Secondly, through the support of government policies and investment, reduce the cost of power production and benefit the public. Furthermore, the ranked order of the weakness factors is obtained as W3 > W1 > W6 > W2 > W4 > W5. Due to long service time of power grid equipment, coupled with the strong uncertainty of random fluctuation of new energy itself and the impact of quarterly changes on new energy, the system is prone to collapse and various faults, thus affecting the normal operation and power generation of the power system, which corresponds to an inevitable weakness of the HM power grid. Progressively, the ranked order of the opportunity factors is obtained as O2 > O1 > O6 > O4 > O3 > O5. By expanding the government policies, financial support and bidding opportunities, we will enable economic and technical support for the development of new energy, vigorously develop the undeveloped new energy, reduce the power production cost of new energy, and bring the economic and social benefits to the society. Lastly, the ranked order of the threat factors is extracted as T1 > T2 > T5 > T3 > T6 > T4. For North China power grids, especially the HM power grid, large-scale long-distance transmission, “West to East power transmission”, is not only a great project, but also a great technical challenge. The strong randomness of load and the lack of appropriate power transmission planning leads to power transmission security problems. At the same time, such power transmission requires strong support from economy, technology and government policies.

The alternative strategies shown in Fig. 4 are evaluated using the MARCOS method over the SWOT factors by the experts using linguistic terms given in Table 2, to obtain a group decision matrix given in Table 8.

Table 8 Evaluation of alternatives by the group of experts.

The extended initial fuzzy matrix \({\tilde{\mathbf{X}}}\) of MARCOS method is first created, including fuzzy anti-ideal \({\tilde{\mathbf{A}}}\left( {AAI} \right)\) and ideal \({\tilde{\mathbf{A}}}\left( {AI} \right)\) solutions. Extended initial fuzzy matrix is then normalized based on the benefit criteria of the proposed SWOT model in step 7. Here, all SWOT factors are benefit criteria. The weighted fuzzy matrix \({\tilde{\mathbf{V}}}\) created using global weights of the SWOT factors is given in Fig. 6. The utility degree \({\tilde{\mathbf{K}}}_{j}\), \({\tilde{\mathbf{A}}}_{j}\) values, utility functions for the ideal \(f(K_{j}^{ + } )\) and anti-ideal \(f(K_{j}^{ - } )\) solutions, and \(\tilde{T}_{j}\) values of alternative strategies are calculated and provided in Table 9. In addition, the defuzzification of \({\tilde{\mathbf{K}}}_{j}^{ - }\), \({\tilde{\mathbf{K}}}_{j}^{ + }\), \(f(K_{j}^{ + } )\), \(f(K_{j}^{ - } )\) values and utility functions \(f(K_{j} )\) of alternative strategies are obtained and the results are given in Table 10. The ranked order of the strategies is obtained as A2 > A6 > A5 > A1 > A8 > A7 > A4 > A3.

Figure 6
figure 6

Three dimensional distribution of utility function values of three methods.

Table 9 Obtained \({\tilde{\mathbf{A}}}_{j}\), j (\({\tilde{\mathbf{K}}}_{j}^{ - }\),\({\tilde{\mathbf{K}}}_{j}^{ + }\)) and \({\tilde{\mathbf{T}}}_{j}\) values.
Table 10 Results of fuzzy MARCOS method and ranked order of the strategies.

The results of this study essentially demonstrated that the most important dimensions that the State Grid should focus on are the strengths and opportunities concerning the HM power grid, where the internal and external factors have almost the same importance. Therefore, we strive to maximize our strengths, weaken our weaknesses, dare to threats and seize the opportunities. Moreover, the ranked order of the strategies reveals that the three most important digital transformation strategies are A2, A6 and A5. These three strategies are defined as “improving the technical establishment to encourage efficient and cheap electricity production”, “strive to build local permanent load and reduce the risk of long-distance and high-capacity transmission”, and “taking advantage of government incentives and investment to modify the irrational energy policies and energy planning”, respectively.

Comparative analysis

This section provides the comparative analysis that is conducted to validate the proposed methodology. The comparison is made against the VIKOR and TOPSIS methods. Computational steps of VIKOR20 and TOPSIS32 are performed, and the corresponding results of VIKOR and TOPSIS are given in Tables 11 and 12, respectively. Besides, the utility function distribution in a three-dimensional space is shown in Fig. 6.

