Articles de revues sur le sujet « Power system vulnerability »

Pour voir les autres types de publications sur ce sujet consultez le lien suivant : Power system vulnerability.

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 50 meilleurs articles de revues pour votre recherche sur le sujet « Power system vulnerability ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.

1

Wang, Bo, Da Hai You et Xiang Gen Yin. « Research on Vulnerability Assessment System of Complicated Power System ». Advanced Materials Research 204-210 (février 2011) : 622–26. http://dx.doi.org/10.4028/www.scientific.net/amr.204-210.622.

Texte intégral
Résumé :
The factors which lead to large-area power outages are more than ever, when the complexity of the expansion power system is increasing. Therefore, it is important to assess the vulnerability of the complicated power system. This paper first proposes an objective, practical and adaptive vulnerability assessment system of complicated power system by use of Analytic Hierarchy Process, which based on multi-factors analysis of large-area outages. This system can find out the vulnerability point of the power system,and take advantages of the government, who can over-all plan, correspond and organize the social resource to reduce the vulnerability of power system and prevent large-area power outages, and the power enterprises who can maintaining the stability of power system by technology. Finally, the paper gives an assessment example of provincial power system.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Teng, Jen-Hao, Ivan Curtis Martinez et Chia-Yen Chen. « Utilising energy storage systems to mitigate power system vulnerability ». IET Generation, Transmission & ; Distribution 7, no 7 (1 juillet 2013) : 790–98. http://dx.doi.org/10.1049/iet-gtd.2012.0694.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Doorman, G. L., K. Uhlen, G. H. Kjolle et E. S. Huse. « Vulnerability Analysis of the Nordic Power System ». IEEE Transactions on Power Systems 21, no 1 (février 2006) : 402–10. http://dx.doi.org/10.1109/tpwrs.2005.857849.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Luo, Fucai, Jingyi Xie, Jingdong Guo, Wenliang Liu, Jindong He et Hang Zhang. « Vulnerability Detection System for Power Information Based on Network Traffic Identification Technology ». Journal of Physics : Conference Series 2401, no 1 (1 décembre 2022) : 012042. http://dx.doi.org/10.1088/1742-6596/2401/1/012042.

Texte intégral
Résumé :
Abstract A power information vulnerability detection system has the problem of a low network survival rate. Therefore, a power information vulnerability detection system based on network traffic identification technology is designed. In the hardware part, the memory is configured as a synchronous interface and 4 DRAMs, and the level input and output power of the chip are kept in a state compatible with LVTTL levels; in the software part, the power information network indicators are obtained, the importance of network elements is reflected through a mesoscope, the failure characteristics of components are extracted using network traffic identification technology, a critical area is delineated, and the port protocols and association libraries of the passages are matched to optimize the system vulnerability detection function. Through analysis of the simulation results, it can be obtained that the network survival rate of the power information vulnerability detection system in this paper is 17.657% and 17.931% higher than that obtained by the other two power information vulnerability detection systems, respectively, indicating that the designed power information vulnerability detection system is more effective when fully integrated with network traffic identification techniques.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Sun, Meng, Qi Wang, Jue He, Huailin Huang, Yu Huang, Xiaojie Shen, Yaohui Xiao et Suchun Fan. « Research on automatic scanning method of network vulnerabilities in power system ». Journal of Physics : Conference Series 2290, no 1 (1 juin 2022) : 012036. http://dx.doi.org/10.1088/1742-6596/2290/1/012036.

Texte intégral
Résumé :
Abstract Power system network is an important guarantee for the smooth operation of power enterprises. Considering the current automatic network vulnerability scanning method of power system, the detection rate of network vulnerability scanning is low due to its poor scheduling ability. Therefore, this paper designs a new automatic scanning method for network vulnerabilities in power system. According to the infrastructure of power system network vulnerability scanner, the power system web page interaction behavior recognition model is constructed to complete the power system web page interaction behavior recognition. On this basis, the power system network scanning scheduling algorithm is designed. Combined with genetic algorithm, the variation process of power system network vulnerabilities is determined, the power system network security situation is determined, the power system network scanning scheduling and vulnerability mining are realized, and the design of power system network leakage automatic scanning method is completed. The experimental link is constructed to verify this method. The verification shows that this method can effectively improve the detection rate of network vulnerability scanning and the efficiency of vulnerability scanning to a certain extent.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Padhee, Malhar, Reetam Sen Biswas, Anamitra Pal, Kaustav Basu et Arunabha Sen. « Identifying Unique Power System Signatures for Determining Vulnerability of Critical Power System Assets ». ACM SIGMETRICS Performance Evaluation Review 47, no 4 (30 avril 2020) : 8–11. http://dx.doi.org/10.1145/3397776.3397779.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Samanta, Shouvik Kumar, et Chandan Kumar Chanda. « Smart power grid vulnerability analysis in composite system through power grid modelling ». International Journal of Applied Power Engineering (IJAPE) 10, no 1 (1 mars 2021) : 11. http://dx.doi.org/10.11591/ijape.v10.i1.pp11-20.

