119 research outputs found

    Adjacent Graph Based Vulnerability Assessment for Electrical Networks Considering Fault Adjacent Relationships Among Branches

    Get PDF
    Security issues related to vulnerability assessment in electrical networks are necessary for operators to identify the critical branches. At present, using complex network theory to assess the structural vulnerability of the electrical network is a popular method. However, the complex network theory cannot be comprehensively applicable to the operational vulnerability assessment of the electrical network because the network operation is closely dependent on the physical rules not only on the topological structure. To overcome the problem, an adjacent graph (AG) considering the topological, physical, and operational features of the electrical network is constructed to replace the original network. Through the AG, a branch importance index that considers both the importance of a branch and the fault adjacent relationships among branches is constructed to evaluate the electrical network vulnerability. The IEEE 118-bus system and the French grid are employed to validate the effectiveness of the proposed method.National Natural Science Foundation of China under Grant U1734202National Key Research and Development Plan of China under Grant 2017YFB1200802-12National Natural Science Foundation of China under Grant 51877181National Natural Science Foundation of China under Grant 61703345Chinese Academy of Sciences, under Grant 2018-2019-0

    A Cascading Failure Model for Command and Control Networks with Hierarchy Structure

    Get PDF
    Cascading failures in the command and control networks (C2 networks) could substantially affect the network invulnerability to some extent. In particular, without considering the characteristics of hierarchy structure, it is quite misleading to employ the existing cascading failure models and effectively analyze the invulnerability of C2 networks. Therefore, a novel cascading failure model for command and control networks with hierarchy structure is proposed in this paper. Firstly, a method of defining the node’s initial load in C2 networks based on hierarchy-degree is proposed. By applying the method, the impact of organizational positions and the degree of the node on its initial load could be highlighted. Secondly, a nonuniform adjustable load redistribution strategy (NALR strategy) is put forward in this paper. More specifically, adjusting the redistribution coefficient could allocate the load from failure nodes to the higher and the same level neighboring nodes according to different proportions. It could be demonstrated by simulation results that the robustness of C2 networks against cascading failures could be dramatically improved by adjusting the initial load adjustment coefficient, the tolerance parameter, and the load redistribution coefficient. And finally, comparisons with other relational models are provided to verify the rationality and effectiveness of the model proposed in this paper. Subsequently, the invulnerability of C2 networks could be enhanced

    Identification of Two Vulnerability Features: A New Framework for Electrical Networks Based on the Load Redistribution Mechanism of Complex Networks

    Get PDF
    This paper proposes a new framework to analyze two vulnerability features, impactability and susceptibility, in electrical networks under deliberate attacks based on complex network theory: these two features are overlooked but vital in vulnerability analyses. To analyze these features, metrics are proposed based on correlation graphs constructed via critical paths, which replace the original physical network. Moreover, we analyze the relationship between the proposed metrics according to degree from the perspective of load redistribution mechanisms by adjusting parameters associated with the metrics, which can change the load redistribution rules. Finally, IEEE 118- and 300-bus systems and a realistic large-scale French grid are used to validate the effectiveness of the proposed metrics

    Mitigation of cascade failures in complex networks: theory and application

    Get PDF
    Complex networks such as transportation networks, the Internet, and electrical power grids are fundamental parts of modern life, and their robustness under any attack or fault has always been a concern. Failure and intentional removal of components in complex networks might affect the flow of information and change balance of flows in the network. This phenomenon may require load redistribution all over the network. Component overloaded can act as a trigger for a chain of overload failures. This overload, could, for example, increase the amount of information a router must transmit and ultimately make internet congestion. One of the major applications of complex network theory is to study power systems. Power systems are the most complex human-made infrastructures, and almost every individual's life is dependent on electrical energy and resilient functioning of power systems. Recently, there have been many reports about massive power outages leaving vast areas without power that sometimes takes a few days to have the power back. One of the most critical areas in the power system is the root cause analysis of such catastrophes and trying to resolve them. From an electrical engineering point of view, these power outages occur following an initial failure due to problems, such as generators tripping, transformers overheating, faulty power generation units, damage to the transmission system, substations or distribution systems, or overloading of the power system. A faulty protection relay or malicious attack to control centres can also trigger it. In any of these cases, the failed component will be out of service immediately and to keep the robust power delivery to all customers, their loads should be redistributed across the power system, and henceforth some of them might become overloaded as well, and accordingly get out of service. This chain of failures can be propagated all over the system and lead to a catastrophic blackout. This thesis conducts a full study on how to mitigate cascade failures in complex networks. First, cascade depth is applied to quantify nodes criticality for cascade failures. Then, a wide range of node centrality parameters is considered to find out the relationship between the node vitality and these centralities. To discover the structure of cascade propagation in complex networks, the edge geodesic distance is considered for computing the structural distance between two arbitrary edges in the network. Then, starting with the single edge removal events, the route that cascade tends to spread is studied. In the next step, the impact of two or three concurrent edge removals on the way the cascade spreads are examined. Besides, the power system vulnerability is studied using the maximum flow algorithm based on Ford-Fulkerson method and critical capacity parameters are identified. A synthetic model with the same properties as a real power system is generated and examined. For a power line, to be overloaded, a new method is developed to overpass across the network and shortlist the busbars for load reduction. Next, a novel sensitivity method is formulated based on AC load flow analysis to rank the loads according to their effect on the lines power flow

    Computation in Complex Networks

    Get PDF
    Complex networks are one of the most challenging research focuses of disciplines, including physics, mathematics, biology, medicine, engineering, and computer science, among others. The interest in complex networks is increasingly growing, due to their ability to model several daily life systems, such as technology networks, the Internet, and communication, chemical, neural, social, political and financial networks. The Special Issue “Computation in Complex Networks" of Entropy offers a multidisciplinary view on how some complex systems behave, providing a collection of original and high-quality papers within the research fields of: • Community detection • Complex network modelling • Complex network analysis • Node classification • Information spreading and control • Network robustness • Social networks • Network medicin

    Advances in Condition Monitoring, Optimization and Control for Complex Industrial Processes

    Get PDF
    The book documents 25 papers collected from the Special Issue “Advances in Condition Monitoring, Optimization and Control for Complex Industrial Processes”, highlighting recent research trends in complex industrial processes. The book aims to stimulate the research field and be of benefit to readers from both academic institutes and industrial sectors

    The structure and function of complex networks

    Full text link
    Inspired by empirical studies of networked systems such as the Internet, social networks, and biological networks, researchers have in recent years developed a variety of techniques and models to help us understand or predict the behavior of these systems. Here we review developments in this field, including such concepts as the small-world effect, degree distributions, clustering, network correlations, random graph models, models of network growth and preferential attachment, and dynamical processes taking place on networks.Comment: Review article, 58 pages, 16 figures, 3 tables, 429 references, published in SIAM Review (2003

    A Novel Load Capacity Model with a Tunable Proportion of Load Redistribution against Cascading Failures

    No full text
    Defence against cascading failures is of great theoretical and practical significance. A novel load capacity model with a tunable proportion is proposed. We take degree and clustering coefficient into account to redistribute the loads of broken nodes. The redistribution is local, where the loads of broken nodes are allocated to their nearest neighbours. Our model has been applied on artificial networks as well as two real networks. Simulation results show that networks get more vulnerable and sensitive to intentional attacks along with the decrease of average degree. In addition, the critical threshold from collapse to intact states is affected by the tunable parameter. We can adjust the tunable parameter to get the optimal critical threshold and make the systems more robust against cascading failures
    • …
    corecore