SMALL WORLD NETWORK. -Naveen Teja Vempati -Ravi Teja Mitta

Size: px
Start display at page:

Download "SMALL WORLD NETWORK. -Naveen Teja Vempati -Ravi Teja Mitta"

Transcription

1 SMALL WORLD NETWORK -Naveen Teja Vempati -Ravi Teja Mitta

2 INTRODUCTION Every person in this world is some way or other connected by some means is the idea behind evolution of small world phenomenon. Later Harvard approach and MIT approach to study small world had been developed. Through MIT approach widening of the chain and breakage of links is studied. Out of many chains found between source and target, the shortest path found to be with in six intermediaries. Six degrees of separation came into existence as a result of Harvard approach.

3 DEFINITION A mathematical graph based on concept that every target node can be reached from every other node by less number of steps.

4 FEATURES OF SMALL WORLD NETWORK The Topology of the network is studied based on the Clustering Coefficient C(p): measures the degree to which nodes cluster together. Characteristic path length L(p): measures the separation between two nodes in the graph where L(p) is directly proportional to logarithm of nodes between them. C(p) >> C random and L(p)>> L random. Rewired edges must connect to vertices that would otherwise be farther than L random.

5 RESEMBLANCE Many technological networks were found to lie between regular and random networks. By analogy people found following systems in accordance with small world phenomenon. Neural network of worm Caernorhabditis elegan. Power grid of Western United States. Collaboration graph of film actors.

6 SIMULATION RESULTS OF DISEASE SPREADING 1.Charactersitic path length L(P) and clustering coefficient C(P) of small world network. 2. Critical infectiousness r half at which disease spreads resembles clustering coefficient curve. Fig 1 Fig2. Fig3. 3. Time to spread resembles L(p) curve

7 APPLICATION TO SMART GRID In the recent past, Black-Outs occurred repeatedly in United States, UK, Australia, Russia and many other countries. All these black-outs experienced a cascading proceeding. Redistribution of load in case of failure and there by corresponding neighborhood lines are overloaded leading to cascading failures. Many kinds of complex systems in nature and society are tested to study the cause of black-out. Fortunately collective dynamics of small world network gave good explanation about black-out.

8 PRIMARY ASSUMPTIONS All edges in reality high voltage transmission lines are assumed to be undirected(bidirectional). Nodes of the network treated to be identical and featureless a) Generators b) Transformers c) Substations o All transmission lines are assumed to be identical ignoring the fact that voltage varies considerably. o The node of ground is ignored, the parallel lines are combined and graph is made to look simple.

9 STATISTIC PARAMETERS OF ELECTRICAL NETWORKS o From the above results we observe that the Chinese power gird exhibits similar properties as that of the WSPG there by confirming that it is also a small world network.

10 TYPES OF CASCADING FAILURES 1. Failure of node: o High centrality is characteristic of high degree node which is basically defined as the load capability. o Removal of vertices with high centrality will worsen the networks functionality. o Changes the balance of flows leads to a global redistribution of loads over the entire network o It can be either random breakdown or intentional attacks. o Chinese and US power grids exhibit heterogeneous distribution of loads per node.

11 2.Failure of Tie line: o Inner vertices within local clusters are connected together tightly while there exists few external tie lines connecting them(low coupling) o Tie lines are respected as main contributors to characteristic path length of small-world network. o For example in case of Chinese power gird there exists only single line between Sichan-Chongquing province power grid and Center Chinese power grid. o So failure of these lines can change the structure and property of networks to a great extent.

12 CASCADING FAILURE MODES ANALYSIS Practically both failure of nodes and tie lines are often mixed together in cascading. So Monte-Carlo simulation was used to test the different effects of different failure events. In this approach even equal area criterion was used to determine the stability of the system. If the system is unstable, author assumed that a cascading failure occurs. In all the failure events occurred there exists at least one or more critical node or critical line.

13 SAMPLE AND STATISTICAL DATA ANALYSIS o The graph explains that there exists few critical lines. o When simulation was applied to Northern Chinese power grid it was observed that there are 48 events lead to system unstable, and they are all multiple failure events.

14 IMPROVEMENTS PROPOSED FOR ABOVE MODEL The magnitude of line impedance is taken as the weight of the edges which was assumed un-weighted in the above model. Line impedance which reflects the electrical connection degree between nodes cant be ignored as it will differ amongst each other. In this model real power flow in edges is introduced as network flow in small world model since it is an essential factor in vulnerability analysis.

15 FORMULAE Considering weight of edges: o Considering Power flow :

16 COMPARISON o Vg=F(S,T), Where Vg indicates online tool for vulnerability analysis given as a function of state quantities and topology factors.

17 FLOW CHART FOR VULNERABILITY ANALYSIS

18 DIFFERENT TYPES OF ATTACKS Fig4. The distribution of node degree of power grid Fig5. The curve of global efficiency under different attacks o In this example it was assumed that the maximum degree of the substation is 14.The degree of seven substations in eight at 500KV is higher than 6, while another one is 5. o Fig5 shows that as the high degree nodes are taken off overall efficiency declines rapidly and when it reaches to 8.5% loss. o When attacks on the nodes are random, the change in the overall efficiency is relatively slight. Until about 80% nodes lose, in both the cases the power grid collapses.

