Journal articles on the topic 'Power system vulnerability'

To see the other types of publications on this topic, follow the link: Power system vulnerability.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Power system vulnerability.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Wang, Bo, Da Hai You, and Xiang Gen Yin. "Research on Vulnerability Assessment System of Complicated Power System." Advanced Materials Research 204-210 (February 2011): 622–26. http://dx.doi.org/10.4028/www.scientific.net/amr.204-210.622.

Full text
Abstract:
The factors which lead to large-area power outages are more than ever, when the complexity of the expansion power system is increasing. Therefore, it is important to assess the vulnerability of the complicated power system. This paper first proposes an objective, practical and adaptive vulnerability assessment system of complicated power system by use of Analytic Hierarchy Process, which based on multi-factors analysis of large-area outages. This system can find out the vulnerability point of the power system,and take advantages of the government, who can over-all plan, correspond and organize the social resource to reduce the vulnerability of power system and prevent large-area power outages, and the power enterprises who can maintaining the stability of power system by technology. Finally, the paper gives an assessment example of provincial power system.
APA, Harvard, Vancouver, ISO, and other styles
2

Teng, Jen-Hao, Ivan Curtis Martinez, and Chia-Yen Chen. "Utilising energy storage systems to mitigate power system vulnerability." IET Generation, Transmission & Distribution 7, no. 7 (July 1, 2013): 790–98. http://dx.doi.org/10.1049/iet-gtd.2012.0694.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Doorman, G. L., K. Uhlen, G. H. Kjolle, and E. S. Huse. "Vulnerability Analysis of the Nordic Power System." IEEE Transactions on Power Systems 21, no. 1 (February 2006): 402–10. http://dx.doi.org/10.1109/tpwrs.2005.857849.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Luo, Fucai, Jingyi Xie, Jingdong Guo, Wenliang Liu, Jindong He, and Hang Zhang. "Vulnerability Detection System for Power Information Based on Network Traffic Identification Technology." Journal of Physics: Conference Series 2401, no. 1 (December 1, 2022): 012042. http://dx.doi.org/10.1088/1742-6596/2401/1/012042.

Full text
Abstract:
Abstract A power information vulnerability detection system has the problem of a low network survival rate. Therefore, a power information vulnerability detection system based on network traffic identification technology is designed. In the hardware part, the memory is configured as a synchronous interface and 4 DRAMs, and the level input and output power of the chip are kept in a state compatible with LVTTL levels; in the software part, the power information network indicators are obtained, the importance of network elements is reflected through a mesoscope, the failure characteristics of components are extracted using network traffic identification technology, a critical area is delineated, and the port protocols and association libraries of the passages are matched to optimize the system vulnerability detection function. Through analysis of the simulation results, it can be obtained that the network survival rate of the power information vulnerability detection system in this paper is 17.657% and 17.931% higher than that obtained by the other two power information vulnerability detection systems, respectively, indicating that the designed power information vulnerability detection system is more effective when fully integrated with network traffic identification techniques.
APA, Harvard, Vancouver, ISO, and other styles
5

Sun, Meng, Qi Wang, Jue He, Huailin Huang, Yu Huang, Xiaojie Shen, Yaohui Xiao, and Suchun Fan. "Research on automatic scanning method of network vulnerabilities in power system." Journal of Physics: Conference Series 2290, no. 1 (June 1, 2022): 012036. http://dx.doi.org/10.1088/1742-6596/2290/1/012036.

Full text
Abstract:
Abstract Power system network is an important guarantee for the smooth operation of power enterprises. Considering the current automatic network vulnerability scanning method of power system, the detection rate of network vulnerability scanning is low due to its poor scheduling ability. Therefore, this paper designs a new automatic scanning method for network vulnerabilities in power system. According to the infrastructure of power system network vulnerability scanner, the power system web page interaction behavior recognition model is constructed to complete the power system web page interaction behavior recognition. On this basis, the power system network scanning scheduling algorithm is designed. Combined with genetic algorithm, the variation process of power system network vulnerabilities is determined, the power system network security situation is determined, the power system network scanning scheduling and vulnerability mining are realized, and the design of power system network leakage automatic scanning method is completed. The experimental link is constructed to verify this method. The verification shows that this method can effectively improve the detection rate of network vulnerability scanning and the efficiency of vulnerability scanning to a certain extent.
APA, Harvard, Vancouver, ISO, and other styles
6

Padhee, Malhar, Reetam Sen Biswas, Anamitra Pal, Kaustav Basu, and Arunabha Sen. "Identifying Unique Power System Signatures for Determining Vulnerability of Critical Power System Assets." ACM SIGMETRICS Performance Evaluation Review 47, no. 4 (April 30, 2020): 8–11. http://dx.doi.org/10.1145/3397776.3397779.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Samanta, Shouvik Kumar, and Chandan Kumar Chanda. "Smart power grid vulnerability analysis in composite system through power grid modelling." International Journal of Applied Power Engineering (IJAPE) 10, no. 1 (March 1, 2021): 11. http://dx.doi.org/10.11591/ijape.v10.i1.pp11-20.