Texte intégral
Résumé :
<p>Though the number of traditional literature reviews most of the researchers in this area have concluded that modern intelligent electric network a referred standard new model which is considering for proposed power flow model analysis of Smart power grid vulnerability through composite network. By the theorem of Max-Flow and complex power network theorems that are represented the advance vulnerability indices for pick out endangered lines of the smart grid network. In other hand, the power flow model and existing models simulation are examined on the IEEE 39-bus test model. The results of the simulation introduced that the proposed concept of grid model, estimation and the index application are more adequate in smart grid weakness power and efficiency analysis. In this paper briefly summarize the methods and probabilities of a vulnerability index which was explained in specific in references. Therefore, it is imperative to further implement new models and new tools so as to reach the novel state and moderate the huge or massive potential shutoff.</p>
Styles APA, Harvard, Vancouver, ISO, etc.
8

Haidar, Ahmed M. A., Azah Mohamed . et Aini Hussain . « New Method for Vulnerability Assessment of Power System ». Journal of Applied Sciences 7, no 6 (1 mars 2007) : 841–47. http://dx.doi.org/10.3923/jas.2007.841.847.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Lopez-Lezama, Jesus M., Juan J. Cortina et Nicolas Munoz Galeano. « Assessment of power system vulnerability using metaheuristic techniques ». Contemporary Engineering Sciences 11, no 24 (2018) : 1165–84. http://dx.doi.org/10.12988/ces.2018.8399.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Kubacki, Krzysztof, Dariusz Siemieniako et Linda Brennan. « Building positive resilience through vulnerability analysis ». Journal of Social Marketing 10, no 4 (27 juin 2020) : 471–88. http://dx.doi.org/10.1108/jsocm-09-2019-0142.

Texte intégral
Résumé :
Purpose The purpose of this paper is to propose an integrative framework for vulnerability analysis in social marketing systems by identifying, investigating and problematising the relationships among several interrelated concepts, including power, power asymmetry, vulnerability and resilience, in the context of social marketing systems. Design/methodology/approach This is a conceptual paper synthesising literature from social marketing, sociology and marketing management. Findings The main outcome of the discussion is a proposed integrative framework for vulnerability analysis. The framework identifies the main groups of stakeholders within a social marketing system and the bases for their power and consequential power asymmetries. It focusses on the types and states of vulnerability to identify the distinct characteristics of the social conditions of vulnerability for micro-level system actors. It leads to building positive resilience through efforts aiming to change the power asymmetries at the downstream, midstream and upstream levels. Originality/value The integrative framework for vulnerability analysis answers the call from Wood (2019) for the development of practical approaches to better understand resilience-building approaches in social marketing programmes. The framework provides reconciliation for diverse dimensions of vulnerability as a natural characteristic of all social marketing systems and as a universal, constant and inherent social condition.
Styles APA, Harvard, Vancouver, ISO, etc.
11

Yulianto, B. A., I. G. Sudjatmiko, A. Octavian et I. N. Putra. « A hybrid multi-criteria decision-making and system dynamics approach in vulnerability analysis of TNI-POLRI power ». Decision Science Letters 11, no 4 (2022) : 455–72. http://dx.doi.org/10.5267/j.dsl.2022.6.004.

Texte intégral
Résumé :
This study analyzes the vulnerability of the power relations between the Indonesian National Armed Forces and the Indonesian National Police (TNI-Polri power relations) post-1998 Reform. This article employed exploratory sequential mixed methods in answering the research problem. Analytical Hierarchy Process (AHP) and System Dynamics methods were utilized in the study. Based on the research results, the variables of Socio-Economic (SE) Vulnerability and Adaptive Capacity (AC) have the highest weight value of 0.329. Meanwhile, the variable of Institutional Vulnerability has the lowest weight, 0.142. Overall, the vulnerability value of TNI-Polri power relations post-1998 Reform was still in the Low Vulnerability category with a value of 1,699 (33.97%). The vulnerability value of TNI-Polri power relations in the next five years will increase from a score of 1.66 in 2022 to 1.74 in 2027 so that it will increase by 5% with the same category level, namely Low Vulnerability. This study is expected to strengthen TNI-Polri power relations in maintaining national political stability.
Styles APA, Harvard, Vancouver, ISO, etc.
12

Zheng, Wei, Run Dong Ge, Wen Ying Liu, Dan Dan Zhu et Hui Yong Li. « Vulnerability Assessment for Large-Scale Wind Farm ». Advanced Materials Research 1070-1072 (décembre 2014) : 279–83. http://dx.doi.org/10.4028/www.scientific.net/amr.1070-1072.279.

Texte intégral
Résumé :
Power system vulnerability is one new concept for power security as the extend of security in recent years. At present, the power system vulnerability research has obtained stage accomplishment. Meanwhile, the randomness and intermittence of the wind lead to the wind power output unsteady. It not only has a bad influence on the power system, but also makes wind farm vulnerability even more obvious. Based on this, vulnerability assessment is applied to large-scale wind farm in this paper. Vulnerability indexes of the bus in large-scale wind farm are put forward and prevention measures are also given and it will has reference meaning to the security enhance of both grid and wind farm.
Styles APA, Harvard, Vancouver, ISO, etc.
13

El-Sharkawi, Mohamed A. « Intelligent Techniques for Power Systems Vulnerability Assessment ». Sultan Qaboos University Journal for Science [SQUJS] 7, no 1 (1 juin 2002) : 23. http://dx.doi.org/10.24200/squjs.vol7iss1pp23-29.

Texte intégral
Résumé :
With power grids considered national security matters, the reliable operation of the system is of top priority to utilities. This concern is amplified by the utility’s deregulation, which increases the system’s openness while simultaneously decreasing the applied degree of control. Vulnerability Assessment (VA) deals with the power system’s ability to continue to provide service in case of an unforeseen catastrophic contingency. Such contingencies may include unauthorized tripping, breaks in communication links, sabotage or intrusion by external agents, human errors, natural calamities and faults. These contingencies could lead to a disruption of service to part or all of the system. The service disruption is known as outage or blackout. The paper outlines an approach by which feature extraction and boundary tracking can be implemented to achieve on line vulnerability assessment.
Styles APA, Harvard, Vancouver, ISO, etc.
14

Fouad, A. A., Qin Zhou et V. Vittal. « System vulnerability as a concept to assess power system dynamic security ». IEEE Transactions on Power Systems 9, no 2 (mai 1994) : 1009–15. http://dx.doi.org/10.1109/59.317643.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
15

Luo, Lingen, Bei Han et Marti Rosas-Casals. « Network Hierarchy Evolution and System Vulnerability in Power Grids ». IEEE Systems Journal 12, no 3 (septembre 2018) : 2721–28. http://dx.doi.org/10.1109/jsyst.2016.2628410.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
16

Sanz, Fredy A., Juan M. Ramírez et Rosa E. Correa. « Experimental design for a large power system vulnerability estimation ». Electric Power Systems Research 121 (avril 2015) : 20–27. http://dx.doi.org/10.1016/j.epsr.2014.11.026.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
17

Li, Jianlan, et Shuhong Huang. « A vulnerability model for power system dynamic security assessment ». International Journal of Electrical Power & ; Energy Systems 62 (novembre 2014) : 59–65. http://dx.doi.org/10.1016/j.ijepes.2014.03.026.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
18

Piccinelli, Roberta, et Elisabeth Krausmann. « North Europe power transmission system vulnerability during extreme space weather ». Journal of Space Weather and Space Climate 8 (2018) : A03. http://dx.doi.org/10.1051/swsc/2017033.

Texte intégral
Résumé :
Space weather driven by solar activity can induce geomagnetic disturbances at the Earth's surface that can affect power transmission systems. Variations in the geomagnetic field result in geomagnetically induced currents that can enter the system through its grounding connections, saturate transformers and lead to system instability and possibly collapse. This study analyzes the impact of extreme space weather on the northern part of the European power transmission grid for different transformer designs to understand its vulnerability in case of an extreme event. The behavior of the system was analyzed in its operational mode during a severe geomagnetic storm, and mitigation measures, like line compensation, were also considered. These measures change the topology of the system, thus varying the path of geomagnetically induced currents and inducing a local imbalance in the voltage stability superimposed on the grid operational flow. Our analysis shows that the North European power transmission system is fairly robust against extreme space weather events. When considering transformers more vulnerable to geomagnetic storms, only few episodes of instability were found in correspondence with an existing voltage instability due to the underlying system load. The presence of mitigation measures limited the areas of the network in which bus voltage instabilities arise with respect to the system in which mitigation measures are absent.
Styles APA, Harvard, Vancouver, ISO, etc.
19

Oyola-Yeroaiel, Arthur, et Jennifer Wilson. « Terrorism and System Failure : A Revisited Perspective of Current Development Paradigms ». International Journal of Mass Emergencies & ; Disasters 21, no 3 (novembre 2003) : 25–40. http://dx.doi.org/10.1177/028072700302100303.

Texte intégral
Résumé :
In this article we explore social vulnerability to terrorism based upon current development paradigms and the social complexities derived from- our evolutionary process. We argue that highly complex systems are the essence of accelerated development as well as the possible cause of our collapse as a society System complexity in and of itself could very well be modern society's principal vulnerability to terrorism with the possible outcome of a generalized failure resulting in a. national disaster. To obtain vulnerability reduction we suggest that American society move toward a new stage of development accentuating redundancy and independence of crucial system functions. We recommend that business and resource consolidation and the centralization of power paradigm give way to developmental strategies of decentralized power and dispersed resource allocation. We utilized the Twin Towers incident to analyze our evolutionary developmental process and the vulnerability of our complex society and to revisit the working definition of disaster in the reality of highly complex systems.
Styles APA, Harvard, Vancouver, ISO, etc.
20

Guo, Ran, Weijie Chen, Lejun Zhang, Guopeng Wang et Huiling Chen. « Smart Contract Vulnerability Detection Model Based on Siamese Network (SCVSN) : A Case Study of Reentrancy Vulnerability ». Energies 15, no 24 (19 décembre 2022) : 9642. http://dx.doi.org/10.3390/en15249642.