19 CONCLUSION The nodes at high voltage level as well as the connective nodes have higher node degree, and they connect more closely. Once they break down, a serious blackout probably follows. The vulnerability of the system under attack is related to the types of the nodes. Under general attack, it is strong; if the nodes of high degree are under attack, it is vulnerable and a chain failure is tend to happen. Multiple failure happening on the nodes of low degree can easily lead to regional blackout. So we should strengthen monitoring and consolidating the key nodes and lines, make sound prevention and control measures against the potential failure.

20 REFERENCES Stanley Milgram The Small-World problem Psychology study, vol. 1,no.1,May 1967 Duncan J.Watts & Steven H. Strogatz Collective dynamics of small-world networks Vol393, 4 th June Lu Zongxiang, Meng Zhongwei and Zhou Shuangxi. Cascading failure analysis of bulk power system using small-world network model. Proceedings of the 8th International Conference on Probabilistic Methods Applied to Power Systems, Iowa State University, Ames Iowa, pp ,2004. Jian Ding, Xiaomin Bai, Wei Zhao, Zhu Fang, Zaihua Li and Min Liu The improvement of the Small-world network model and its application research in Bulk power system International conference on power system technology. Li Fu, Wenjie Huang, Sheng Xiao, Yuan Li and Shifan Guo Vulnerability Assessment for power grid based on Small-world topological model 2010 IEEE.

21

Complex Networks. Structure and Dynamics

Complex Networks. Structure and Dynamics Complex Networks Structure and Dynamics Ying-Cheng Lai Department of Mathematics and Statistics Department of Electrical Engineering Arizona State University Collaborators! Adilson E. Motter, now at Max-Planck

More information

ECS 253 / MAE 253, Lecture 8 April 21, Web search and decentralized search on small-world networks

ECS 253 / MAE 253, Lecture 8 April 21, Web search and decentralized search on small-world networks ECS 253 / MAE 253, Lecture 8 April 21, 2016 Web search and decentralized search on small-world networks Search for information Assume some resource of interest is stored at the vertices of a network: Web

More information

Network Thinking. Complexity: A Guided Tour, Chapters 15-16

Network Thinking. Complexity: A Guided Tour, Chapters 15-16 Network Thinking Complexity: A Guided Tour, Chapters 15-16 Neural Network (C. Elegans) http://gephi.org/wp-content/uploads/2008/12/screenshot-celegans.png Food Web http://1.bp.blogspot.com/_vifbm3t8bou/sbhzqbchiei/aaaaaaaaaxk/rsc-pj45avc/

More information

International Journal of Emerging Electric Power Systems

International Journal of Emerging Electric Power Systems International Journal of Emerging Electric Power Systems Volume 8, Issue 6 2007 Article 4 Vulnerability Assessment of Power Grid Using Graph Topological Indices Charles J. Kim Obinna B. Obah Howard University,

More information

Examples of Complex Networks

Examples of Complex Networks Examples of Complex Networks Neural Network (C. Elegans) http://gephi.org/wp-content/uploads/2008/12/screenshot-celegans.png Food Web http://1.bp.blogspot.com/_vifbm3t8bou/sbhzqbchiei/aaaaaaaaaxk/rsc-

More information

CSCI5070 Advanced Topics in Social Computing

CSCI5070 Advanced Topics in Social Computing CSCI5070 Advanced Topics in Social Computing Irwin King The Chinese University of Hong Kong king@cse.cuhk.edu.hk!! 2012 All Rights Reserved. Outline Graphs Origins Definition Spectral Properties Type of

More information

Introduction to Engineering Systems, ESD.00. Networks. Lecturers: Professor Joseph Sussman Dr. Afreen Siddiqi TA: Regina Clewlow

Introduction to Engineering Systems, ESD.00. Networks. Lecturers: Professor Joseph Sussman Dr. Afreen Siddiqi TA: Regina Clewlow Introduction to Engineering Systems, ESD.00 Lecture 7 Networks Lecturers: Professor Joseph Sussman Dr. Afreen Siddiqi TA: Regina Clewlow The Bridges of Königsberg The town of Konigsberg in 18 th century

More information

Using Complex Network in Wireless Sensor Networks Abstract Keywords: 1. Introduction

Using Complex Network in Wireless Sensor Networks Abstract Keywords: 1. Introduction Using Complex Network in Wireless Sensor Networks Amit Munjal, Anurag Singh, Yatindra Nath Singh Electrical Engineering Department Indian Institute of Technology Kanpur Kanpur, India Email: {amitm, anuragsg,

More information

Quality Assessment of Power Dispatching Data Based on Improved Cloud Model

Quality Assessment of Power Dispatching Data Based on Improved Cloud Model Quality Assessment of Power Dispatching Based on Improved Cloud Model Zhaoyang Qu, Shaohua Zhou *. School of Information Engineering, Northeast Electric Power University, Jilin, China Abstract. This paper

More information

beyond social networks

beyond social networks beyond social networks Small world phenomenon: high clustering C network >> C random graph low average shortest path l network ln( N)! neural network of C. elegans,! semantic networks of languages,! actor

More information

Small World Properties Generated by a New Algorithm Under Same Degree of All Nodes

Small World Properties Generated by a New Algorithm Under Same Degree of All Nodes Commun. Theor. Phys. (Beijing, China) 45 (2006) pp. 950 954 c International Academic Publishers Vol. 45, No. 5, May 15, 2006 Small World Properties Generated by a New Algorithm Under Same Degree of All

More information

Warship Power System Survivability Evaluation Based on Complex Network Theory Huiying He1,a, Hongjiang Li1, Shaochang Chen1 and Hao Xiong1,2,b

Warship Power System Survivability Evaluation Based on Complex Network Theory Huiying He1,a, Hongjiang Li1, Shaochang Chen1 and Hao Xiong1,2,b International Industrial Informatics and Computer Engineering Conference (IIICEC 05) Warship Power System Survivability Evaluation Based on Complex Network Theory Huiying He,a, Hongjiang Li, Shaochang

More information

Critical Phenomena in Complex Networks

Critical Phenomena in Complex Networks Critical Phenomena in Complex Networks Term essay for Physics 563: Phase Transitions and the Renormalization Group University of Illinois at Urbana-Champaign Vikyath Deviprasad Rao 11 May 2012 Abstract

More information

Design of an Intelligent PH Sensor for Aquaculture Industry

Design of an Intelligent PH Sensor for Aquaculture Industry Design of an Intelligent PH Sensor for Aquaculture Industry Haijiang Tai 1, Qisheng Ding 1,2,*, Daoliang Li 1,**, and aoguang Wei 1 1 College of Information and Electrical Engineering, China Agricultural

More information

Math 443/543 Graph Theory Notes 10: Small world phenomenon and decentralized search

Math 443/543 Graph Theory Notes 10: Small world phenomenon and decentralized search Math 443/543 Graph Theory Notes 0: Small world phenomenon and decentralized search David Glickenstein November 0, 008 Small world phenomenon The small world phenomenon is the principle that all people

More information

Controllability of Complex Power Networks

Controllability of Complex Power Networks Network and Communication Technologies; Vol. 3, No. 1; 018 ISSN 197-064X E-ISSN 197-0658 Published by Canadian Center of Science and Education Controllability of Complex Power Networks Guohua Zhang 1,

More information

TELCOM2125: Network Science and Analysis

TELCOM2125: Network Science and Analysis School of Information Sciences University of Pittsburgh TELCOM2125: Network Science and Analysis Konstantinos Pelechrinis Spring 2015 Figures are taken from: M.E.J. Newman, Networks: An Introduction 2

More information

On the Expansion of Access Bandwidth of Manufacturing Cloud Core Network

On the Expansion of Access Bandwidth of Manufacturing Cloud Core Network 1288 JOURNAL OF SOFTWARE, VOL. 9, NO. 5, MAY 2014 On the Expansion of Access Bandwidth of Manufacturing Cloud Core Network Hongyao Ju Zhejiang Textile & Fashion College, NingBo 315211, P.R.China Email:

More information

Example 1: An algorithmic view of the small world phenomenon

Example 1: An algorithmic view of the small world phenomenon Lecture Notes: Social Networks: Models, Algorithms, and Applications Lecture 1: Jan 17, 2012 Scribes: Preethi Ambati and Azar Aliyev Example 1: An algorithmic view of the small world phenomenon The story

More information

Distribution Network Reconfiguration Based on Relevance Vector Machine

Distribution Network Reconfiguration Based on Relevance Vector Machine 2016 International Conference on Artificial Intelligence: Techniques and Applications (AITA 2016) ISBN: 978-1-60595-389-2 Distribution Network Reconfiguration Based on Relevance Vector Machine Sheng ZHOU

More information

1 Comparing networks, and why social networks are different

1 Comparing networks, and why social networks are different 1 Comparing networks, and why social networks are different The various measures of network structure that we have encountered so far allow us mainly to understand the structure of a single particular

More information

A PMU-Based Three-Step Controlled Separation with Transient Stability Considerations

A PMU-Based Three-Step Controlled Separation with Transient Stability Considerations Title A PMU-Based Three-Step Controlled Separation with Transient Stability Considerations Author(s) Wang, C; Hou, Y Citation The IEEE Power and Energy Society (PES) General Meeting, Washington, USA, 27-31

More information

Research on Heterogeneous Communication Network for Power Distribution Automation

Research on Heterogeneous Communication Network for Power Distribution Automation 3rd International Conference on Material, Mechanical and Manufacturing Engineering (IC3ME 2015) Research on Heterogeneous Communication Network for Power Distribution Automation Qiang YU 1,a*, Hui HUANG

More information

How smart can the grid really be?

How smart can the grid really be? How smart can the grid really be? by Dale Pudney, HVT Power Systems and Luo Wei, NR Electric With the improvement of electronic communications and computing technology, it becomes possible to integrate

More information

A Document as a Small World. selecting the term which co-occurs in multiple clusters. domains, from earthquake sequences [6] to register

A Document as a Small World. selecting the term which co-occurs in multiple clusters. domains, from earthquake sequences [6] to register A Document as a Small World Yutaka Matsuo y Yukio Ohsawa z Mitsuru Ishizuka y y Graduate School of Engineering University oftokyo Tokyo 113-8656, Japan z Graduate School of Systems Management University

More information

TOPOLOGICAL ANALYSIS AND MITIGATION STRATEGIES FOR CASCADING FAILURES IN POWER GRID NETWORKS SAKSHI PAHWA. B.E., Mumbai University, India, 2007

TOPOLOGICAL ANALYSIS AND MITIGATION STRATEGIES FOR CASCADING FAILURES IN POWER GRID NETWORKS SAKSHI PAHWA. B.E., Mumbai University, India, 2007 TOPOLOGICAL ANALYSIS AND MITIGATION STRATEGIES FOR CASCADING FAILURES IN POWER GRID NETWORKS by SAKSHI PAHWA B.E., Mumbai University, India, 2007 A THESIS submitted in partial fulfillment of the requirements

More information

Research on Power Quality Monitoring and Analyzing System Based on Embedded Technology

Research on Power Quality Monitoring and Analyzing System Based on Embedded Technology 2010 China International Conference on Electricity Distribution 1 Research on Power Quality Monitoring and Analyzing System Based on Embedded Technology Zhang Hong-tao, Ye Ying, An Qing China Zhoukou Power

More information

Failure in Complex Social Networks

Failure in Complex Social Networks Journal of Mathematical Sociology, 33:64 68, 2009 Copyright # Taylor & Francis Group, LLC ISSN: 0022-250X print/1545-5874 online DOI: 10.1080/00222500802536988 Failure in Complex Social Networks Damon

More information

Networks and stability

Networks and stability Networks and stability Part 1A. Network topology www.weaklink.sote.hu csermelypeter@yahoo.com Peter Csermely 1. network topology 2. network dynamics 3. examples for networks 4. synthesis (complex equilibria,

More information

Research Article Vulnerability Analysis of Interdependent Scale-Free Networks with Complex Coupling

Research Article Vulnerability Analysis of Interdependent Scale-Free Networks with Complex Coupling Hindawi Electrical and Computer Engineering Volume 2017, Article ID 9080252, 5 pages https://doi.org/10.1155/2017/9080252 Research Article Vulnerability Analysis of Interdependent Scale-Free Networks with

More information

Methods of Technical Risk Assessment in a Regional Context

Methods of Technical Risk Assessment in a Regional Context Methods of Technical Risk Assessment in a Regional Context Wolfgang Kröger, Professor and Head of former Laboratory for Safety Analysis (www.lsa.ethz.ch) Founding Rector of International Risk Governance

More information

A Dynamic TDMA Protocol Utilizing Channel Sense

A Dynamic TDMA Protocol Utilizing Channel Sense International Conference on Electromechanical Control Technology and Transportation (ICECTT 2015) A Dynamic TDMA Protocol Utilizing Channel Sense ZHOU De-min 1, a, LIU Yun-jiang 2,b and LI Man 3,c 1 2

More information

Simulating Smart Grid Cascade Failure Mitigation

Simulating Smart Grid Cascade Failure Mitigation Simulating Smart Grid Cascade Failure Mitigation Claudia Whitten Department of Computer Science California Institute of Technology Pasadena, CA 91126 whitten@caltech.edu ABSTRACT Smart grid power systems

More information

Overlay (and P2P) Networks

Overlay (and P2P) Networks Overlay (and P2P) Networks Part II Recap (Small World, Erdös Rényi model, Duncan Watts Model) Graph Properties Scale Free Networks Preferential Attachment Evolving Copying Navigation in Small World Samu

More information

The missing links in the BGP-based AS connectivity maps

The missing links in the BGP-based AS connectivity maps The missing links in the BGP-based AS connectivity maps Zhou, S; Mondragon, RJ http://arxiv.org/abs/cs/0303028 For additional information about this publication click this link. http://qmro.qmul.ac.uk/xmlui/handle/123456789/13070

More information

arxiv:cond-mat/ v1 [cond-mat.dis-nn] 7 Jan 2004

arxiv:cond-mat/ v1 [cond-mat.dis-nn] 7 Jan 2004 Structural Vulnerability of the North American Power Grid Réka Albert 1,2 István Albert 2 and Gary L. Nakarado 3 arxiv:cond-mat/0401084v1 [cond-mat.dis-nn] 7 Jan 2004 1. Department of Physics, Pennsylvania

More information

USE CASE 13 ADAPTIVE TRANSMISSION LINE PROTECTION

USE CASE 13 ADAPTIVE TRANSMISSION LINE PROTECTION H USE CASE 13 ADAPTIVE TRANSMISSION LINE PROTECTION Use Case Title Adaptive Transmission Line Protection Use Case Summary The requirements for improvement in the performance of protection relays under

More information

Design Robust Networks against Overload-Based Cascading Failures

Design Robust Networks against Overload-Based Cascading Failures Design Robust Networks against Overload-Based Cascading Failures Hoang Anh Q. Tran *1, Akira Namatame 2 Dept. of Computer Science, National Defense Academy of Japan, Yokosuka, Kanagawa, Japan *1 ed13004@nda.ac.jp;

More information

Cascading failures in complex networks with community structure

Cascading failures in complex networks with community structure International Journal of Modern Physics C Vol. 25, No. 5 (2014) 1440005 (10 pages) #.c World Scienti c Publishing Company DOI: 10.1142/S0129183114400051 Cascading failures in complex networks with community

More information

Analysis and Modeling

Analysis and Modeling Guillaume Guérard A Complex System Approach for SMART GRID Analysis and Modeling KES 12 September 2012 1 Problematic Thesis: Optimization in complex networks. Problem: Optimization of the energy distribution

More information

Optimal weighting scheme for suppressing cascades and traffic congestion in complex networks

Optimal weighting scheme for suppressing cascades and traffic congestion in complex networks Optimal weighting scheme for suppressing cascades and traffic congestion in complex networks Rui Yang, 1 Wen-Xu Wang, 1 Ying-Cheng Lai, 1,2 and Guanrong Chen 3 1 Department of Electrical Engineering, Arizona

More information

Enhancing the Computing Efficiency of Power System Dynamic Analysis with PSS_E

Enhancing the Computing Efficiency of Power System Dynamic Analysis with PSS_E Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009 Enhancing the Computing Efficiency of Power System Dynamic Analysis with PSS_E

More information

A SourceForge.net Project: tmans, an Agentbased Neural Network Simulator, Repast, and SourceForge CVS

A SourceForge.net Project: tmans, an Agentbased Neural Network Simulator, Repast, and SourceForge CVS A SourceForge.net Project: tmans, an Agentbased Neural Network Simulator, Repast, and SourceForge CVS John Korecki Computer Science & Engineering REU University of Notre Dame Fall 04 - Spring 05 September

More information

Load Distribution Vector Based Attack Strategies against Power Grid Systems

Load Distribution Vector Based Attack Strategies against Power Grid Systems Load Distribution Vector Based Attack Strategies against Power Grid Systems Yihai Zhu, Yan (Lindsay) Sun, and Haibo He Department of Electrical, Computer, and Biomedical Engineering, University of Rhode

More information

Geomagnetic Disturbances

Geomagnetic Disturbances Geomagnetic Disturbances Managing Risk to the North American Power Grid Mark Olson, Reliability Standards Developer Worcester Polytechnic Institute Energy Symposium September 25, 2013 About NERC The North

More information

Real Time Monitoring of

Real Time Monitoring of Real Time Monitoring of Cascading Events Mladen Kezunovic Nan Zhang, Hongbiao Song Texas A&M University Tele-Seminar, March 28, 2006 Project Reports (S-19) M. Kezunovic, H. Song and N. Zhang, Detection,

More information

M.E.J. Newman: Models of the Small World

M.E.J. Newman: Models of the Small World A Review Adaptive Informatics Research Centre Helsinki University of Technology November 7, 2007 Vocabulary N number of nodes of the graph l average distance between nodes D diameter of the graph d is

More information

ECS 289 / MAE 298, Lecture 9 April 29, Web search and decentralized search on small-worlds

ECS 289 / MAE 298, Lecture 9 April 29, Web search and decentralized search on small-worlds ECS 289 / MAE 298, Lecture 9 April 29, 2014 Web search and decentralized search on small-worlds Announcements HW2 and HW2b now posted: Due Friday May 9 Vikram s ipython and NetworkX notebooks posted Project

More information

RECONSTRUCTION OF LOW VOLTAGE DISTRIBUTION NETWORKS: FROM GIS DATA TO POWER FLOW MODELS

RECONSTRUCTION OF LOW VOLTAGE DISTRIBUTION NETWORKS: FROM GIS DATA TO POWER FLOW MODELS RECONSTRUCTION OF LOW VOLTAGE DISTRIBUTION NETWORKS: FROM GIS DATA TO POWER FLOW MODELS Alejandro NAVARRO-ESPINOSA and Luis F. OCHOA The University of Manchester UK alejandro.navarroespinosa@manchester.ac.uk

More information

RANDOM-REAL NETWORKS

RANDOM-REAL NETWORKS RANDOM-REAL NETWORKS 1 Random networks: model A random graph is a graph of N nodes where each pair of nodes is connected by probability p: G(N,p) Random networks: model p=1/6 N=12 L=8 L=10 L=7 The number

More information

A novel firing rule for training Kohonen selforganising

A novel firing rule for training Kohonen selforganising A novel firing rule for training Kohonen selforganising maps D. T. Pham & A. B. Chan Manufacturing Engineering Centre, School of Engineering, University of Wales Cardiff, P.O. Box 688, Queen's Buildings,

More information

Research on Coordinated Attack Protection Method Based on Global Time Synchronization System of Intelligent Substation

Research on Coordinated Attack Protection Method Based on Global Time Synchronization System of Intelligent Substation Journal of Network Computing and Applications (2019) 4: 14-20 Clausius Scientific Press, Canada DOI: 10.23977/jnca.2019.41003 EISSN 2371-9214 Research on Coordinated Attack Protection Method Based on Global

More information

Modelling Cascading Failure in Power Networks

Modelling Cascading Failure in Power Networks Modelling Cascading Failure in Power Networks Sydney, July 2017 Image: IEEEXplore C. K. Michael Tse WSCC System Blackout in 1996 July 1996 WSCC: Western System Coordinating Council, now called WESC, which

More information

An improved PageRank algorithm for Social Network User s Influence research Peng Wang, Xue Bo*, Huamin Yang, Shuangzi Sun, Songjiang Li

An improved PageRank algorithm for Social Network User s Influence research Peng Wang, Xue Bo*, Huamin Yang, Shuangzi Sun, Songjiang Li 3rd International Conference on Mechatronics and Industrial Informatics (ICMII 2015) An improved PageRank algorithm for Social Network User s Influence research Peng Wang, Xue Bo*, Huamin Yang, Shuangzi

More information

Research on Cyber-Physical Modeling for Smart Distribution Grid

Research on Cyber-Physical Modeling for Smart Distribution Grid Energy and Power Engineering, 2017, 9, 544-551 http://www.scirp.org/journal/epe ISSN Online: 1947-3818 ISSN Print: 1949-243X Research on Cyber-Physical Modeling for Smart Distribution Grid Xiaohong Guo

More information

Revealing Temporal Features of Attacks Against Smart Grid

Revealing Temporal Features of Attacks Against Smart Grid Revealing Temporal Features of Attacks Against Smart Grid Presenter: Yihai Zhu Authors: Jun Yan, Yihai Zhu, Yan Sun, Haibo He Dept. of Electrical, Computer & Biomedical Engineering University of Rhode

More information

CIM/E Oriented Graph Database Model Architecture and Parallel Network Topology Processing

CIM/E Oriented Graph Database Model Architecture and Parallel Network Topology Processing CIM/E Oriented Graph Model Architecture and Parallel Network Topology Processing Zhangxin Zhou a, b, Chen Yuan a, Ziyan Yao a, Jiangpeng Dai a, Guangyi Liu a, Renchang Dai a, Zhiwei Wang a, and Garng M.

More information

A Kind of Wireless Sensor Network Coverage Optimization Algorithm Based on Genetic PSO

A Kind of Wireless Sensor Network Coverage Optimization Algorithm Based on Genetic PSO Sensors & Transducers 2013 by IFSA http://www.sensorsportal.com A Kind of Wireless Sensor Network Coverage Optimization Algorithm Based on Genetic PSO Yinghui HUANG School of Electronics and Information,

More information

1 Degree Distributions

1 Degree Distributions Lecture Notes: Social Networks: Models, Algorithms, and Applications Lecture 3: Jan 24, 2012 Scribes: Geoffrey Fairchild and Jason Fries 1 Degree Distributions Last time, we discussed some graph-theoretic

More information

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 2000 747 A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks Yuhong Zhu, George N. Rouskas, Member,

More information

Battery Energy Storage System Information Modeling Based on IEC 61850

Battery Energy Storage System Information Modeling Based on IEC 61850 Journal of Power and Energy Engineering, 2014, 2, 233-238 Published Online April 2014 in SciRes. http://www.scirp.org/journal/jpee http://dx.doi.org/10.4236/jpee.2014.24033 Battery Energy Storage System

More information

Financial Information

Financial Information Financial Information sales led by improving momentum in new economies New economies: 10 points better than mature countries Solution and services: 6 points above group average Demand in mature countries

More information

Long distance wireless sensor networks applied in coal mine

Long distance wireless sensor networks applied in coal mine Procedia Earth and Planetary Science 1 (29) 1461 1467 Procedia Earth and Planetary Science www.elsevier.com/locate/procedia The 6 th International Conference on Mining Science & Technology Long distance

More information

Topology Enhancement in Wireless Multihop Networks: A Top-down Approach

Topology Enhancement in Wireless Multihop Networks: A Top-down Approach Topology Enhancement in Wireless Multihop Networks: A Top-down Approach Symeon Papavassiliou (joint work with Eleni Stai and Vasileios Karyotis) National Technical University of Athens (NTUA) School of

More information

The Research of Delay Characteristics in CAN Bus Networked Control System

The Research of Delay Characteristics in CAN Bus Networked Control System Journal of Computational Information Systems 9: 18 (2013) 7517 7523 Available at http://www.jofcis.com The Research of Delay Characteristics in CAN Bus Networked Control System Yi WANG 1, Liren HE 2, Ming

More information

Introduction to network metrics

Introduction to network metrics Universitat Politècnica de Catalunya Version 0.5 Complex and Social Networks (2018-2019) Master in Innovation and Research in Informatics (MIRI) Instructors Argimiro Arratia, argimiro@cs.upc.edu, http://www.cs.upc.edu/~argimiro/

More information

3rd International Conference on Mechanical Engineering and Intelligent Systems (ICMEIS 2015)

3rd International Conference on Mechanical Engineering and Intelligent Systems (ICMEIS 2015) 3rd International Conference on Mechanical Engineering and Intelligent Systems (ICMEIS 2015) Development Of SSP510 Frequency Voltage Emergency Control Device Qinghua Si 1,2,a *, Zhukun Li 1,2, Yunsong

More information

Small Worlds in Security Systems: an Analysis of the PGP Certificate Graph

Small Worlds in Security Systems: an Analysis of the PGP Certificate Graph Small Worlds in Security Systems: an Analysis of the PGP Certificate Graph Srdjan Čapkun, Levente Buttyán and Jean-Pierre Hubaux Laboratory for Computer Communications and Applications (LCA) School of

More information

Stability Assessment of Electric Power Systems using Growing Neural Gas and Self-Organizing Maps

Stability Assessment of Electric Power Systems using Growing Neural Gas and Self-Organizing Maps Stability Assessment of Electric Power Systems using Growing Gas and Self-Organizing Maps Christian Rehtanz, Carsten Leder University of Dortmund, 44221 Dortmund, Germany Abstract. Liberalized competitive

More information

Journal of Chemical and Pharmaceutical Research, 2015, 7(3): Research Article

Journal of Chemical and Pharmaceutical Research, 2015, 7(3): Research Article Available online www.jocpr.com Journal of Chemical and Pharmaceutical esearch, 015, 7(3):175-179 esearch Article ISSN : 0975-7384 CODEN(USA) : JCPC5 Thread image processing technology research based on

More information

Design of Coal Mine Power Supply Monitoring System

Design of Coal Mine Power Supply Monitoring System 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016) Design of Coal Mine Power Supply Monitoring System Lei Shi 1, Guo Jin 2 and Jun Xu 3 1 2 Department of electronic

More information

Lightning Protection Performance Assessment of Transmission Line Based on ATP model Automatic Generation

Lightning Protection Performance Assessment of Transmission Line Based on ATP model Automatic Generation MATEC Web of Conferences 55, 03001 () DOI: 10.1051/ matecconf/5503001 Lightning Protection Performance Assessment of Transmission Line Based on ATP model Automatic Generation Luo Hanwu 1, Li Mengke 1,

More information

TCM Health-keeping Proverb English Translation Management Platform based on SQL Server Database

TCM Health-keeping Proverb English Translation Management Platform based on SQL Server Database 2019 2nd International Conference on Computer Science and Advanced Materials (CSAM 2019) TCM Health-keeping Proverb English Translation Management Platform based on SQL Server Database Qiuxia Zeng1, Jianpeng

More information

Web 2.0 Social Data Analysis

Web 2.0 Social Data Analysis Web 2.0 Social Data Analysis Ing. Jaroslav Kuchař jaroslav.kuchar@fit.cvut.cz Structure(1) Czech Technical University in Prague, Faculty of Information Technologies Software and Web Engineering 2 Contents

More information

Systems, ESD.00. Networks II. Lecture 8. Lecturers: Professor Joseph Sussman Dr. Afreen Siddiqi TA: Regina Clewlow

Systems, ESD.00. Networks II. Lecture 8. Lecturers: Professor Joseph Sussman Dr. Afreen Siddiqi TA: Regina Clewlow Introduction to Engineering Systems, ESD.00 Networks II Lecture 8 Lecturers: Professor Joseph Sussman Dr. Afreen Siddiqi TA: Regina Clewlow Outline Introduction to networks Infrastructure networks Institutional

More information

Distributed Network Routing Algorithms Table for Small World Networks

Distributed Network Routing Algorithms Table for Small World Networks Distributed Network Routing Algorithms Table for Small World Networks Mudit Dholakia 1 1 Department of Computer Engineering, VVP Engineering College, Rajkot, 360005, India, Email:muditdholakia@gmail.com

More information

Reliability Assessment and Modeling of Cyber Enabled Power Systems with Renewable Sources and Energy Storage

Reliability Assessment and Modeling of Cyber Enabled Power Systems with Renewable Sources and Energy Storage Reliability Assessment and Modeling of Cyber Enabled Power Systems with Renewable Sources and Energy Storage Final Project Report T-53 Power Systems Engineering Research Center Empowering Minds to Engineer

More information

USE CASE 14 CONTROLLED ISLANDING

USE CASE 14 CONTROLLED ISLANDING I USE CASE 14 CONTROLLED ISLANDING Use Case Title Centralized application separates grid into islands to prevent blackout Use Case Summary Controlled islanding is a method that can significantly improve

More information

Complex networks: A mixture of power-law and Weibull distributions

Complex networks: A mixture of power-law and Weibull distributions Complex networks: A mixture of power-law and Weibull distributions Ke Xu, Liandong Liu, Xiao Liang State Key Laboratory of Software Development Environment Beihang University, Beijing 100191, China Abstract:

More information

High Resolution Remote Sensing Image Classification based on SVM and FCM Qin LI a, Wenxing BAO b, Xing LI c, Bin LI d

High Resolution Remote Sensing Image Classification based on SVM and FCM Qin LI a, Wenxing BAO b, Xing LI c, Bin LI d 2nd International Conference on Electrical, Computer Engineering and Electronics (ICECEE 2015) High Resolution Remote Sensing Image Classification based on SVM and FCM Qin LI a, Wenxing BAO b, Xing LI

More information

NETWORK FLOW WITH FUZZY ARC LENGTHS USING HAAR RANKING

NETWORK FLOW WITH FUZZY ARC LENGTHS USING HAAR RANKING NETWORK FLOW WITH FUZZY ARC LENGTHS USING HAAR RANKING S. Dhanasekar 1, S. Hariharan, P. Sekar and Kalyani Desikan 3 1 Vellore Institute of Technology, Chennai Campus, Chennai, India CKN College for Men,

More information

Excavation Balance Routing Algorithm Simulation Based on Fuzzy Ant Colony

Excavation Balance Routing Algorithm Simulation Based on Fuzzy Ant Colony 2018 5th International Conference on Electrical & Electronics Engineering and Computer Science (ICEEECS 2018) Excavation Balance Routing Algorithm Simulation Based on Fuzzy Ant Colony Luo Xiaojuan, Yan

More information

Improving Real-time Fault Analysis and Validating Relay Operations to Prevent or Mitigate Cascading Blackouts

Improving Real-time Fault Analysis and Validating Relay Operations to Prevent or Mitigate Cascading Blackouts 1 Improving Real-time Fault Analysis and Validating Relay Operations to Prevent or Mitigate Cascading Blackouts Nan Zhang, Student Member, IEEE, and Mladen Kezunovic, Fellow, IEEE Abstract This paper proposes

More information

A Statistical Method for Synthetic Power Grid Generation based on the U.S. Western Interconnection

A Statistical Method for Synthetic Power Grid Generation based on the U.S. Western Interconnection A Statistical Method for Synthetic Power Grid Generation based on the U.S. Western Interconnection Saleh Soltan, Gil Zussman Columbia University New York, NY Failures in Power Grids One of the most essential

More information

arxiv: v2 [physics.soc-ph] 21 Mar 2012

arxiv: v2 [physics.soc-ph] 21 Mar 2012 The Power Grid as a Complex Network: a Survey Giuliano Andrea Pagani and Marco Aiello Distributed Systems Group Johann Bernoulli Institute for Mathematics and Computer Science University of Groningen Groningen,

More information

Chapter X Security Performance Metrics

Chapter X Security Performance Metrics Chapter X Security Performance Metrics Page 1 of 10 Chapter X Security Performance Metrics Background For many years now, NERC and the electricity industry have taken actions to address cyber and physical

More information

Geomagnetic Disturbances and High-Altitude Electromagnetic Pulse Research

Geomagnetic Disturbances and High-Altitude Electromagnetic Pulse Research Geomagnetic Disturbances and High-Altitude Electromagnetic Pulse Research Bob Arritt, Technical Executive Grid Operations and Planning, Electric Power Research Institute Grid Security Conference (GridSecCon)

More information

Cyber Vulnerabilities on Agent-based Smart Grid Protection System

Cyber Vulnerabilities on Agent-based Smart Grid Protection System Cyber Vulnerabilities on Agent-based Smart Grid Protection System Md Shihanur Rahman and Hemanshu R. Pota School of Engineering and Information Technology University of New South Wales PO Box 796, Canberra

More information

Risk Assessment of Damages due to Lightning Discharges: A Case Study to a Telecommunication System in Singburi Province of Thailand.

Risk Assessment of Damages due to Lightning Discharges: A Case Study to a Telecommunication System in Singburi Province of Thailand. Proceedings of the 2007 WSEAS Int. Conference on Circuits, Systems, Signal and s, Gold Coast, Australia, January 17-19, 2007 216 Risk Assessment of Damages due to Lightning Discharges: A Case Study to

More information

Topology Affects the Efficiency of Network Coding in Peer-to-Peer Networks

Topology Affects the Efficiency of Network Coding in Peer-to-Peer Networks Topology Affects the Efficiency of Network Coding in Peer-to-Peer Networks Tara Small, Baochun Li, and Ben Liang Department of Electrical and Computer Engineering University of Toronto {tsmall, bli}@eecg.toronto.edu,

More information

Design and application of computer network system integration based on network topology

Design and application of computer network system integration based on network topology Acta Technica 62 No. 1B/2017, 79 88 c 2017 Institute of Thermomechanics CAS, v.v.i. Design and application of computer network system integration based on network topology Shuna Zhou 1 Abstract. To explore

More information

A New Algorithm for Black-start Zone Partitioning Based on Fuzzy Clustering Analysis

A New Algorithm for Black-start Zone Partitioning Based on Fuzzy Clustering Analysis Energy and Power Engineering, 2013, 5, 763-768 doi:10.4236/epe.2013.54b147 Published Online July 2013 (http://www.scirp.org/journal/epe) A New Algorithm for Black-start Zone Partitioning Based on Fuzzy

More information

The Sequential Attack against Power Grid Networks. Associate Professor at University of Rhode Island

The Sequential Attack against Power Grid Networks. Associate Professor at University of Rhode Island The Sequential Attack against Power Grid Networks Yihai i Zhu, Jun Yan, YfiT Yufei Tang, Yan (Lindsay) Sun, Haibo Hib He Presenter: Yan (Lindsay) Sun Associate Professor at University of Rhode Island Email:

More information

Open Access Research on the Prediction Model of Material Cost Based on Data Mining

Open Access Research on the Prediction Model of Material Cost Based on Data Mining Send Orders for Reprints to reprints@benthamscience.ae 1062 The Open Mechanical Engineering Journal, 2015, 9, 1062-1066 Open Access Research on the Prediction Model of Material Cost Based on Data Mining

More information

Small-world networks

Small-world networks Small-world networks c A. J. Ganesh, University of Bristol, 2015 Popular folklore asserts that any two people in the world are linked through a chain of no more than six mutual acquaintances, as encapsulated

More information

Research on Invulnerability of Wireless Sensor Networks Based on Complex Network Topology Structure

Research on Invulnerability of Wireless Sensor Networks Based on Complex Network Topology Structure Research on Invulnerability of Wireless Sensor Networks Based on Complex Network Topology Structure https://doi.org/10.3991/ijoe.v13i03.6863 Zhigang Zhao Zhejiang University of Media and Communications,

More information

A Hybrid Communication Architecture for Internet of Things (IOT) Application in Smart Grid

A Hybrid Communication Architecture for Internet of Things (IOT) Application in Smart Grid A Hybrid Communication Architecture for Internet of Things (IOT) Application in Smart Grid Yijia Cao Hunan University, China 2014-10 10-21 OUTLINE 1 IOT Application in Smart Grid 2 3 Requirements for Communication

More information

A Data Classification Algorithm of Internet of Things Based on Neural Network

A Data Classification Algorithm of Internet of Things Based on Neural Network A Data Classification Algorithm of Internet of Things Based on Neural Network https://doi.org/10.3991/ijoe.v13i09.7587 Zhenjun Li Hunan Radio and TV University, Hunan, China 278060389@qq.com Abstract To

More information

C I R E D 22 nd International Conference on Electricity Distribution Stockholm, June 2013

C I R E D 22 nd International Conference on Electricity Distribution Stockholm, June 2013 C I R E D 22 nd International Conference on Electricity Distribution Stockholm, 0-3 June 203 Paper 399 PROTECTION OPERATION ANALYSIS IN SMART GRIDS Alexander Apostolov OMICRON electronics - USA alex.apostolov@omicronusa.com

More information

Design of Substation and Distribution Station Monitoring System Based on DELPHI and Intelligent Modules

Design of Substation and Distribution Station Monitoring System Based on DELPHI and Intelligent Modules Journal of Information Hiding and Multimedia Signal Processing c 2016 ISSN 2073-4212 Ubiquitous International Volume 7, Number 4, July 2016 Design of Substation and Distribution Station Monitoring System

More information