11 research outputs found

    Robust Bayesian Regression Model of Centrality and Voltage Stability Index for Power Networks under Nodal Attack

    Get PDF
    This is the author accepted manuscript. The final version is available from IEEE via the DOI in this recordElectrical node centrality for the power networks is an essential parameter to identify the critical nodes under attack. Topological analysis is vital for evaluating the network robustness while electrical characteristics have to be considered to make the analysis consistent for realistic power networks. However, the capacity limit of the power network changes under various nodal attacks. It is essential to find the relationship between the loading margin limit of the power network with the node centrality features, so that appropriate measures can be considered to improve the robustness of the power networks. Thus, voltage stability index (VSI) is defined for every node, and its centrality features are modelled. Robust Bayesian regression is used to model the nodes responsible for a change in loading margin and causing grid blackout. The method has been validated on benchmark complex power networks like reduced Great Britain network, IEEE 57-bus and IEEE 118-bus systems

    Analysis and Actions on Graph Data.

    Full text link
    Graphs are commonly used for representing relations between entities and handling data processing in various research fields, especially in social, cyber and physical networks. Many data mining and inference tasks can be interpreted as certain actions on the associated graphs, including graph spectral decompositions, and insertions and removals of nodes or edges. For instance, the task of graph clustering is to group similar nodes on a graph, and it can be solved by graph spectral decompositions. The task of cyber attack is to find effective node or edge removals that lead to maximal disruption in network connectivity. In this dissertation, we focus on the following topics in graph data analytics: (1) Fundamental limits of spectral algorithms for graph clustering in single-layer and multilayer graphs. (2) Efficient algorithms for actions on graphs, including graph spectral decompositions and insertions and removals of nodes or edges. (3) Applications to deep community detection, event propagation in online social networks, and topological network resilience for cyber security. For (1), we established fundamental principles governing the performance of graph clustering for both spectral clustering and spectral modularity methods, which play an important role in unsupervised learning and data science. The framework is then extended to multilayer graphs entailing heterogeneous connectivity information. For (2), we developed efficient algorithms for large-scale graph data analytics with theoretical guarantees, and proposed theory-driven methods for automatic model order selection in graph clustering. For (3), we proposed a disruptive method for discovering deep communities in graphs, developed a novel method for analyzing event propagation on Twitter, and devised effective graph-theoretic approaches against explicit and lateral attacks in cyber systems.PHDElectrical & Computer Eng PhDUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttp://deepblue.lib.umich.edu/bitstream/2027.42/135752/1/pinyu_1.pd

    Towards Name Disambiguation: Relational, Streaming, and Privacy-Preserving Text Data

    Get PDF
    In the real world, our DNA is unique but many people share names. This phenomenon often causes erroneous aggregation of documents of multiple persons who are namesakes of one another. Such mistakes deteriorate the performance of document retrieval, web search, and more seriously, cause improper attribution of credit or blame in digital forensics. To resolve this issue, the name disambiguation task 1 is designed to partition the documents associated with a name reference such that each partition contains documents pertaining to a unique real-life person. Existing algorithms for this task mainly suffer from the following drawbacks. First, the majority of existing solutions substantially rely on feature engineering, such as biographical feature extraction, or construction of auxiliary features from Wikipedia. However, for many scenarios, such features may be costly to obtain or unavailable in privacy sensitive domains. Instead we solve the name disambiguation task in restricted setting by leveraging only the relational data in the form of anonymized graphs. Second, most of the existing works for this task operate in a batch mode, where all records to be disambiguated are initially available to the algorithm. However, more realistic settings require that the name disambiguation task should be performed in an online streaming fashion in order to identify records of new ambiguous entities having no preexisting records. Finally, we investigate the potential disclosure risk of textual features used in name disambiguation and propose several algorithms to tackle the task in a privacy-aware scenario. In summary, in this dissertation, we present a number of novel approaches to address name disambiguation tasks from the above three aspects independently, namely relational, streaming, and privacy preserving textual data
    corecore