Texte intégral
Résumé :
Blockchain technology is currently evolving rapidly, and smart contracts are the hallmark of the second generation of blockchains. Currently, smart contracts are gradually being used in power system networks to build a decentralized energy system. Security is very important to power systems and attacks launched against smart contract vulnerabilities occur frequently, seriously affecting the development of the smart contract ecosystem. Current smart contract vulnerability detection tools suffer from low correct rates and high false positive rates, which cannot meet current needs. Therefore, we propose a smart contract vulnerability detection system based on the Siamese network in this paper. We improved the original Siamese network model to perform smart contract vulnerability detection by comparing the similarity of two sub networks with the same structure and shared parameters. We also demonstrate, through extensive experiments, that the model has better vulnerability detection performance and lower false alarm rate compared with previous research results.
Styles APA, Harvard, Vancouver, ISO, etc.
21

Li, Yifan, Bo Wang, Hongxia Wang, Fuqi Ma, Hengrui Ma, Jiaxin Zhang, Yingchen Zhang et Mohamed A. Mohamed. « An Effective Node-To-Edge Interdependent Network and Vulnerability Analysis for Digital Coupled Power Grids ». International Transactions on Electrical Energy Systems 2022 (29 septembre 2022) : 1–13. http://dx.doi.org/10.1155/2022/5820126.

Texte intégral
Résumé :
With the deep coupling between the cyber side and the physical side of power systems, the failure of any link of both sides may lead to power outages, so it is necessary to analyze their vulnerability and vulnerable links for targeted improvement of systems. By dynamically attacking the coupled network nodes, this paper proposes a multilevel model and node-to-edge cyber-physical power system and the corresponding indexes system to analyze the vulnerability of the coupled power grid and its key components. The results showed that in the order of the indexes proposed in this paper, attacking surviving power nodes and cyber nodes results in a network crash rate of 25.0% and 66.7% faster than that in the order of “betweenness” and that attacking surviving cyber nodes results in a network crash rate of 89.4% faster than that in the order of “degree.” In terms of attacking power nodes, the index proposed in this paper has the same rate as “degree.” Therefore, the proposed model can better describe the vulnerability of the power grid to withstand attacks.
Styles APA, Harvard, Vancouver, ISO, etc.
22

Zhang, Meng, Liang HUA Zheng, Tao Lin, Hua Long Wang et Fei Fang. « Pattern Recognition Based on Integrative Vulnerability Mode for Elcctric Power Grid ». Applied Mechanics and Materials 291-294 (février 2013) : 2212–16. http://dx.doi.org/10.4028/www.scientific.net/amm.291-294.2212.

Texte intégral
Résumé :
In recent years, with the happening of large-scale power cut accidents, the electric network has been concerned widely increasingly. Pattern recognition which could be used in online analysis, can get rid of the mode limit of the operation characteristic of description system, and its counting volume is less influenced by system scale, also its general assessment is in a fast speed. In this text, it elaborates the conception of the power grid vulnerability and some kinds of available ways of assessing vulnerability, and it also tells us the target of electric network’s integrative vulnerability based on integrative vulnerability mode for electric power grid, and used in pattern recognition, which its the sensibility and necessity of pattern recognition has been verified by the IEEE-39 system.
Styles APA, Harvard, Vancouver, ISO, etc.
23

Basya, Fahmi, Mardi Hardjanto et Ikbal Permana Putra. « SHA512 and MD5 Algorithm Vulnerability Testing Using Common Vulnerability Scoring System (CVSS) ». Buana Information Technology and Computer Sciences (BIT and CS) 3, no 1 (19 janvier 2022) : 1–4. http://dx.doi.org/10.36805/bit-cs.v3i1.2046.

Texte intégral
Résumé :
This paper discusses the comparison of the results of testing the OTP (One Time Password) algorithm on two encryptions, namely SHA512 and MD5 which are applied to the Reconciliation Application of the Dinas Pemberdayaan Masyarakat dan Desa Kabupaten Sukabumi. This study uses the Vulnerability Assessment and Penetration Testing (VAPT) method, which combines two forms of vulnerability testing to achieve a much more complete vulnerability analysis by performing different tasks in the same focus area. The vulnerability assessment uses the Common Vulnerability Scoring System (CVSS) method. The results showed that the Vulnerability Assessment and Penetration Testing (VAPT) method was proven to be able to identify the level of security vulnerability in the Reconciliation Application at the Dinas Pemberdayaan Masyarakat dan Desa Kabupaten Sukabumi with a vulnerability level score of 5.3 in the SHA512 environment with a medium rating and 7.5 in the MD5 environment. with high ratings. So, it can be concluded that the best algorithm for implementing OTP is SHA512
Styles APA, Harvard, Vancouver, ISO, etc.
24

Fan, Wen-Li, Quan-You Li, Ye-Qi Xiao, Xiao-Feng He, Yu-Ze Tong, Ping Hu et Zhi-Bin Zeng. « Power system vulnerability analysis based on topological potential field theory ». Physica Scripta 96, no 12 (12 octobre 2021) : 125227. http://dx.doi.org/10.1088/1402-4896/ac2bda.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
25

Park, Hyunsoo. « Institutional Vulnerability and Power System Disturbances in the United States ». International Review of Public Administration 17, no 2 (août 2012) : 63–92. http://dx.doi.org/10.1080/12294659.2012.10805228.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
26

Abedi, Amin, Ludovic Gaudard et Franco Romerio. « Review of major approaches to analyze vulnerability in power system ». Reliability Engineering & ; System Safety 183 (mars 2019) : 153–72. http://dx.doi.org/10.1016/j.ress.2018.11.019.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
27

Rout, Gyanendra Kumar, Tamalika Chowdhury et Chandan Kumar Chanda. « Betweenness as a Tool of Vulnerability Analysis of Power System ». Journal of The Institution of Engineers (India) : Series B 97, no 4 (21 juin 2016) : 463–68. http://dx.doi.org/10.1007/s40031-016-0222-z.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
28

Adachi, Takao, et Bruce R. Ellingwood. « Serviceability of earthquake-damaged water systems : Effects of electrical power availability and power backup systems on system vulnerability ». Reliability Engineering & ; System Safety 93, no 1 (janvier 2008) : 78–88. http://dx.doi.org/10.1016/j.ress.2006.10.014.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
29

Zhang, Haiyan, Minfang Peng, Josep M. Guerrero, Xingle Gao et Yanchen Liu. « Modelling and Vulnerability Analysis of Cyber-Physical Power Systems Based on Interdependent Networks ». Energies 12, no 18 (6 septembre 2019) : 3439. http://dx.doi.org/10.3390/en12183439.

Texte intégral
Résumé :
The strong coupling between the power grid and communication systems may contribute to failure propagation, which may easily lead to cascading failures or blackouts. In this paper, in order to quantitatively analyse the impact of interdependency on power system vulnerability, we put forward a “degree–electrical degree” independent model of cyber-physical power systems (CPPS), a new type of assortative link, through identifying the important nodes in a power grid based on the proposed index–electrical degree, and coupling them with the nodes in a communication system with a high degree, based on one-to-one correspondence. Using the double-star communication system and the IEEE 118-bus power grid to form an artificial interdependent network, we evaluated and compare the holistic vulnerability of CPPS under random attack and malicious attack, separately based on three kinds of interdependent models: “degree–betweenness”, “degree–electrical degree” and “random link”. The simulation results demonstrated that different link patterns, coupling degrees and attack types all can influence the vulnerability of CPPS. The CPPS with a “degree–electrical degree” interdependent model proposed in this paper presented a higher robustness in the face of random attack, and moreover performed better than the degree–betweenness interdependent model in the face of malicious attack.
Styles APA, Harvard, Vancouver, ISO, etc.
30

Huang, Xun Cheng, Huan Qi, Xiao Pan Zhang, Li Fang Lu et Yang Yu Hu. « Regional Vulnerability Analysis of Grid Structure ». Applied Mechanics and Materials 419 (octobre 2013) : 877–82. http://dx.doi.org/10.4028/www.scientific.net/amm.419.877.

Texte intégral
Résumé :
Cascading failure of network features in power system is analyzed in this paper using complex network theory and method, and Central China power grid are analyzed in detail on the three kinds of attack forms (maximum load, the most generous attack and random attack) of regional vulnerability. It provides technical means for the prevention of cascading failure .
Styles APA, Harvard, Vancouver, ISO, etc.
31

Qu, Hui, Xing Xian, Shao Qian Ding, Shan Shan Wen, Tao Lin et Fen Tao. « Research on Grid Structural Vulnerability Based on Improved Electrical Betweenness ». Advanced Materials Research 1070-1072 (décembre 2014) : 815–18. http://dx.doi.org/10.4028/www.scientific.net/amr.1070-1072.815.

Texte intégral
Résumé :
The emergence of electricity transmission with farther transporting distance, extra-higher voltage and greater transporting power and the formation of the regional interconnected power grid have greatly increased the probability of blackout, this phenomenon has fully exposed the vulnerability of large-scale interconnected power systems. In this paper, Electrical betweenness based on load transfer coefficient is proposed to construct structural vulnerability assessment index. Meanwhile, it is verified that the method is rational and available by analysising the difference of the IEEE-39 system between three attack modes.
Styles APA, Harvard, Vancouver, ISO, etc.
32

Deyuan, Tian, Liu Rushan, Xia Xuyi et Wang Zhenhui. « Seismic Vulnerability Assessment of Thermal Power Plants Based on Beta Function ». Mathematical Problems in Engineering 2022 (13 avril 2022) : 1–10. http://dx.doi.org/10.1155/2022/5799241.

Texte intégral
Résumé :
The study on seismic vulnerability of thermal power plants is of great significance for seismic damage prevention of the electrical power system and risk analysis of seismic economic loss. This paper presented a study method for obtaining the seismic vulnerability matrix and vulnerability curve of thermal power plants based on beta function. Firstly, according to the study results of thermal power plants in American ATC-25 report, the expected values of seismic damage indexes of thermal power plants under different seismic intensities were calculated. It was assumed that the expected values of seismic damage indexes of substation and thermal power plant were the same, and the dispersion of distribution of seismic damage indexes was the same. Then, based on the actual seismic vulnerability matrix of substations obtained from statistics in Wenchuan earthquake, the seismic vulnerability matrix of thermal power plants under different seismic intensities was fitted by using the probability density function of beta distribution. Finally, the seismic vulnerability curve of the thermal power plant based on peak ground acceleration (PGA) was obtained by using the cumulative function curve of standard lognormal distribution. The calculation results show that the seismic damage ratio calculated from the seismic vulnerability matrix of thermal power plants is basically consistent with the seismic damage ratio in ATC-25 report.
Styles APA, Harvard, Vancouver, ISO, etc.
33

Kolosok, Irina, et Liudmila Gurina. « Assessment of risks due to cyberattacks on information and communication infrastructure of cyber-physical system in the electric power system control ». E3S Web of Conferences 139 (2019) : 01026. http://dx.doi.org/10.1051/e3sconf/201913901026.

Texte intégral
Résumé :
The paper proposes an approach to risk assessment in the electric power system control to identify possible failures in the electric power system functioning caused by cyberattacks on SCADA systems and WAMS. There is a large number of information, hardware and software factors, which increase the automated dispatching control system vulnerability to cyberattacks. The study shows the influence of unforeseen cyber-incidents in the information and communication infrastructure on electric power systems through false control actions on their physical part. The effectiveness of the developed risk assessment approach is demonstrated by its performance under uncertainty.
Styles APA, Harvard, Vancouver, ISO, etc.
34

Huang, Da Wei, et Ran He. « Analysis of Power Grid Vulnerability Based on Electrical Dissection Method ». Applied Mechanics and Materials 448-453 (octobre 2013) : 2564–68. http://dx.doi.org/10.4028/www.scientific.net/amm.448-453.2564.

Texte intégral
Résumé :
As the power grid blackout accidents occur frequently, the vulnerability analysis becomes an important topic in power system analysis. A new electrical dissection method for the power grid vulnerability assessment is presented in this paper. The method can effectively reflect the power transmission between generator and load on the terminal of each line, and quantify the using relationship with the branch transmission power limit. An IEEE 39-bus text system was used to testify this method and the results indicated the methods efficiency and rationality. This paper is supported by NSFC 51307019.
Styles APA, Harvard, Vancouver, ISO, etc.
35

Wang, Tong, et Jing Ma. « Operation Betweenness Based Assessment on Overload Vulnerability ». Applied Mechanics and Materials 373-375 (août 2013) : 1378–83. http://dx.doi.org/10.4028/www.scientific.net/amm.373-375.1378.

Texte intégral
Résumé :
An operation betweenness based method to assess overloaded lines is proposed. Based on electrical network theory, firstly the branch current sharing factors are deduced; then the operation betweenness of transmission line is defined; finally, on this basis the overload vulnerability of transmission line is assessed. In the proposed method, the impacts of both topological structure and operation modes of power network on vulnerability are considered for the assessment. The physical meaning of the proposed method is determinate and conforms to actual condition of power system, and this method avoids the defect in the complicated network model that the power flows only flow along the shortest path. The correctness of the proposed assessment method is verified by simulation results of IEEE 39-bus system.
Styles APA, Harvard, Vancouver, ISO, etc.
36

Li, Yuancheng, et Shengnan Chu. « Construction and reduction methods of vulnerability index system In power SCADA ». International Journal of Security and Its Applications 8, no 6 (30 novembre 2014) : 335–52. http://dx.doi.org/10.14257/ijsia.2014.8.6.29.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
37

Ouyang, Min, Min Xu, Chi Zhang et Shitong Huang. « Mitigating electric power system vulnerability to worst-case spatially localized attacks ». Reliability Engineering & ; System Safety 165 (septembre 2017) : 144–54. http://dx.doi.org/10.1016/j.ress.2017.03.031.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
38

Kamwa, I., A. K. Pradhan, G. Joos et S. R. Samantaray. « Fuzzy Partitioning of a Real Power System for Dynamic Vulnerability Assessment ». IEEE Transactions on Power Systems 24, no 3 (août 2009) : 1356–65. http://dx.doi.org/10.1109/tpwrs.2009.2021225.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
39

Anil, Ozgur, Sami Oguzhan Akbas, Erkan Kantar et A. Cem Gel. « Vibration measurement and vulnerability analysis of a power plant cooling system ». Smart Structures and Systems 11, no 2 (25 février 2013) : 199–215. http://dx.doi.org/10.12989/sss.2013.11.2.199.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
40

Arroyo, J. M. « Bilevel programming applied to power system vulnerability analysis under multiple contingencies ». IET Generation, Transmission & ; Distribution 4, no 2 (2010) : 178. http://dx.doi.org/10.1049/iet-gtd.2009.0098.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
41

Zhou, Ming, Jingyu Li, Shunyu Wu, Siwei Liu, Gengyin Li et Jianqin Liu. « Vulnerability analysis of power system based on dynamic regional electrical coupling ». International Transactions on Electrical Energy Systems 29, no 1 (31 juillet 2018) : e2671. http://dx.doi.org/10.1002/etep.2671.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
42

Novakovskiy, B. A., A. I. Prasolova, A. M. Karpachevskiy et O. G. Filippova. « Mapping of isolated energy system structure : case study of Kamchatka Territory, Magadan and Sakhalin Regions ». Geodesy and Cartography 923, no 5 (20 juin 2017) : 56–63. http://dx.doi.org/10.22389/0016-7126-2017-923-5-56-63.

Texte intégral
Résumé :
The article describes a way to represent the structure of the energy system using an undirected weighted graph. It also considers the concept of structural vulnerability of the electrical grid as a key property affecting the reliability of power supply. We consider isolated energy systems of the Russian Far East, taking into account the differentiation in structural vulnerability within the networks of different types. For these purposes we propose the technique of designing and using geodatabase for the structural vulnerability assessment in the territories of the Kamchatka Territory, Magadan and Sakhalin regions. The designed technique is based on the use of open source data about power transmission lines (PTL), substations and power plants. Remote sensing data was also used. It is introduced a principle of zoning study area based on geoprocessing model. These maps were compared with some maps of crucial climatic parameters such as maximum wind speed and sleet deposits wall thickness.
Styles APA, Harvard, Vancouver, ISO, etc.
43

Li, Ding, Shuang Ya Zhou, Shun Tao, Jia Jia Xue et Xiang Ning Xiao. « Application of Common Information Model in Analyzing the Area of Vulnerability to Voltage Sags ». Applied Mechanics and Materials 241-244 (décembre 2012) : 747–51. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.747.

Texte intégral
Résumé :
The common information model CIM in IEC61970 standard is an abstract description of existing physical objects and their relationship in power system, which has been widely used in the construction of computer application systems of power system. In order to track the real-time operation state of power system when analyzing the area of vulnerability (AOV) to voltage sags, this paper proposes a novel method to obtain the data required by AOV analysis through parsing source data defined with CIM, and source data are from the SCADA system, equipment management system and management information system of safe production. The design scheme of AOV analysis using CIM is introduced, and method of parsing CIM is also provided. Finally, the method is applied to a regional power system of China, and graphic results of AOV are shown under balanced and unbalanced faults.
Styles APA, Harvard, Vancouver, ISO, etc.
44

Liu, Yanchen, Minfang Peng, Xingle Gao et Haiyan Zhang. « Probabilistic Vulnerability Assessment of Transmission Lines Considering Cascading Failures ». Processes 9, no 11 (8 novembre 2021) : 1994. http://dx.doi.org/10.3390/pr9111994.

Texte intégral
Résumé :
The prevention of cascading failures and large-scale power outages of power grids by identifying weak links has become one of the key topics in power systems research. In this paper, a vulnerability radius index is proposed to identify the initial fault, and a fault chain model of cascading failure is developed with probabilistic attributes to identify the set of fault chains that have a significant impact on the safe and stable operation of power grids. On this basis, a method for evaluating the vulnerability of transmission lines based on a multi-criteria decision analysis is proposed, which can quickly identify critical transmission lines in the process of cascading failure. Finally, the proposed model and method for identifying vulnerable lines during the cascading failure process is demonstrated on the IEEE-118 bus system.
Styles APA, Harvard, Vancouver, ISO, etc.
45

Bielby, William T. « Minority Vulnerability in Privileged Occupations ». ANNALS of the American Academy of Political and Social Science 639, no 1 (15 décembre 2011) : 13–32. http://dx.doi.org/10.1177/0002716211422338.

Texte intégral
Résumé :
Building on recent work on contemporary forms of bias in meritocratic personnel systems, the author assesses sources of racial disadvantage in an output-based pay-for-performance system for compensating financial advisers in a large financial services firm. Using data from expert reports submitted in racial discrimination litigation, the author shows how racial differences in access to white wealth, limits on African Americans’ full participation in broker teams, racialized approaches to multicultural marketing, and diffuse lines of authority for diversity and nondiscrimination created racial barriers that were sustained and amplified by a cumulative advantage system for allocating productivity-enhancing resources. The author concludes with a discussion of management strategies for minimizing minority vulnerability in privileged professions and the challenges faced when the sources of bias are neither unconscious nor unintended but are instead located at least in part in racially segregated social relations and power differences among professionals who hold formally equivalent positions in a company’s job structure.
Styles APA, Harvard, Vancouver, ISO, etc.
46

Du, Zhi, Gang Wang, Da Hai You, Wei Hua Chen, Ke Wang et Yang Zou. « A Novel Transmission Line Vulnerability Evaluation Method Based on Complex Network Theory ». Applied Mechanics and Materials 494-495 (février 2014) : 1866–69. http://dx.doi.org/10.4028/www.scientific.net/amm.494-495.1866.

Texte intégral
Résumé :
As further development on the applications of CN (complex network) theory, evaluation of transmission line vulnerability requires the consideration of physical attributes of power system, instead of simply considering its topology features, which helps to deduce more precise predictions for the stability of power system. This paper introduces a novel and efficient evaluation method based on CN theory to evaluate influence of line faults to the static stability of power system, comprehensively considering the factors of system load level, power capacity utilization rate of transmission lines and worldlet features. The method is illustrated in the IEEE118 bus system.
Styles APA, Harvard, Vancouver, ISO, etc.
47

Tapia, Mariela, Pablo Thier et Stefan Gößling-Reisemann. « Building resilient cyber-physical power systems ». TATuP - Zeitschrift für Technikfolgenabschätzung in Theorie und Praxis 29, no 1 (1 avril 2020) : 23–29. http://dx.doi.org/10.14512/tatup.29.1.23.

Texte intégral
Résumé :
Power systems are undergoing a profound transformation towards cyber- physical systems. Disruptive changes due to energy system transition and the complexity of the interconnected systems expose the power system to new, unknown, and unpredictable risks. To identify the critical points, a vulnerability assessment was conducted, involving experts from the power as well as the information and communication technologies (ICT) sectors. Weaknesses were identified, e. g., the lack of policy enforcement, which are worsened by the unreadiness of the actors involved. Due to the complex dynamics of ICT, it is infeasible to keep a complete inventory of potential stressors to define appropriate preparation and prevention mechanisms. Therefore, we suggest applying a resilience management approach to increase the resilience of the system. It aims at better riding through failures rather than building higher walls. We conclude that building resilience in cyber-physical power systems is feasible and helps in preparing for the unexpected.
Styles APA, Harvard, Vancouver, ISO, etc.
48

Alonso, Monica, Jaime Turanzas, Hortensia Amaris et Angel T. Ledo. « Cyber-Physical Vulnerability Assessment in Smart Grids Based on Multilayer Complex Networks ». Sensors 21, no 17 (30 août 2021) : 5826. http://dx.doi.org/10.3390/s21175826.

Texte intégral
Résumé :
In the last decade, the main attacks against smart grids have occurred in communication networks (ITs) causing the disconnection of physical equipment from power networks (OTs) and leading to electricity supply interruptions. To deal with the deficiencies presented in past studies, this paper addresses smart grids vulnerability assessment considering the smart grid as a cyber-physical heterogeneous interconnected system. The model of the cyber-physical system is composed of a physical power network model and the information and communication technology network model (ICT) both are interconnected and are interrelated by means of the communication and control equipment installed in the smart grid. This model highlights the hidden interdependencies between power and ICT networks and contains the interaction between both systems. To mimic the real nature of smart grids, the interconnected heterogeneous model is based on multilayer complex network theory and scale-free graph, where there is a one-to-many relationship between cyber and physical assets. Multilayer complex network theory centrality indexes are used to determine the interconnected heterogeneous system set of nodes criticality. The proposed methodology, which includes measurement, communication, and control equipment, has been tested on a standardized power network that is interconnected to the ICT network. Results demonstrate the model’s effectiveness in detecting vulnerabilities in the interdependent cyber-physical system compared to traditional vulnerability assessments applied to power networks (OT).
Styles APA, Harvard, Vancouver, ISO, etc.
49

Chen, Yan, Yazhong Feng, Fan Zhang et Lei Wang. « Assessing Water Resources Vulnerability by Using a Rough Set Cloud Model : A Case Study of the Huai River Basin, China ». Entropy 21, no 1 (24 décembre 2018) : 14. http://dx.doi.org/10.3390/e21010014.

Texte intégral
Résumé :
Assessing water resources vulnerability is the foundation of local water resources management. However, as one of the major water systems in China, there is no existing evaluation index system that can effectively assess water resource vulnerability for the Huai River basin. To address this issue, we identified key vulnerability factors, constructed an evaluation index system, and applied such system to evaluate water resources vulnerability for the Huai River basin empirically in this paper. Specifically, our evaluation index system consists of 18 indexes selected from three different aspects: water shortage, water pollution, and water-related natural disaster. Then, the improved blind deletion rough set method was used to reduce the size of the evaluation index while keep the evaluation power. In addition, the improved conditional information entropy rough set method was employed to calculate the weights of evaluation indexes. Based on the reduced index system and calculated weights, a rough set cloud model was applied to carry out the vulnerability evaluation. The empirical results show that the Huai River basin water resources were under severe vulnerability conditions for most of the time between 2000 and 2016, and the Most Stringent Water Resources Management System (MS-WRMS) established in 2012 did not work effectively as expected.
Styles APA, Harvard, Vancouver, ISO, etc.
50

Omoroghomwan, A. E., S. O. Igbinovia et F. O. Odiase. « Vulnerability Assessment of Components in a Typical Rural Nigerian Power Distribution System ». March 2021 5, no 1 (mars 2021) : 32–46. http://dx.doi.org/10.36263/nijest.2021.01.0237.

Texte intégral
Résumé :
The major aim of any power system is the continuous provision of safe, quality and reliable electric power to the customers. One of the greatest challenges to meeting up with this goal is the failure of components in the system. In this article, the frequency of outages caused by failure of different components in the distribution system was investigated to ascertain the ones that are more susceptible to failure by comparing their proportions in the entire failure events. The outage data obtained from Irrua Transmission Station comprising Ehor, Ubiaja and Uzebba 33kV feeders were analyzed using Microsoft Excel while the hazard rates were measured using the failure rate index. Findings revealed that 93.77% of all the forced outages in the distribution subsystem in the power sector are caused by the high exposure rate of the bare aluminum conductors used in the construction of the various overhead feeders. Subsequently, the yearly failure rates of aluminum conductors, cross arms, relay, insulators, fuses, electric poles, breakers, transformers, isolators, cables lightning surge arresters were found to be 836.0, 17.5, 17.0, 10.3, 4.3, 2.0, 1.5, 1.3, 1.0, 0.5 and 0.3 respectively in the studied network. A comparison between this study and a related work showed that the rural feeders are more prone to faults as compared to the ones in the urban areas. It was therefore recommended that regular tree trimming along the network corridor should be done. Proper conductor size should be used in every subsequent construction and every segment with undersized conductor should be replaced with the appropriate size. This study will help the power system engineers in the design, construction, maintenance and operation of the distribution power system for optimum and improved system performance.
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie