2010 8th IEEE International Conference on Industrial Informatics 2010
DOI: 10.1109/indin.2010.5549398
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing power network vulnerability with maximum flow based centrality approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
39
0
1

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 49 publications
(40 citation statements)
references
References 22 publications
0
39
0
1
Order By: Relevance
“…Therefore, it is not very suitable for the vulnerability analysis of large-scale power systems. As an alternative, the methods based on complex network theory have been proposed to assess the vulnerability of power systems in recent decades, which take both the electrical parameters and the topological characteristics of power systems into account in their analysis [18]. This method originated from graph theory and studies the subject systems from the point of view of structure and dynamic function of an array of nodes and lines without heavily relying on the system dimensionality [3], which makes it very suitable for the analysis of large-scale systems.…”
Section: Case Study 5: Comparison With the Conventional Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…Therefore, it is not very suitable for the vulnerability analysis of large-scale power systems. As an alternative, the methods based on complex network theory have been proposed to assess the vulnerability of power systems in recent decades, which take both the electrical parameters and the topological characteristics of power systems into account in their analysis [18]. This method originated from graph theory and studies the subject systems from the point of view of structure and dynamic function of an array of nodes and lines without heavily relying on the system dimensionality [3], which makes it very suitable for the analysis of large-scale systems.…”
Section: Case Study 5: Comparison With the Conventional Methodsmentioning
confidence: 99%
“…This method originated from graph theory and studies the subject systems from the point of view of structure and dynamic function of an array of nodes and lines without heavily relying on the system dimensionality [3], which makes it very suitable for the analysis of large-scale systems. However, as discussed above, most of the existing literature on this issue [3] and [11][12][13][14][15][16][17][18] rigorously requires that the weight of each link must be known and does not consider the system's controllability, which seriously limits its applications in real systems. Compared with the conventional methods mentioned above, the method in this paper presented a new way to analyze the vulnerability of power systems by considering the system structure controllability, which is suitable to assessing the vulnerability of large-scale power systems as it does not contain complex operations.…”
Section: Case Study 5: Comparison With the Conventional Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…In reference [8], Fang summarized the application status complex network theory in the identification of vulnerable lines, and points out that the assumption that the information flows just along the shortest path in complex network theory is not consistent with the actual situation of the power grid. Therefore, some researchers introduce the maximum flow theory into the power grid, which can search for the maximum transmission flow between the source and the nodes on the path, so the physical meaning is more consistent with the operation law of the grid [9][10]. The other is the state vulnerability analysis of power grid based on entropy theory, which can take the distribution characteristic of power flow under the disturbances of overload and breakage of line into consideration [11][12].…”
Section: Introductionmentioning
confidence: 99%