Full text
Abstract:
<p>Though the number of traditional literature reviews most of the researchers in this area have concluded that modern intelligent electric network a referred standard new model which is considering for proposed power flow model analysis of Smart power grid vulnerability through composite network. By the theorem of Max-Flow and complex power network theorems that are represented the advance vulnerability indices for pick out endangered lines of the smart grid network. In other hand, the power flow model and existing models simulation are examined on the IEEE 39-bus test model. The results of the simulation introduced that the proposed concept of grid model, estimation and the index application are more adequate in smart grid weakness power and efficiency analysis. In this paper briefly summarize the methods and probabilities of a vulnerability index which was explained in specific in references. Therefore, it is imperative to further implement new models and new tools so as to reach the novel state and moderate the huge or massive potential shutoff.</p>
APA, Harvard, Vancouver, ISO, and other styles
8

Haidar, Ahmed M. A., Azah Mohamed ., and Aini Hussain . "New Method for Vulnerability Assessment of Power System." Journal of Applied Sciences 7, no. 6 (March 1, 2007): 841–47. http://dx.doi.org/10.3923/jas.2007.841.847.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lopez-Lezama, Jesus M., Juan J. Cortina, and Nicolas Munoz Galeano. "Assessment of power system vulnerability using metaheuristic techniques." Contemporary Engineering Sciences 11, no. 24 (2018): 1165–84. http://dx.doi.org/10.12988/ces.2018.8399.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kubacki, Krzysztof, Dariusz Siemieniako, and Linda Brennan. "Building positive resilience through vulnerability analysis." Journal of Social Marketing 10, no. 4 (June 27, 2020): 471–88. http://dx.doi.org/10.1108/jsocm-09-2019-0142.

Full text
Abstract:
Purpose The purpose of this paper is to propose an integrative framework for vulnerability analysis in social marketing systems by identifying, investigating and problematising the relationships among several interrelated concepts, including power, power asymmetry, vulnerability and resilience, in the context of social marketing systems. Design/methodology/approach This is a conceptual paper synthesising literature from social marketing, sociology and marketing management. Findings The main outcome of the discussion is a proposed integrative framework for vulnerability analysis. The framework identifies the main groups of stakeholders within a social marketing system and the bases for their power and consequential power asymmetries. It focusses on the types and states of vulnerability to identify the distinct characteristics of the social conditions of vulnerability for micro-level system actors. It leads to building positive resilience through efforts aiming to change the power asymmetries at the downstream, midstream and upstream levels. Originality/value The integrative framework for vulnerability analysis answers the call from Wood (2019) for the development of practical approaches to better understand resilience-building approaches in social marketing programmes. The framework provides reconciliation for diverse dimensions of vulnerability as a natural characteristic of all social marketing systems and as a universal, constant and inherent social condition.
APA, Harvard, Vancouver, ISO, and other styles
11

Yulianto, B. A., I. G. Sudjatmiko, A. Octavian, and I. N. Putra. "A hybrid multi-criteria decision-making and system dynamics approach in vulnerability analysis of TNI-POLRI power." Decision Science Letters 11, no. 4 (2022): 455–72. http://dx.doi.org/10.5267/j.dsl.2022.6.004.

Full text
Abstract:
This study analyzes the vulnerability of the power relations between the Indonesian National Armed Forces and the Indonesian National Police (TNI-Polri power relations) post-1998 Reform. This article employed exploratory sequential mixed methods in answering the research problem. Analytical Hierarchy Process (AHP) and System Dynamics methods were utilized in the study. Based on the research results, the variables of Socio-Economic (SE) Vulnerability and Adaptive Capacity (AC) have the highest weight value of 0.329. Meanwhile, the variable of Institutional Vulnerability has the lowest weight, 0.142. Overall, the vulnerability value of TNI-Polri power relations post-1998 Reform was still in the Low Vulnerability category with a value of 1,699 (33.97%). The vulnerability value of TNI-Polri power relations in the next five years will increase from a score of 1.66 in 2022 to 1.74 in 2027 so that it will increase by 5% with the same category level, namely Low Vulnerability. This study is expected to strengthen TNI-Polri power relations in maintaining national political stability.
APA, Harvard, Vancouver, ISO, and other styles
12

Zheng, Wei, Run Dong Ge, Wen Ying Liu, Dan Dan Zhu, and Hui Yong Li. "Vulnerability Assessment for Large-Scale Wind Farm." Advanced Materials Research 1070-1072 (December 2014): 279–83. http://dx.doi.org/10.4028/www.scientific.net/amr.1070-1072.279.

Full text
Abstract:
Power system vulnerability is one new concept for power security as the extend of security in recent years. At present, the power system vulnerability research has obtained stage accomplishment. Meanwhile, the randomness and intermittence of the wind lead to the wind power output unsteady. It not only has a bad influence on the power system, but also makes wind farm vulnerability even more obvious. Based on this, vulnerability assessment is applied to large-scale wind farm in this paper. Vulnerability indexes of the bus in large-scale wind farm are put forward and prevention measures are also given and it will has reference meaning to the security enhance of both grid and wind farm.
APA, Harvard, Vancouver, ISO, and other styles
13

El-Sharkawi, Mohamed A. "Intelligent Techniques for Power Systems Vulnerability Assessment." Sultan Qaboos University Journal for Science [SQUJS] 7, no. 1 (June 1, 2002): 23. http://dx.doi.org/10.24200/squjs.vol7iss1pp23-29.

Full text
Abstract:
With power grids considered national security matters, the reliable operation of the system is of top priority to utilities. This concern is amplified by the utility’s deregulation, which increases the system’s openness while simultaneously decreasing the applied degree of control. Vulnerability Assessment (VA) deals with the power system’s ability to continue to provide service in case of an unforeseen catastrophic contingency. Such contingencies may include unauthorized tripping, breaks in communication links, sabotage or intrusion by external agents, human errors, natural calamities and faults. These contingencies could lead to a disruption of service to part or all of the system. The service disruption is known as outage or blackout. The paper outlines an approach by which feature extraction and boundary tracking can be implemented to achieve on line vulnerability assessment.
APA, Harvard, Vancouver, ISO, and other styles
14

Fouad, A. A., Qin Zhou, and V. Vittal. "System vulnerability as a concept to assess power system dynamic security." IEEE Transactions on Power Systems 9, no. 2 (May 1994): 1009–15. http://dx.doi.org/10.1109/59.317643.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Luo, Lingen, Bei Han, and Marti Rosas-Casals. "Network Hierarchy Evolution and System Vulnerability in Power Grids." IEEE Systems Journal 12, no. 3 (September 2018): 2721–28. http://dx.doi.org/10.1109/jsyst.2016.2628410.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Sanz, Fredy A., Juan M. Ramírez, and Rosa E. Correa. "Experimental design for a large power system vulnerability estimation." Electric Power Systems Research 121 (April 2015): 20–27. http://dx.doi.org/10.1016/j.epsr.2014.11.026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Li, Jianlan, and Shuhong Huang. "A vulnerability model for power system dynamic security assessment." International Journal of Electrical Power & Energy Systems 62 (November 2014): 59–65. http://dx.doi.org/10.1016/j.ijepes.2014.03.026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Piccinelli, Roberta, and Elisabeth Krausmann. "North Europe power transmission system vulnerability during extreme space weather." Journal of Space Weather and Space Climate 8 (2018): A03. http://dx.doi.org/10.1051/swsc/2017033.

Full text
Abstract:
Space weather driven by solar activity can induce geomagnetic disturbances at the Earth's surface that can affect power transmission systems. Variations in the geomagnetic field result in geomagnetically induced currents that can enter the system through its grounding connections, saturate transformers and lead to system instability and possibly collapse. This study analyzes the impact of extreme space weather on the northern part of the European power transmission grid for different transformer designs to understand its vulnerability in case of an extreme event. The behavior of the system was analyzed in its operational mode during a severe geomagnetic storm, and mitigation measures, like line compensation, were also considered. These measures change the topology of the system, thus varying the path of geomagnetically induced currents and inducing a local imbalance in the voltage stability superimposed on the grid operational flow. Our analysis shows that the North European power transmission system is fairly robust against extreme space weather events. When considering transformers more vulnerable to geomagnetic storms, only few episodes of instability were found in correspondence with an existing voltage instability due to the underlying system load. The presence of mitigation measures limited the areas of the network in which bus voltage instabilities arise with respect to the system in which mitigation measures are absent.
APA, Harvard, Vancouver, ISO, and other styles
19

Oyola-Yeroaiel, Arthur, and Jennifer Wilson. "Terrorism and System Failure: A Revisited Perspective of Current Development Paradigms." International Journal of Mass Emergencies & Disasters 21, no. 3 (November 2003): 25–40. http://dx.doi.org/10.1177/028072700302100303.

Full text
Abstract:
In this article we explore social vulnerability to terrorism based upon current development paradigms and the social complexities derived from- our evolutionary process. We argue that highly complex systems are the essence of accelerated development as well as the possible cause of our collapse as a society System complexity in and of itself could very well be modern society's principal vulnerability to terrorism with the possible outcome of a generalized failure resulting in a. national disaster. To obtain vulnerability reduction we suggest that American society move toward a new stage of development accentuating redundancy and independence of crucial system functions. We recommend that business and resource consolidation and the centralization of power paradigm give way to developmental strategies of decentralized power and dispersed resource allocation. We utilized the Twin Towers incident to analyze our evolutionary developmental process and the vulnerability of our complex society and to revisit the working definition of disaster in the reality of highly complex systems.
APA, Harvard, Vancouver, ISO, and other styles
20

Guo, Ran, Weijie Chen, Lejun Zhang, Guopeng Wang, and Huiling Chen. "Smart Contract Vulnerability Detection Model Based on Siamese Network (SCVSN): A Case Study of Reentrancy Vulnerability." Energies 15, no. 24 (December 19, 2022): 9642. http://dx.doi.org/10.3390/en15249642.

Full text
Abstract:
Blockchain technology is currently evolving rapidly, and smart contracts are the hallmark of the second generation of blockchains. Currently, smart contracts are gradually being used in power system networks to build a decentralized energy system. Security is very important to power systems and attacks launched against smart contract vulnerabilities occur frequently, seriously affecting the development of the smart contract ecosystem. Current smart contract vulnerability detection tools suffer from low correct rates and high false positive rates, which cannot meet current needs. Therefore, we propose a smart contract vulnerability detection system based on the Siamese network in this paper. We improved the original Siamese network model to perform smart contract vulnerability detection by comparing the similarity of two sub networks with the same structure and shared parameters. We also demonstrate, through extensive experiments, that the model has better vulnerability detection performance and lower false alarm rate compared with previous research results.
APA, Harvard, Vancouver, ISO, and other styles
21

Li, Yifan, Bo Wang, Hongxia Wang, Fuqi Ma, Hengrui Ma, Jiaxin Zhang, Yingchen Zhang, and Mohamed A. Mohamed. "An Effective Node-To-Edge Interdependent Network and Vulnerability Analysis for Digital Coupled Power Grids." International Transactions on Electrical Energy Systems 2022 (September 29, 2022): 1–13. http://dx.doi.org/10.1155/2022/5820126.

Full text
Abstract:
With the deep coupling between the cyber side and the physical side of power systems, the failure of any link of both sides may lead to power outages, so it is necessary to analyze their vulnerability and vulnerable links for targeted improvement of systems. By dynamically attacking the coupled network nodes, this paper proposes a multilevel model and node-to-edge cyber-physical power system and the corresponding indexes system to analyze the vulnerability of the coupled power grid and its key components. The results showed that in the order of the indexes proposed in this paper, attacking surviving power nodes and cyber nodes results in a network crash rate of 25.0% and 66.7% faster than that in the order of “betweenness” and that attacking surviving cyber nodes results in a network crash rate of 89.4% faster than that in the order of “degree.” In terms of attacking power nodes, the index proposed in this paper has the same rate as “degree.” Therefore, the proposed model can better describe the vulnerability of the power grid to withstand attacks.
APA, Harvard, Vancouver, ISO, and other styles
22

Zhang, Meng, Liang HUA Zheng, Tao Lin, Hua Long Wang, and Fei Fang. "Pattern Recognition Based on Integrative Vulnerability Mode for Elcctric Power Grid." Applied Mechanics and Materials 291-294 (February 2013): 2212–16. http://dx.doi.org/10.4028/www.scientific.net/amm.291-294.2212.

Full text
Abstract:
In recent years, with the happening of large-scale power cut accidents, the electric network has been concerned widely increasingly. Pattern recognition which could be used in online analysis, can get rid of the mode limit of the operation characteristic of description system, and its counting volume is less influenced by system scale, also its general assessment is in a fast speed. In this text, it elaborates the conception of the power grid vulnerability and some kinds of available ways of assessing vulnerability, and it also tells us the target of electric network’s integrative vulnerability based on integrative vulnerability mode for electric power grid, and used in pattern recognition, which its the sensibility and necessity of pattern recognition has been verified by the IEEE-39 system.
APA, Harvard, Vancouver, ISO, and other styles
23

Basya, Fahmi, Mardi Hardjanto, and Ikbal Permana Putra. "SHA512 and MD5 Algorithm Vulnerability Testing Using Common Vulnerability Scoring System (CVSS)." Buana Information Technology and Computer Sciences (BIT and CS) 3, no. 1 (January 19, 2022): 1–4. http://dx.doi.org/10.36805/bit-cs.v3i1.2046.

Full text
Abstract:
This paper discusses the comparison of the results of testing the OTP (One Time Password) algorithm on two encryptions, namely SHA512 and MD5 which are applied to the Reconciliation Application of the Dinas Pemberdayaan Masyarakat dan Desa Kabupaten Sukabumi. This study uses the Vulnerability Assessment and Penetration Testing (VAPT) method, which combines two forms of vulnerability testing to achieve a much more complete vulnerability analysis by performing different tasks in the same focus area. The vulnerability assessment uses the Common Vulnerability Scoring System (CVSS) method. The results showed that the Vulnerability Assessment and Penetration Testing (VAPT) method was proven to be able to identify the level of security vulnerability in the Reconciliation Application at the Dinas Pemberdayaan Masyarakat dan Desa Kabupaten Sukabumi with a vulnerability level score of 5.3 in the SHA512 environment with a medium rating and 7.5 in the MD5 environment. with high ratings. So, it can be concluded that the best algorithm for implementing OTP is SHA512
APA, Harvard, Vancouver, ISO, and other styles
24

Fan, Wen-Li, Quan-You Li, Ye-Qi Xiao, Xiao-Feng He, Yu-Ze Tong, Ping Hu, and Zhi-Bin Zeng. "Power system vulnerability analysis based on topological potential field theory." Physica Scripta 96, no. 12 (October 12, 2021): 125227. http://dx.doi.org/10.1088/1402-4896/ac2bda.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Park, Hyunsoo. "Institutional Vulnerability and Power System Disturbances in the United States." International Review of Public Administration 17, no. 2 (August 2012): 63–92. http://dx.doi.org/10.1080/12294659.2012.10805228.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Abedi, Amin, Ludovic Gaudard, and Franco Romerio. "Review of major approaches to analyze vulnerability in power system." Reliability Engineering & System Safety 183 (March 2019): 153–72. http://dx.doi.org/10.1016/j.ress.2018.11.019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Rout, Gyanendra Kumar, Tamalika Chowdhury, and Chandan Kumar Chanda. "Betweenness as a Tool of Vulnerability Analysis of Power System." Journal of The Institution of Engineers (India): Series B 97, no. 4 (June 21, 2016): 463–68. http://dx.doi.org/10.1007/s40031-016-0222-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Adachi, Takao, and Bruce R. Ellingwood. "Serviceability of earthquake-damaged water systems: Effects of electrical power availability and power backup systems on system vulnerability." Reliability Engineering & System Safety 93, no. 1 (January 2008): 78–88. http://dx.doi.org/10.1016/j.ress.2006.10.014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Zhang, Haiyan, Minfang Peng, Josep M. Guerrero, Xingle Gao, and Yanchen Liu. "Modelling and Vulnerability Analysis of Cyber-Physical Power Systems Based on Interdependent Networks." Energies 12, no. 18 (September 6, 2019): 3439. http://dx.doi.org/10.3390/en12183439.

Full text
Abstract:
The strong coupling between the power grid and communication systems may contribute to failure propagation, which may easily lead to cascading failures or blackouts. In this paper, in order to quantitatively analyse the impact of interdependency on power system vulnerability, we put forward a “degree–electrical degree” independent model of cyber-physical power systems (CPPS), a new type of assortative link, through identifying the important nodes in a power grid based on the proposed index–electrical degree, and coupling them with the nodes in a communication system with a high degree, based on one-to-one correspondence. Using the double-star communication system and the IEEE 118-bus power grid to form an artificial interdependent network, we evaluated and compare the holistic vulnerability of CPPS under random attack and malicious attack, separately based on three kinds of interdependent models: “degree–betweenness”, “degree–electrical degree” and “random link”. The simulation results demonstrated that different link patterns, coupling degrees and attack types all can influence the vulnerability of CPPS. The CPPS with a “degree–electrical degree” interdependent model proposed in this paper presented a higher robustness in the face of random attack, and moreover performed better than the degree–betweenness interdependent model in the face of malicious attack.
APA, Harvard, Vancouver, ISO, and other styles
30

Huang, Xun Cheng, Huan Qi, Xiao Pan Zhang, Li Fang Lu, and Yang Yu Hu. "Regional Vulnerability Analysis of Grid Structure." Applied Mechanics and Materials 419 (October 2013): 877–82. http://dx.doi.org/10.4028/www.scientific.net/amm.419.877.

Full text
Abstract:
Cascading failure of network features in power system is analyzed in this paper using complex network theory and method, and Central China power grid are analyzed in detail on the three kinds of attack forms (maximum load, the most generous attack and random attack) of regional vulnerability. It provides technical means for the prevention of cascading failure .
APA, Harvard, Vancouver, ISO, and other styles
31

Qu, Hui, Xing Xian, Shao Qian Ding, Shan Shan Wen, Tao Lin, and Fen Tao. "Research on Grid Structural Vulnerability Based on Improved Electrical Betweenness." Advanced Materials Research 1070-1072 (December 2014): 815–18. http://dx.doi.org/10.4028/www.scientific.net/amr.1070-1072.815.

Full text
Abstract:
The emergence of electricity transmission with farther transporting distance, extra-higher voltage and greater transporting power and the formation of the regional interconnected power grid have greatly increased the probability of blackout, this phenomenon has fully exposed the vulnerability of large-scale interconnected power systems. In this paper, Electrical betweenness based on load transfer coefficient is proposed to construct structural vulnerability assessment index. Meanwhile, it is verified that the method is rational and available by analysising the difference of the IEEE-39 system between three attack modes.
APA, Harvard, Vancouver, ISO, and other styles
32

Deyuan, Tian, Liu Rushan, Xia Xuyi, and Wang Zhenhui. "Seismic Vulnerability Assessment of Thermal Power Plants Based on Beta Function." Mathematical Problems in Engineering 2022 (April 13, 2022): 1–10. http://dx.doi.org/10.1155/2022/5799241.

Full text
Abstract:
The study on seismic vulnerability of thermal power plants is of great significance for seismic damage prevention of the electrical power system and risk analysis of seismic economic loss. This paper presented a study method for obtaining the seismic vulnerability matrix and vulnerability curve of thermal power plants based on beta function. Firstly, according to the study results of thermal power plants in American ATC-25 report, the expected values of seismic damage indexes of thermal power plants under different seismic intensities were calculated. It was assumed that the expected values of seismic damage indexes of substation and thermal power plant were the same, and the dispersion of distribution of seismic damage indexes was the same. Then, based on the actual seismic vulnerability matrix of substations obtained from statistics in Wenchuan earthquake, the seismic vulnerability matrix of thermal power plants under different seismic intensities was fitted by using the probability density function of beta distribution. Finally, the seismic vulnerability curve of the thermal power plant based on peak ground acceleration (PGA) was obtained by using the cumulative function curve of standard lognormal distribution. The calculation results show that the seismic damage ratio calculated from the seismic vulnerability matrix of thermal power plants is basically consistent with the seismic damage ratio in ATC-25 report.
APA, Harvard, Vancouver, ISO, and other styles
33

Kolosok, Irina, and Liudmila Gurina. "Assessment of risks due to cyberattacks on information and communication infrastructure of cyber-physical system in the electric power system control." E3S Web of Conferences 139 (2019): 01026. http://dx.doi.org/10.1051/e3sconf/201913901026.

Full text
Abstract:
The paper proposes an approach to risk assessment in the electric power system control to identify possible failures in the electric power system functioning caused by cyberattacks on SCADA systems and WAMS. There is a large number of information, hardware and software factors, which increase the automated dispatching control system vulnerability to cyberattacks. The study shows the influence of unforeseen cyber-incidents in the information and communication infrastructure on electric power systems through false control actions on their physical part. The effectiveness of the developed risk assessment approach is demonstrated by its performance under uncertainty.
APA, Harvard, Vancouver, ISO, and other styles
34

Huang, Da Wei, and Ran He. "Analysis of Power Grid Vulnerability Based on Electrical Dissection Method." Applied Mechanics and Materials 448-453 (October 2013): 2564–68. http://dx.doi.org/10.4028/www.scientific.net/amm.448-453.2564.

Full text
Abstract:
As the power grid blackout accidents occur frequently, the vulnerability analysis becomes an important topic in power system analysis. A new electrical dissection method for the power grid vulnerability assessment is presented in this paper. The method can effectively reflect the power transmission between generator and load on the terminal of each line, and quantify the using relationship with the branch transmission power limit. An IEEE 39-bus text system was used to testify this method and the results indicated the methods efficiency and rationality. This paper is supported by NSFC 51307019.
APA, Harvard, Vancouver, ISO, and other styles
35

Wang, Tong, and Jing Ma. "Operation Betweenness Based Assessment on Overload Vulnerability." Applied Mechanics and Materials 373-375 (August 2013): 1378–83. http://dx.doi.org/10.4028/www.scientific.net/amm.373-375.1378.

Full text
Abstract:
An operation betweenness based method to assess overloaded lines is proposed. Based on electrical network theory, firstly the branch current sharing factors are deduced; then the operation betweenness of transmission line is defined; finally, on this basis the overload vulnerability of transmission line is assessed. In the proposed method, the impacts of both topological structure and operation modes of power network on vulnerability are considered for the assessment. The physical meaning of the proposed method is determinate and conforms to actual condition of power system, and this method avoids the defect in the complicated network model that the power flows only flow along the shortest path. The correctness of the proposed assessment method is verified by simulation results of IEEE 39-bus system.
APA, Harvard, Vancouver, ISO, and other styles
36

Li, Yuancheng, and Shengnan Chu. "Construction and reduction methods of vulnerability index system In power SCADA." International Journal of Security and Its Applications 8, no. 6 (November 30, 2014): 335–52. http://dx.doi.org/10.14257/ijsia.2014.8.6.29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Ouyang, Min, Min Xu, Chi Zhang, and Shitong Huang. "Mitigating electric power system vulnerability to worst-case spatially localized attacks." Reliability Engineering & System Safety 165 (September 2017): 144–54. http://dx.doi.org/10.1016/j.ress.2017.03.031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Kamwa, I., A. K. Pradhan, G. Joos, and S. R. Samantaray. "Fuzzy Partitioning of a Real Power System for Dynamic Vulnerability Assessment." IEEE Transactions on Power Systems 24, no. 3 (August 2009): 1356–65. http://dx.doi.org/10.1109/tpwrs.2009.2021225.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Anil, Ozgur, Sami Oguzhan Akbas, Erkan Kantar, and A. Cem Gel. "Vibration measurement and vulnerability analysis of a power plant cooling system." Smart Structures and Systems 11, no. 2 (February 25, 2013): 199–215. http://dx.doi.org/10.12989/sss.2013.11.2.199.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Arroyo, J. M. "Bilevel programming applied to power system vulnerability analysis under multiple contingencies." IET Generation, Transmission & Distribution 4, no. 2 (2010): 178. http://dx.doi.org/10.1049/iet-gtd.2009.0098.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Zhou, Ming, Jingyu Li, Shunyu Wu, Siwei Liu, Gengyin Li, and Jianqin Liu. "Vulnerability analysis of power system based on dynamic regional electrical coupling." International Transactions on Electrical Energy Systems 29, no. 1 (July 31, 2018): e2671. http://dx.doi.org/10.1002/etep.2671.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Novakovskiy, B. A., A. I. Prasolova, A. M. Karpachevskiy, and O. G. Filippova. "Mapping of isolated energy system structure: case study of Kamchatka Territory, Magadan and Sakhalin Regions." Geodesy and Cartography 923, no. 5 (June 20, 2017): 56–63. http://dx.doi.org/10.22389/0016-7126-2017-923-5-56-63.

Full text
Abstract:
The article describes a way to represent the structure of the energy system using an undirected weighted graph. It also considers the concept of structural vulnerability of the electrical grid as a key property affecting the reliability of power supply. We consider isolated energy systems of the Russian Far East, taking into account the differentiation in structural vulnerability within the networks of different types. For these purposes we propose the technique of designing and using geodatabase for the structural vulnerability assessment in the territories of the Kamchatka Territory, Magadan and Sakhalin regions. The designed technique is based on the use of open source data about power transmission lines (PTL), substations and power plants. Remote sensing data was also used. It is introduced a principle of zoning study area based on geoprocessing model. These maps were compared with some maps of crucial climatic parameters such as maximum wind speed and sleet deposits wall thickness.
APA, Harvard, Vancouver, ISO, and other styles
43

Li, Ding, Shuang Ya Zhou, Shun Tao, Jia Jia Xue, and Xiang Ning Xiao. "Application of Common Information Model in Analyzing the Area of Vulnerability to Voltage Sags." Applied Mechanics and Materials 241-244 (December 2012): 747–51. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.747.

Full text
Abstract:
The common information model CIM in IEC61970 standard is an abstract description of existing physical objects and their relationship in power system, which has been widely used in the construction of computer application systems of power system. In order to track the real-time operation state of power system when analyzing the area of vulnerability (AOV) to voltage sags, this paper proposes a novel method to obtain the data required by AOV analysis through parsing source data defined with CIM, and source data are from the SCADA system, equipment management system and management information system of safe production. The design scheme of AOV analysis using CIM is introduced, and method of parsing CIM is also provided. Finally, the method is applied to a regional power system of China, and graphic results of AOV are shown under balanced and unbalanced faults.
APA, Harvard, Vancouver, ISO, and other styles
44

Liu, Yanchen, Minfang Peng, Xingle Gao, and Haiyan Zhang. "Probabilistic Vulnerability Assessment of Transmission Lines Considering Cascading Failures." Processes 9, no. 11 (November 8, 2021): 1994. http://dx.doi.org/10.3390/pr9111994.

Full text
Abstract:
The prevention of cascading failures and large-scale power outages of power grids by identifying weak links has become one of the key topics in power systems research. In this paper, a vulnerability radius index is proposed to identify the initial fault, and a fault chain model of cascading failure is developed with probabilistic attributes to identify the set of fault chains that have a significant impact on the safe and stable operation of power grids. On this basis, a method for evaluating the vulnerability of transmission lines based on a multi-criteria decision analysis is proposed, which can quickly identify critical transmission lines in the process of cascading failure. Finally, the proposed model and method for identifying vulnerable lines during the cascading failure process is demonstrated on the IEEE-118 bus system.
APA, Harvard, Vancouver, ISO, and other styles
45

Bielby, William T. "Minority Vulnerability in Privileged Occupations." ANNALS of the American Academy of Political and Social Science 639, no. 1 (December 15, 2011): 13–32. http://dx.doi.org/10.1177/0002716211422338.

Full text
Abstract:
Building on recent work on contemporary forms of bias in meritocratic personnel systems, the author assesses sources of racial disadvantage in an output-based pay-for-performance system for compensating financial advisers in a large financial services firm. Using data from expert reports submitted in racial discrimination litigation, the author shows how racial differences in access to white wealth, limits on African Americans’ full participation in broker teams, racialized approaches to multicultural marketing, and diffuse lines of authority for diversity and nondiscrimination created racial barriers that were sustained and amplified by a cumulative advantage system for allocating productivity-enhancing resources. The author concludes with a discussion of management strategies for minimizing minority vulnerability in privileged professions and the challenges faced when the sources of bias are neither unconscious nor unintended but are instead located at least in part in racially segregated social relations and power differences among professionals who hold formally equivalent positions in a company’s job structure.
APA, Harvard, Vancouver, ISO, and other styles
46

Du, Zhi, Gang Wang, Da Hai You, Wei Hua Chen, Ke Wang, and Yang Zou. "A Novel Transmission Line Vulnerability Evaluation Method Based on Complex Network Theory." Applied Mechanics and Materials 494-495 (February 2014): 1866–69. http://dx.doi.org/10.4028/www.scientific.net/amm.494-495.1866.

Full text
Abstract:
As further development on the applications of CN (complex network) theory, evaluation of transmission line vulnerability requires the consideration of physical attributes of power system, instead of simply considering its topology features, which helps to deduce more precise predictions for the stability of power system. This paper introduces a novel and efficient evaluation method based on CN theory to evaluate influence of line faults to the static stability of power system, comprehensively considering the factors of system load level, power capacity utilization rate of transmission lines and worldlet features. The method is illustrated in the IEEE118 bus system.
APA, Harvard, Vancouver, ISO, and other styles
47

Tapia, Mariela, Pablo Thier, and Stefan Gößling-Reisemann. "Building resilient cyber-physical power systems." TATuP - Zeitschrift für Technikfolgenabschätzung in Theorie und Praxis 29, no. 1 (April 1, 2020): 23–29. http://dx.doi.org/10.14512/tatup.29.1.23.

Full text
Abstract:
Power systems are undergoing a profound transformation towards cyber- physical systems. Disruptive changes due to energy system transition and the complexity of the interconnected systems expose the power system to new, unknown, and unpredictable risks. To identify the critical points, a vulnerability assessment was conducted, involving experts from the power as well as the information and communication technologies (ICT) sectors. Weaknesses were identified, e. g., the lack of policy enforcement, which are worsened by the unreadiness of the actors involved. Due to the complex dynamics of ICT, it is infeasible to keep a complete inventory of potential stressors to define appropriate preparation and prevention mechanisms. Therefore, we suggest applying a resilience management approach to increase the resilience of the system. It aims at better riding through failures rather than building higher walls. We conclude that building resilience in cyber-physical power systems is feasible and helps in preparing for the unexpected.
APA, Harvard, Vancouver, ISO, and other styles
48

Alonso, Monica, Jaime Turanzas, Hortensia Amaris, and Angel T. Ledo. "Cyber-Physical Vulnerability Assessment in Smart Grids Based on Multilayer Complex Networks." Sensors 21, no. 17 (August 30, 2021): 5826. http://dx.doi.org/10.3390/s21175826.

Full text
Abstract:
In the last decade, the main attacks against smart grids have occurred in communication networks (ITs) causing the disconnection of physical equipment from power networks (OTs) and leading to electricity supply interruptions. To deal with the deficiencies presented in past studies, this paper addresses smart grids vulnerability assessment considering the smart grid as a cyber-physical heterogeneous interconnected system. The model of the cyber-physical system is composed of a physical power network model and the information and communication technology network model (ICT) both are interconnected and are interrelated by means of the communication and control equipment installed in the smart grid. This model highlights the hidden interdependencies between power and ICT networks and contains the interaction between both systems. To mimic the real nature of smart grids, the interconnected heterogeneous model is based on multilayer complex network theory and scale-free graph, where there is a one-to-many relationship between cyber and physical assets. Multilayer complex network theory centrality indexes are used to determine the interconnected heterogeneous system set of nodes criticality. The proposed methodology, which includes measurement, communication, and control equipment, has been tested on a standardized power network that is interconnected to the ICT network. Results demonstrate the model’s effectiveness in detecting vulnerabilities in the interdependent cyber-physical system compared to traditional vulnerability assessments applied to power networks (OT).
APA, Harvard, Vancouver, ISO, and other styles
49

Chen, Yan, Yazhong Feng, Fan Zhang, and Lei Wang. "Assessing Water Resources Vulnerability by Using a Rough Set Cloud Model: A Case Study of the Huai River Basin, China." Entropy 21, no. 1 (December 24, 2018): 14. http://dx.doi.org/10.3390/e21010014.

Full text
Abstract:
Assessing water resources vulnerability is the foundation of local water resources management. However, as one of the major water systems in China, there is no existing evaluation index system that can effectively assess water resource vulnerability for the Huai River basin. To address this issue, we identified key vulnerability factors, constructed an evaluation index system, and applied such system to evaluate water resources vulnerability for the Huai River basin empirically in this paper. Specifically, our evaluation index system consists of 18 indexes selected from three different aspects: water shortage, water pollution, and water-related natural disaster. Then, the improved blind deletion rough set method was used to reduce the size of the evaluation index while keep the evaluation power. In addition, the improved conditional information entropy rough set method was employed to calculate the weights of evaluation indexes. Based on the reduced index system and calculated weights, a rough set cloud model was applied to carry out the vulnerability evaluation. The empirical results show that the Huai River basin water resources were under severe vulnerability conditions for most of the time between 2000 and 2016, and the Most Stringent Water Resources Management System (MS-WRMS) established in 2012 did not work effectively as expected.
APA, Harvard, Vancouver, ISO, and other styles
50

Omoroghomwan, A. E., S. O. Igbinovia, and F. O. Odiase. "Vulnerability Assessment of Components in a Typical Rural Nigerian Power Distribution System." March 2021 5, no. 1 (March 2021): 32–46. http://dx.doi.org/10.36263/nijest.2021.01.0237.

Full text
Abstract:
The major aim of any power system is the continuous provision of safe, quality and reliable electric power to the customers. One of the greatest challenges to meeting up with this goal is the failure of components in the system. In this article, the frequency of outages caused by failure of different components in the distribution system was investigated to ascertain the ones that are more susceptible to failure by comparing their proportions in the entire failure events. The outage data obtained from Irrua Transmission Station comprising Ehor, Ubiaja and Uzebba 33kV feeders were analyzed using Microsoft Excel while the hazard rates were measured using the failure rate index. Findings revealed that 93.77% of all the forced outages in the distribution subsystem in the power sector are caused by the high exposure rate of the bare aluminum conductors used in the construction of the various overhead feeders. Subsequently, the yearly failure rates of aluminum conductors, cross arms, relay, insulators, fuses, electric poles, breakers, transformers, isolators, cables lightning surge arresters were found to be 836.0, 17.5, 17.0, 10.3, 4.3, 2.0, 1.5, 1.3, 1.0, 0.5 and 0.3 respectively in the studied network. A comparison between this study and a related work showed that the rural feeders are more prone to faults as compared to the ones in the urban areas. It was therefore recommended that regular tree trimming along the network corridor should be done. Proper conductor size should be used in every subsequent construction and every segment with undersized conductor should be replaced with the appropriate size. This study will help the power system engineers in the design, construction, maintenance and operation of the distribution power system for optimum and improved system performance.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography