3,673 research outputs found

    Multitask Learning on Graph Neural Networks: Learning Multiple Graph Centrality Measures with a Unified Network

    Full text link
    The application of deep learning to symbolic domains remains an active research endeavour. Graph neural networks (GNN), consisting of trained neural modules which can be arranged in different topologies at run time, are sound alternatives to tackle relational problems which lend themselves to graph representations. In this paper, we show that GNNs are capable of multitask learning, which can be naturally enforced by training the model to refine a single set of multidimensional embeddings ∈Rd\in \mathbb{R}^d and decode them into multiple outputs by connecting MLPs at the end of the pipeline. We demonstrate the multitask learning capability of the model in the relevant relational problem of estimating network centrality measures, focusing primarily on producing rankings based on these measures, i.e. is vertex v1v_1 more central than vertex v2v_2 given centrality cc?. We then show that a GNN can be trained to develop a \emph{lingua franca} of vertex embeddings from which all relevant information about any of the trained centrality measures can be decoded. The proposed model achieves 89%89\% accuracy on a test dataset of random instances with up to 128 vertices and is shown to generalise to larger problem sizes. The model is also shown to obtain reasonable accuracy on a dataset of real world instances with up to 4k vertices, vastly surpassing the sizes of the largest instances with which the model was trained (n=128n=128). Finally, we believe that our contributions attest to the potential of GNNs in symbolic domains in general and in relational learning in particular.Comment: Published at ICANN2019. 10 pages, 3 Figure

    Power grid-oriented cascading failure vulnerability identifying method based on wireless sensors

    Get PDF
    In our paper, we study the vulnerability in cascading failures of the real-world network (power grid) under intentional attacks. Here, we use three indexes (B, K, k-shell) to measure the importance of nodes; that is, we define three attacks, respectively. Under these attacks, we measure the process of cascade effect in network by the number of avalanche nodes, the time steps, and the speed of the cascade propagation. Also, we define the node’s bearing capacity as a tolerant parameter to study the robustness of the network under three attacks. Taking the power grid as an example, we have obtained a good regularity of the collapse of the network when the node’s affordability is low. In terms of time and speed, under the betweenness-based attacks, the network collapses faster, but for the number of avalanche nodes, under the degree-based attack, the number of the failed nodes is highest. When the nodes’ bearing capacity becomes large, the regularity of the network’s performances is not obvious. The findings can be applied to identify the vulnerable nodes in real networks such as wireless sensor networks and improve their robustness against different attacks

    Geodesic vulnerability approach for identification of critical buses in power systems

    Get PDF
    One of the most critical issues in the evaluation of power systems is the identification of critical buses. For this purpose, this paper proposes a new methodology that evaluates the substitution of the power flow technique by the geodesic vulnerability index to identify critical nodes in power grids. Both methods are applied comparatively to demonstrate the scope of the proposed approach. The applicability of the methodology is illustrated using the IEEE 118-bus test system as a case study. To identify the critical components, a node is initially disconnected, and the performance of the resulting topology is evaluated in the face of simulations for multiple cascading faults. Cascading events are simulated by randomly removing assets on a system that continually changes its structure with the elimination of each component. Thus, the classification of the critical nodes is determined by evaluating the resulting performance of 118 different topologies and calculating the damage area for each of the disintegration curves of cascading failures. In summary, the feasibility and suitability of complex network theory are justified to identify critical nodes in power systems

    A Quick Framework for Evaluating Worst Robustness of Complex Networks

    Full text link
    Robustness is pivotal for comprehending, designing, optimizing, and rehabilitating networks, with simulation attacks being the prevailing evaluation method. Simulation attacks are often time-consuming or even impractical, however, a more crucial yet persistently overlooked drawback is that any attack strategy merely provides a potential paradigm of disintegration. The key concern is: in the worst-case scenario or facing the most severe attacks, what is the limit of robustness, referred to as ``Worst Robustness'', for a given system? Understanding a system's worst robustness is imperative for grasping its reliability limits, accurately evaluating protective capabilities, and determining associated design and security maintenance costs. To address these challenges, we introduce the concept of Most Destruction Attack (MDA) based on the idea of knowledge stacking. MDA is employed to assess the worst robustness of networks, followed by the application of an adapted CNN algorithm for rapid worst robustness prediction. We establish the logical validity of MDA and highlight the exceptional performance of the adapted CNN algorithm in predicting the worst robustness across diverse network topologies, encompassing both model and empirical networks.Comment: 30 pages, 8figures, 4tables,journa

    Cascading Outages Detection and Mitigation Tool to Prevent Major Blackouts

    Get PDF
    Due to a rise of deregulated electric market and deterioration of aged power system infrastructure, it become more difficult to deal with the grid operating contingencies. Several major blackouts in the last two decades has brought utilities to focus on development of Wide Area Monitoring, Protection and Control (WAMPAC) systems. Availability of common measurement time reference as the fundamental requirement of WAMPAC system is attained by introducing the Phasor Measurement Units, or PMUs that are taking synchronized measurements using the GPS clock signal. The PMUs can calculate time-synchronized phasor values of voltage and currents, frequency and rate of change of frequency. Such measurements, alternatively called synchrophasors, can be utilized in several applications including disturbance and islanding detection, and control schemes. In this dissertation, an integrated synchrophasor-based scheme is proposed to detect, mitigate and prevent cascading outages and severe blackouts. This integrated scheme consists of several modules. First, a fault detector based on electromechanical wave oscillations at buses equipped with PMUs is proposed. Second, a system-wide vulnerability index analysis module based on voltage and current synchrophasor measurements is proposed. Third, an islanding prediction module which utilizes an offline islanding database and an online pattern recognition neural network is proposed. Finally, as the last resort to interrupt series of cascade outages, a controlled islanding module is developed which uses spectral clustering algorithm along with power system state variable and generator coherency information

    Intelligent Novel Methods for Identifying Critical Components and Their Combinations for Hypothesized Cyber-physical Attacks Against Electric Power Grids

    Get PDF
    As a revolutionary change to the traditional power grid, the smart grid is expected to introduce a myriad of noteworthy benefits by integrating the advanced information and communication technologies in terms of system costs, reliability, environmental impacts, operational flexibility, etc. However, the wider deployment of cyber networks in the power grid will bring about important issues on power system cyber security. Meanwhile, the power grid is becoming more vulnerable to various physical attacks due to vandalism and probable terrorist attacks. In an envisioned smart grid environment, attackers have more entry points to various parts of the power grid for launching a well-planned and highly destructive attack in a coordinated manner. Thus, it is important to address the smart grid cyber-physical security issues in order to strengthen the robustness and resiliency of the smart grid in the face of various adverse events. One key step of this research topic is to efficiently identify the vulnerable parts of the smart grid. In this thesis, from the perspective of smart grid cyber-physical security, three critical component combination identification methods are proposed to reveal the potential vulnerability of the smart grid. First, two performance indices based critical component combination recognition methods are proposed for more effectively identifying the critical component combinations in the multi-component attack scenarios. The optimal selection of critical components is determined according to the criticality of the components, which can be modeled by various performance indices. Further, the space-pruning based enumerative search strategy is investigated to comprehensively and effectively identify critical combinations of multiple same or different types of components. The pruned search space is generated based on the criticality of potential target component which is obtained from low-order enumeration data. Specifically, the combinatorial line-generator attack strategy is investigated by exploring the strategy for attacking multiple different types of components. Finally, an effective, novel approach is proposed for identifying critical component combinations, which is termed search space conversion and reduction strategy based intelligent search method (SCRIS). The conversion and reduction of the search space is achieved based on the criticality of the components which is obtained from an efficient sampling method. The classic intelligent search algorithm, Particle Swarm Optimization (PSO), is improved and deployed for more effectively identifying critical component combinations. MATLAB is used as the simulation platform in this study. The IEEE 30, 39, 118 and Polish 2383-bus systems are adopted for verifying the effectiveness of the proposed attack strategies. According to the simulation results, the proposed attack strategies turn out to be effective and computationally efficient. This thesis can provide some useful insight into vulnerability identification in a smart grid environment, and defensive strategies can be developed in view of this work to prevent malicious coordinated multi-component attacks which may initiate cascading failures in a cyber-physical environment

    Power system vulnerability and performance: application from complexity scienze and complex network

    Get PDF
    Power system has been acknowledged as a complex system owing to its complexity resulting from interactions of different layers which include physical layer like generators, transformers, substations and cyber layer like communication units and human decision layer. Complex network theory has been widely used to analyze the power grids from basic topological properties to statistic robustness analysis and dynamic resilience property. However, there are still many problems need to be addressed. This thesis will pay more attention on the application and extension of complexity science and complex network theory in power system analysis from different aspects
    • …
    corecore