2019
DOI: 10.1007/s42835-018-00082-w
|View full text |Cite
|
Sign up to set email alerts
|

Identification of Key Nodes Considering Different Roles of Power Businesses in Power Communication System and Power System

Abstract: In the power communication network, the importance of the power businesses are the key to evaluate the key nodes of the power communication system. As a special network of power system, when determining the importance of power businesses, the different roles of power businesses in power communication system and power system should be considered. Based on analytic hierarchy process (AHP), entropy weight method and weight degradation method, this paper presents a method to identify the key nodes of power communi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…The power IEEE33 node is selected as the test topology environment, and the specific structure is shown in Figure 4. In order to verify the effectiveness of the topological node tamper detection method proposed in this paper, the proposed method is compared with the power node detection method based on the improved PageRank algorithm proposed in [5] and the power node detection method based on comprehensive power flow tracking proposed in [6] As can be seen from Figure 5, the proposed method has a better time-consuming performance, because the method based on fuzzy graph theory in this paper can use fuzzy reasoning and fuzzy set theory to deal with imprecise and fuzzy data, reducing the calculation and processing that require high accuracy. Compared with traditional detection methods, this method can reduce the computational complexity and time consumption when dealing with large-scale and complex power system nodes.…”
Section: Experimental Researchmentioning
confidence: 99%
See 1 more Smart Citation
“…The power IEEE33 node is selected as the test topology environment, and the specific structure is shown in Figure 4. In order to verify the effectiveness of the topological node tamper detection method proposed in this paper, the proposed method is compared with the power node detection method based on the improved PageRank algorithm proposed in [5] and the power node detection method based on comprehensive power flow tracking proposed in [6] As can be seen from Figure 5, the proposed method has a better time-consuming performance, because the method based on fuzzy graph theory in this paper can use fuzzy reasoning and fuzzy set theory to deal with imprecise and fuzzy data, reducing the calculation and processing that require high accuracy. Compared with traditional detection methods, this method can reduce the computational complexity and time consumption when dealing with large-scale and complex power system nodes.…”
Section: Experimental Researchmentioning
confidence: 99%
“…An improved PageRank algorithm based system key node identification method was proposed [5]. Using the Jacobian matrix, the sensitivity equations of voltage and phase Angle in the power system are reconstructed and modified.…”
mentioning
confidence: 99%
“…R loss kj,Gi = P loss kj,Gi E Gi (25) From the above Equations ( 23)-( 25), the carbon emissions generated in all links can be equivalently converted and distributed in detail, and then after simple calculation, the carbon flow rate indicators, such as the node load carbon flow rate required in the carbon emission network, can be obtained.…”
Section: Carbon Flow Ratementioning
confidence: 99%
“…After sorting out the data of the original example, the active power vector of the unit P G = [0.7164, 1.6300, 0.8500] T , the node flowing power vector P = [0.7164, 1.2730, 0.9136, 1.4300, 1.0000, 0.8360, 1.6300, 0.8500, 0.7164] T , and related parameters such as branch power loss. The node load, branch, and network loss power can be calculated separately from Equations ( 8)- (20), then the corresponding carbon flow rate can be calculated from Equations ( 21)- (25), and finally, the required node carbon potential can be calculated from Equation (26). The calculation results of the required relevant carbon emission indicators are shown in Table 5.…”
Section: Node Importance Calculationmentioning
confidence: 99%
See 1 more Smart Citation