2017
DOI: 10.1016/j.physa.2017.04.031
|View full text |Cite
|
Sign up to set email alerts
|

Power system cascading risk assessment based on complex network theory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 41 publications
(18 citation statements)
references
References 15 publications
0
18
0
Order By: Relevance
“…The complex networks approach has been used to explore vulnerability and cascading collapse in several results see [170], [178] and the references within. In [178], a new method for the analysis of the power system vulnerability is proposed. Based on complex network theory and the Max-Flow theorem, a new vulnerability index is adopted to identify the vulnerable lines in a power grid.…”
Section: B New Stability Analysismentioning
confidence: 99%
“…The complex networks approach has been used to explore vulnerability and cascading collapse in several results see [170], [178] and the references within. In [178], a new method for the analysis of the power system vulnerability is proposed. Based on complex network theory and the Max-Flow theorem, a new vulnerability index is adopted to identify the vulnerable lines in a power grid.…”
Section: B New Stability Analysismentioning
confidence: 99%
“…This process is usually implemented by removing a node or multiple nodes in the network randomly or deliberately. These strategies have proved useful in the analysis of transportation networks [ 49 , 50 ], power grids [ 51 ], and critical infrastructure networks [ 52 ]. Herein, to prove the usefulness of the proposed multi-layer UAV swarming network for further analysis of robustness, a dynamic topology analysis is conducted by randomly removing a node in succession from the structure layer of the multi-layer networks and the single networks.…”
Section: Case Study Analysis and Discussionmentioning
confidence: 99%
“…In one network, although a number of nodes have the same vulnerability, node removal contributes various influences on the remained components. In literature [4], the node types and their locations are combined to further distinguish the most vulnerable node. If the nodes are in separate single loops, the node in the bigger single loop is more important than that of the smaller one.…”
Section: Evaluation Indexmentioning
confidence: 99%
“…Modern power systems are dynamical systems featured by complexity and nonlinearity. For simplifying the model complexity, the complex network theory and the graph theory are introduced to demonstrate the network dynamics [4]. Besides, the characteristics of complex networks can be used to analyze the impacts on cascading propagation [5].…”
Section: Introductionmentioning
confidence: 99%