Table 11 Results of fuzzy VIKOR method and the ranked order of the strategies.
Table 12 Results of fuzzy TOPSIS method and the ranked order of the strategies.

Furthermore, the ranked orders of the alternatives obtained from fuzzy VIKOR, TOPSIS, and MARCOS methods are compared in Fig. 7, which are found as VIKOR—— A6 > A5 > A2 > A8 > A1 > A4 > A7 > A3; TOPSIS—— A2 > A6 > A5 > A1 > A8 > A7 > A4 > A3. According to the results, the solutions from these three compared methods for the evaluation of operation security strategies produce similar results. There are both distance-based method, which are similar in their approach. However, the MARCOS method is a relatively new and practical method compared to the other two methods. Compared to the outcomes of other prominent MCDM methods, the integrated AHP-MARCOS methodology provides highly consistent final values, validating the potential of proposed method in solving similar MCDM problems.

Figure 7
figure 7

Compared ranked orders of the strategies.

Sensitivity analysis

The sensitivity analysis can confirm the final prioritization of changes in priority weights of criteria. Table 13 shows the SWOT dimensions have ± 10%, ± 20%, and ± 30% ranking of global weights change. Following that, through the fuzzy MARCOS method, update the utility function F(K) values based on these weights. Next, ranked orders of the strategies alternatives are obtained based on the updated utility function values as shown in Fig. 8, which demonstrates the robustness and credibility of the MARCOS method. Furthermore, “improving the technical establishment to encourage efficient and cheap electricity production” is the most appropriate strategy in most cases.

Table 13 Weight values of the SWOT dimensions in different cases.
Figure 8
figure 8

The comparison of the ranked orders of the strategies.

Conclusion and perspective

New energy offers enormous potential to generate electricity in Northwest China regions, which could potentially be enough to meet overall China’s energy demands. The vigorous development and utilization of new energy at HM power grid can not only reduce the dependence on traditional energy such as coal, oil and natural gas, but also improve the problem of energy shortage, create new employment opportunities, protect the natural environment, and make the rural regions with significant new energy potential wealthier. However, with the integration of new energy and microclimate-sensitive loads, power systems are becoming increasingly complex and vulnerable to faults. As the main power generation area of Northwest China power grid, the safe and economic operation of HM power grid is becoming a more important and complex problem in the field of power system security operation. The strategic evaluation of this paper shows that the proposed method can be effectively used to determine the best strategies with highest priority, and illustrates the importance of establishing the right strategy to exploit a significant developing opportunity and highlight the strength of rapidly growing new energy power grid.

The major contributions of this paper can be summarized as follows:

  • This article is the first study focusing on SWOT-AHP-MARCOS method for new energy power system operation security.

  • This study contributes to the HM power grid security operation prospective strategy selection problem by developing a new evaluation model. The effectiveness of the presented approach is validated via comparative analysis and sensitivity analysis. The results as follow:

It is concluded that the three most important strategies are A2, A6 and A5. These are “improving the technical establishment to encourage efficient and cheap electricity production”, “strive to build local permanent load and reduce the risk of long-distance and high-capacity transmission”, and “taking advantage of government incentives and investment to modify the irrational energy policies and energy planning”, respectively. Northwest region is a poor area in China with underdeveloped economy. Although it has a great potential for new energy, this energy cannot be consumed locally. Therefore, the government advocates the policy of “power transmission from the west to the East” to invest in the energy field in the northwest region. First, it aims to solve the problem of energy shortage in the eastern developed regions. Second, it aims to promote the economic development of the northwest region through the advantages of high new energy storage, so as to achieve the “Chinese dream” of energy coexistence and common prosperity. In this regard, the results of the presented SWOT analysis showed that despite various challenges, HM power grid could still provide numerous benefits to the country over conventional non-new energy resources in terms of production cost, environmental aspects with additional prospects of endless new energy potential, which will greatly promote the economic development of Northwest China.

In the future, it is worthwhile to further study the following aspects:

  • The MCDM methods such as HFL-AHP, ANP, CM, CRITIC, DEA, ELECTRE, MABAC, TOPSIS, and VIKOR can be applied to the similar-type of decision-problem.

  • Based on the construction of SWOT index system, the method in this paper can be used to evaluate the power system development prospect among different regions in the world.

However, one of the limitations of this study is the identification of the items within the SWOT factors. During the process, the researchers’ subjectivity may have affected the results. We believe that if the items were derived directly through interviews with experts and the top four items among them were selected, we could secure more objective results.