SMALL WORLD NETWORK. -Naveen Teja Vempati -Ravi Teja Mitta
|
|
- Gwen Fields
- 5 years ago
- Views:
Transcription
1 SMALL WORLD NETWORK -Naveen Teja Vempati -Ravi Teja Mitta
2 INTRODUCTION Every person in this world is some way or other connected by some means is the idea behind evolution of small world phenomenon. Later Harvard approach and MIT approach to study small world had been developed. Through MIT approach widening of the chain and breakage of links is studied. Out of many chains found between source and target, the shortest path found to be with in six intermediaries. Six degrees of separation came into existence as a result of Harvard approach.
3 DEFINITION A mathematical graph based on concept that every target node can be reached from every other node by less number of steps.
4 FEATURES OF SMALL WORLD NETWORK The Topology of the network is studied based on the Clustering Coefficient C(p): measures the degree to which nodes cluster together. Characteristic path length L(p): measures the separation between two nodes in the graph where L(p) is directly proportional to logarithm of nodes between them. C(p) >> C random and L(p)>> L random. Rewired edges must connect to vertices that would otherwise be farther than L random.
5 RESEMBLANCE Many technological networks were found to lie between regular and random networks. By analogy people found following systems in accordance with small world phenomenon. Neural network of worm Caernorhabditis elegan. Power grid of Western United States. Collaboration graph of film actors.
6 SIMULATION RESULTS OF DISEASE SPREADING 1.Charactersitic path length L(P) and clustering coefficient C(P) of small world network. 2. Critical infectiousness r half at which disease spreads resembles clustering coefficient curve. Fig 1 Fig2. Fig3. 3. Time to spread resembles L(p) curve
7 APPLICATION TO SMART GRID In the recent past, Black-Outs occurred repeatedly in United States, UK, Australia, Russia and many other countries. All these black-outs experienced a cascading proceeding. Redistribution of load in case of failure and there by corresponding neighborhood lines are overloaded leading to cascading failures. Many kinds of complex systems in nature and society are tested to study the cause of black-out. Fortunately collective dynamics of small world network gave good explanation about black-out.
8 PRIMARY ASSUMPTIONS All edges in reality high voltage transmission lines are assumed to be undirected(bidirectional). Nodes of the network treated to be identical and featureless a) Generators b) Transformers c) Substations o All transmission lines are assumed to be identical ignoring the fact that voltage varies considerably. o The node of ground is ignored, the parallel lines are combined and graph is made to look simple.
9 STATISTIC PARAMETERS OF ELECTRICAL NETWORKS o From the above results we observe that the Chinese power gird exhibits similar properties as that of the WSPG there by confirming that it is also a small world network.
10 TYPES OF CASCADING FAILURES 1. Failure of node: o High centrality is characteristic of high degree node which is basically defined as the load capability. o Removal of vertices with high centrality will worsen the networks functionality. o Changes the balance of flows leads to a global redistribution of loads over the entire network o It can be either random breakdown or intentional attacks. o Chinese and US power grids exhibit heterogeneous distribution of loads per node.
11 2.Failure of Tie line: o Inner vertices within local clusters are connected together tightly while there exists few external tie lines connecting them(low coupling) o Tie lines are respected as main contributors to characteristic path length of small-world network. o For example in case of Chinese power gird there exists only single line between Sichan-Chongquing province power grid and Center Chinese power grid. o So failure of these lines can change the structure and property of networks to a great extent.
12 CASCADING FAILURE MODES ANALYSIS Practically both failure of nodes and tie lines are often mixed together in cascading. So Monte-Carlo simulation was used to test the different effects of different failure events. In this approach even equal area criterion was used to determine the stability of the system. If the system is unstable, author assumed that a cascading failure occurs. In all the failure events occurred there exists at least one or more critical node or critical line.
13 SAMPLE AND STATISTICAL DATA ANALYSIS o The graph explains that there exists few critical lines. o When simulation was applied to Northern Chinese power grid it was observed that there are 48 events lead to system unstable, and they are all multiple failure events.
14 IMPROVEMENTS PROPOSED FOR ABOVE MODEL The magnitude of line impedance is taken as the weight of the edges which was assumed un-weighted in the above model. Line impedance which reflects the electrical connection degree between nodes cant be ignored as it will differ amongst each other. In this model real power flow in edges is introduced as network flow in small world model since it is an essential factor in vulnerability analysis.
15 FORMULAE Considering weight of edges: o Considering Power flow :
16 COMPARISON o Vg=F(S,T), Where Vg indicates online tool for vulnerability analysis given as a function of state quantities and topology factors.
17 FLOW CHART FOR VULNERABILITY ANALYSIS
18 DIFFERENT TYPES OF ATTACKS Fig4. The distribution of node degree of power grid Fig5. The curve of global efficiency under different attacks o In this example it was assumed that the maximum degree of the substation is 14.The degree of seven substations in eight at 500KV is higher than 6, while another one is 5. o Fig5 shows that as the high degree nodes are taken off overall efficiency declines rapidly and when it reaches to 8.5% loss. o When attacks on the nodes are random, the change in the overall efficiency is relatively slight. Until about 80% nodes lose, in both the cases the power grid collapses.
19 CONCLUSION The nodes at high voltage level as well as the connective nodes have higher node degree, and they connect more closely. Once they break down, a serious blackout probably follows. The vulnerability of the system under attack is related to the types of the nodes. Under general attack, it is strong; if the nodes of high degree are under attack, it is vulnerable and a chain failure is tend to happen. Multiple failure happening on the nodes of low degree can easily lead to regional blackout. So we should strengthen monitoring and consolidating the key nodes and lines, make sound prevention and control measures against the potential failure.
20 REFERENCES Stanley Milgram The Small-World problem Psychology study, vol. 1,no.1,May 1967 Duncan J.Watts & Steven H. Strogatz Collective dynamics of small-world networks Vol393, 4 th June Lu Zongxiang, Meng Zhongwei and Zhou Shuangxi. Cascading failure analysis of bulk power system using small-world network model. Proceedings of the 8th International Conference on Probabilistic Methods Applied to Power Systems, Iowa State University, Ames Iowa, pp ,2004. Jian Ding, Xiaomin Bai, Wei Zhao, Zhu Fang, Zaihua Li and Min Liu The improvement of the Small-world network model and its application research in Bulk power system International conference on power system technology. Li Fu, Wenjie Huang, Sheng Xiao, Yuan Li and Shifan Guo Vulnerability Assessment for power grid based on Small-world topological model 2010 IEEE.
21
Complex Networks. Structure and Dynamics
Complex Networks Structure and Dynamics Ying-Cheng Lai Department of Mathematics and Statistics Department of Electrical Engineering Arizona State University Collaborators! Adilson E. Motter, now at Max-Planck
More informationECS 253 / MAE 253, Lecture 8 April 21, Web search and decentralized search on small-world networks
ECS 253 / MAE 253, Lecture 8 April 21, 2016 Web search and decentralized search on small-world networks Search for information Assume some resource of interest is stored at the vertices of a network: Web
More informationNetwork Thinking. Complexity: A Guided Tour, Chapters 15-16
Network Thinking Complexity: A Guided Tour, Chapters 15-16 Neural Network (C. Elegans) http://gephi.org/wp-content/uploads/2008/12/screenshot-celegans.png Food Web http://1.bp.blogspot.com/_vifbm3t8bou/sbhzqbchiei/aaaaaaaaaxk/rsc-pj45avc/
More informationInternational Journal of Emerging Electric Power Systems
International Journal of Emerging Electric Power Systems Volume 8, Issue 6 2007 Article 4 Vulnerability Assessment of Power Grid Using Graph Topological Indices Charles J. Kim Obinna B. Obah Howard University,
More informationExamples of Complex Networks
Examples of Complex Networks Neural Network (C. Elegans) http://gephi.org/wp-content/uploads/2008/12/screenshot-celegans.png Food Web http://1.bp.blogspot.com/_vifbm3t8bou/sbhzqbchiei/aaaaaaaaaxk/rsc-
More informationCSCI5070 Advanced Topics in Social Computing
CSCI5070 Advanced Topics in Social Computing Irwin King The Chinese University of Hong Kong king@cse.cuhk.edu.hk!! 2012 All Rights Reserved. Outline Graphs Origins Definition Spectral Properties Type of
More informationIntroduction to Engineering Systems, ESD.00. Networks. Lecturers: Professor Joseph Sussman Dr. Afreen Siddiqi TA: Regina Clewlow
Introduction to Engineering Systems, ESD.00 Lecture 7 Networks Lecturers: Professor Joseph Sussman Dr. Afreen Siddiqi TA: Regina Clewlow The Bridges of Königsberg The town of Konigsberg in 18 th century
More informationUsing Complex Network in Wireless Sensor Networks Abstract Keywords: 1. Introduction
Using Complex Network in Wireless Sensor Networks Amit Munjal, Anurag Singh, Yatindra Nath Singh Electrical Engineering Department Indian Institute of Technology Kanpur Kanpur, India Email: {amitm, anuragsg,
More informationQuality Assessment of Power Dispatching Data Based on Improved Cloud Model
Quality Assessment of Power Dispatching Based on Improved Cloud Model Zhaoyang Qu, Shaohua Zhou *. School of Information Engineering, Northeast Electric Power University, Jilin, China Abstract. This paper
More informationbeyond social networks
beyond social networks Small world phenomenon: high clustering C network >> C random graph low average shortest path l network ln( N)! neural network of C. elegans,! semantic networks of languages,! actor
More informationSmall World Properties Generated by a New Algorithm Under Same Degree of All Nodes
Commun. Theor. Phys. (Beijing, China) 45 (2006) pp. 950 954 c International Academic Publishers Vol. 45, No. 5, May 15, 2006 Small World Properties Generated by a New Algorithm Under Same Degree of All
More informationWarship Power System Survivability Evaluation Based on Complex Network Theory Huiying He1,a, Hongjiang Li1, Shaochang Chen1 and Hao Xiong1,2,b
International Industrial Informatics and Computer Engineering Conference (IIICEC 05) Warship Power System Survivability Evaluation Based on Complex Network Theory Huiying He,a, Hongjiang Li, Shaochang
More informationCritical Phenomena in Complex Networks
Critical Phenomena in Complex Networks Term essay for Physics 563: Phase Transitions and the Renormalization Group University of Illinois at Urbana-Champaign Vikyath Deviprasad Rao 11 May 2012 Abstract
More informationDesign of an Intelligent PH Sensor for Aquaculture Industry
Design of an Intelligent PH Sensor for Aquaculture Industry Haijiang Tai 1, Qisheng Ding 1,2,*, Daoliang Li 1,**, and aoguang Wei 1 1 College of Information and Electrical Engineering, China Agricultural
More informationMath 443/543 Graph Theory Notes 10: Small world phenomenon and decentralized search
Math 443/543 Graph Theory Notes 0: Small world phenomenon and decentralized search David Glickenstein November 0, 008 Small world phenomenon The small world phenomenon is the principle that all people
More informationControllability of Complex Power Networks
Network and Communication Technologies; Vol. 3, No. 1; 018 ISSN 197-064X E-ISSN 197-0658 Published by Canadian Center of Science and Education Controllability of Complex Power Networks Guohua Zhang 1,
More informationTELCOM2125: Network Science and Analysis
School of Information Sciences University of Pittsburgh TELCOM2125: Network Science and Analysis Konstantinos Pelechrinis Spring 2015 Figures are taken from: M.E.J. Newman, Networks: An Introduction 2
More informationOn the Expansion of Access Bandwidth of Manufacturing Cloud Core Network
1288 JOURNAL OF SOFTWARE, VOL. 9, NO. 5, MAY 2014 On the Expansion of Access Bandwidth of Manufacturing Cloud Core Network Hongyao Ju Zhejiang Textile & Fashion College, NingBo 315211, P.R.China Email:
More informationExample 1: An algorithmic view of the small world phenomenon
Lecture Notes: Social Networks: Models, Algorithms, and Applications Lecture 1: Jan 17, 2012 Scribes: Preethi Ambati and Azar Aliyev Example 1: An algorithmic view of the small world phenomenon The story
More informationDistribution Network Reconfiguration Based on Relevance Vector Machine
2016 International Conference on Artificial Intelligence: Techniques and Applications (AITA 2016) ISBN: 978-1-60595-389-2 Distribution Network Reconfiguration Based on Relevance Vector Machine Sheng ZHOU
More information1 Comparing networks, and why social networks are different
1 Comparing networks, and why social networks are different The various measures of network structure that we have encountered so far allow us mainly to understand the structure of a single particular
More informationA PMU-Based Three-Step Controlled Separation with Transient Stability Considerations
Title A PMU-Based Three-Step Controlled Separation with Transient Stability Considerations Author(s) Wang, C; Hou, Y Citation The IEEE Power and Energy Society (PES) General Meeting, Washington, USA, 27-31
More informationResearch on Heterogeneous Communication Network for Power Distribution Automation
3rd International Conference on Material, Mechanical and Manufacturing Engineering (IC3ME 2015) Research on Heterogeneous Communication Network for Power Distribution Automation Qiang YU 1,a*, Hui HUANG
More informationHow smart can the grid really be?
How smart can the grid really be? by Dale Pudney, HVT Power Systems and Luo Wei, NR Electric With the improvement of electronic communications and computing technology, it becomes possible to integrate
More informationA Document as a Small World. selecting the term which co-occurs in multiple clusters. domains, from earthquake sequences [6] to register
A Document as a Small World Yutaka Matsuo y Yukio Ohsawa z Mitsuru Ishizuka y y Graduate School of Engineering University oftokyo Tokyo 113-8656, Japan z Graduate School of Systems Management University
More informationTOPOLOGICAL ANALYSIS AND MITIGATION STRATEGIES FOR CASCADING FAILURES IN POWER GRID NETWORKS SAKSHI PAHWA. B.E., Mumbai University, India, 2007
TOPOLOGICAL ANALYSIS AND MITIGATION STRATEGIES FOR CASCADING FAILURES IN POWER GRID NETWORKS by SAKSHI PAHWA B.E., Mumbai University, India, 2007 A THESIS submitted in partial fulfillment of the requirements
More informationResearch on Power Quality Monitoring and Analyzing System Based on Embedded Technology
2010 China International Conference on Electricity Distribution 1 Research on Power Quality Monitoring and Analyzing System Based on Embedded Technology Zhang Hong-tao, Ye Ying, An Qing China Zhoukou Power
More informationFailure in Complex Social Networks
Journal of Mathematical Sociology, 33:64 68, 2009 Copyright # Taylor & Francis Group, LLC ISSN: 0022-250X print/1545-5874 online DOI: 10.1080/00222500802536988 Failure in Complex Social Networks Damon
More informationNetworks and stability
Networks and stability Part 1A. Network topology www.weaklink.sote.hu csermelypeter@yahoo.com Peter Csermely 1. network topology 2. network dynamics 3. examples for networks 4. synthesis (complex equilibria,
More informationResearch Article Vulnerability Analysis of Interdependent Scale-Free Networks with Complex Coupling
Hindawi Electrical and Computer Engineering Volume 2017, Article ID 9080252, 5 pages https://doi.org/10.1155/2017/9080252 Research Article Vulnerability Analysis of Interdependent Scale-Free Networks with
More informationMethods of Technical Risk Assessment in a Regional Context
Methods of Technical Risk Assessment in a Regional Context Wolfgang Kröger, Professor and Head of former Laboratory for Safety Analysis (www.lsa.ethz.ch) Founding Rector of International Risk Governance
More informationA Dynamic TDMA Protocol Utilizing Channel Sense
International Conference on Electromechanical Control Technology and Transportation (ICECTT 2015) A Dynamic TDMA Protocol Utilizing Channel Sense ZHOU De-min 1, a, LIU Yun-jiang 2,b and LI Man 3,c 1 2
More informationSimulating Smart Grid Cascade Failure Mitigation
Simulating Smart Grid Cascade Failure Mitigation Claudia Whitten Department of Computer Science California Institute of Technology Pasadena, CA 91126 whitten@caltech.edu ABSTRACT Smart grid power systems
More informationOverlay (and P2P) Networks
Overlay (and P2P) Networks Part II Recap (Small World, Erdös Rényi model, Duncan Watts Model) Graph Properties Scale Free Networks Preferential Attachment Evolving Copying Navigation in Small World Samu
More informationThe missing links in the BGP-based AS connectivity maps
The missing links in the BGP-based AS connectivity maps Zhou, S; Mondragon, RJ http://arxiv.org/abs/cs/0303028 For additional information about this publication click this link. http://qmro.qmul.ac.uk/xmlui/handle/123456789/13070
More informationarxiv:cond-mat/ v1 [cond-mat.dis-nn] 7 Jan 2004
Structural Vulnerability of the North American Power Grid Réka Albert 1,2 István Albert 2 and Gary L. Nakarado 3 arxiv:cond-mat/0401084v1 [cond-mat.dis-nn] 7 Jan 2004 1. Department of Physics, Pennsylvania
More informationUSE CASE 13 ADAPTIVE TRANSMISSION LINE PROTECTION
H USE CASE 13 ADAPTIVE TRANSMISSION LINE PROTECTION Use Case Title Adaptive Transmission Line Protection Use Case Summary The requirements for improvement in the performance of protection relays under
More informationDesign Robust Networks against Overload-Based Cascading Failures
Design Robust Networks against Overload-Based Cascading Failures Hoang Anh Q. Tran *1, Akira Namatame 2 Dept. of Computer Science, National Defense Academy of Japan, Yokosuka, Kanagawa, Japan *1 ed13004@nda.ac.jp;
More informationCascading failures in complex networks with community structure
International Journal of Modern Physics C Vol. 25, No. 5 (2014) 1440005 (10 pages) #.c World Scienti c Publishing Company DOI: 10.1142/S0129183114400051 Cascading failures in complex networks with community
More informationAnalysis and Modeling
Guillaume Guérard A Complex System Approach for SMART GRID Analysis and Modeling KES 12 September 2012 1 Problematic Thesis: Optimization in complex networks. Problem: Optimization of the energy distribution
More informationOptimal weighting scheme for suppressing cascades and traffic congestion in complex networks
Optimal weighting scheme for suppressing cascades and traffic congestion in complex networks Rui Yang, 1 Wen-Xu Wang, 1 Ying-Cheng Lai, 1,2 and Guanrong Chen 3 1 Department of Electrical Engineering, Arizona
More informationEnhancing the Computing Efficiency of Power System Dynamic Analysis with PSS_E
Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009 Enhancing the Computing Efficiency of Power System Dynamic Analysis with PSS_E
More informationA SourceForge.net Project: tmans, an Agentbased Neural Network Simulator, Repast, and SourceForge CVS
A SourceForge.net Project: tmans, an Agentbased Neural Network Simulator, Repast, and SourceForge CVS John Korecki Computer Science & Engineering REU University of Notre Dame Fall 04 - Spring 05 September
More informationLoad Distribution Vector Based Attack Strategies against Power Grid Systems
Load Distribution Vector Based Attack Strategies against Power Grid Systems Yihai Zhu, Yan (Lindsay) Sun, and Haibo He Department of Electrical, Computer, and Biomedical Engineering, University of Rhode
More informationGeomagnetic Disturbances
Geomagnetic Disturbances Managing Risk to the North American Power Grid Mark Olson, Reliability Standards Developer Worcester Polytechnic Institute Energy Symposium September 25, 2013 About NERC The North
More informationReal Time Monitoring of
Real Time Monitoring of Cascading Events Mladen Kezunovic Nan Zhang, Hongbiao Song Texas A&M University Tele-Seminar, March 28, 2006 Project Reports (S-19) M. Kezunovic, H. Song and N. Zhang, Detection,
More informationM.E.J. Newman: Models of the Small World
A Review Adaptive Informatics Research Centre Helsinki University of Technology November 7, 2007 Vocabulary N number of nodes of the graph l average distance between nodes D diameter of the graph d is
More informationECS 289 / MAE 298, Lecture 9 April 29, Web search and decentralized search on small-worlds
ECS 289 / MAE 298, Lecture 9 April 29, 2014 Web search and decentralized search on small-worlds Announcements HW2 and HW2b now posted: Due Friday May 9 Vikram s ipython and NetworkX notebooks posted Project
More informationRECONSTRUCTION OF LOW VOLTAGE DISTRIBUTION NETWORKS: FROM GIS DATA TO POWER FLOW MODELS
RECONSTRUCTION OF LOW VOLTAGE DISTRIBUTION NETWORKS: FROM GIS DATA TO POWER FLOW MODELS Alejandro NAVARRO-ESPINOSA and Luis F. OCHOA The University of Manchester UK alejandro.navarroespinosa@manchester.ac.uk
More informationRANDOM-REAL NETWORKS
RANDOM-REAL NETWORKS 1 Random networks: model A random graph is a graph of N nodes where each pair of nodes is connected by probability p: G(N,p) Random networks: model p=1/6 N=12 L=8 L=10 L=7 The number
More informationA novel firing rule for training Kohonen selforganising
A novel firing rule for training Kohonen selforganising maps D. T. Pham & A. B. Chan Manufacturing Engineering Centre, School of Engineering, University of Wales Cardiff, P.O. Box 688, Queen's Buildings,
More informationResearch on Coordinated Attack Protection Method Based on Global Time Synchronization System of Intelligent Substation
Journal of Network Computing and Applications (2019) 4: 14-20 Clausius Scientific Press, Canada DOI: 10.23977/jnca.2019.41003 EISSN 2371-9214 Research on Coordinated Attack Protection Method Based on Global
More informationModelling Cascading Failure in Power Networks
Modelling Cascading Failure in Power Networks Sydney, July 2017 Image: IEEEXplore C. K. Michael Tse WSCC System Blackout in 1996 July 1996 WSCC: Western System Coordinating Council, now called WESC, which
More informationAn improved PageRank algorithm for Social Network User s Influence research Peng Wang, Xue Bo*, Huamin Yang, Shuangzi Sun, Songjiang Li
3rd International Conference on Mechatronics and Industrial Informatics (ICMII 2015) An improved PageRank algorithm for Social Network User s Influence research Peng Wang, Xue Bo*, Huamin Yang, Shuangzi
More informationResearch on Cyber-Physical Modeling for Smart Distribution Grid
Energy and Power Engineering, 2017, 9, 544-551 http://www.scirp.org/journal/epe ISSN Online: 1947-3818 ISSN Print: 1949-243X Research on Cyber-Physical Modeling for Smart Distribution Grid Xiaohong Guo
More informationRevealing Temporal Features of Attacks Against Smart Grid
Revealing Temporal Features of Attacks Against Smart Grid Presenter: Yihai Zhu Authors: Jun Yan, Yihai Zhu, Yan Sun, Haibo He Dept. of Electrical, Computer & Biomedical Engineering University of Rhode
More informationCIM/E Oriented Graph Database Model Architecture and Parallel Network Topology Processing
CIM/E Oriented Graph Model Architecture and Parallel Network Topology Processing Zhangxin Zhou a, b, Chen Yuan a, Ziyan Yao a, Jiangpeng Dai a, Guangyi Liu a, Renchang Dai a, Zhiwei Wang a, and Garng M.
More informationA Kind of Wireless Sensor Network Coverage Optimization Algorithm Based on Genetic PSO
Sensors & Transducers 2013 by IFSA http://www.sensorsportal.com A Kind of Wireless Sensor Network Coverage Optimization Algorithm Based on Genetic PSO Yinghui HUANG School of Electronics and Information,
More information1 Degree Distributions
Lecture Notes: Social Networks: Models, Algorithms, and Applications Lecture 3: Jan 24, 2012 Scribes: Geoffrey Fairchild and Jason Fries 1 Degree Distributions Last time, we discussed some graph-theoretic
More informationA Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 2000 747 A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks Yuhong Zhu, George N. Rouskas, Member,
More informationBattery Energy Storage System Information Modeling Based on IEC 61850
Journal of Power and Energy Engineering, 2014, 2, 233-238 Published Online April 2014 in SciRes. http://www.scirp.org/journal/jpee http://dx.doi.org/10.4236/jpee.2014.24033 Battery Energy Storage System
More informationFinancial Information
Financial Information sales led by improving momentum in new economies New economies: 10 points better than mature countries Solution and services: 6 points above group average Demand in mature countries
More informationLong distance wireless sensor networks applied in coal mine
Procedia Earth and Planetary Science 1 (29) 1461 1467 Procedia Earth and Planetary Science www.elsevier.com/locate/procedia The 6 th International Conference on Mining Science & Technology Long distance
More informationTopology Enhancement in Wireless Multihop Networks: A Top-down Approach
Topology Enhancement in Wireless Multihop Networks: A Top-down Approach Symeon Papavassiliou (joint work with Eleni Stai and Vasileios Karyotis) National Technical University of Athens (NTUA) School of
More informationThe Research of Delay Characteristics in CAN Bus Networked Control System
Journal of Computational Information Systems 9: 18 (2013) 7517 7523 Available at http://www.jofcis.com The Research of Delay Characteristics in CAN Bus Networked Control System Yi WANG 1, Liren HE 2, Ming
More informationIntroduction to network metrics
Universitat Politècnica de Catalunya Version 0.5 Complex and Social Networks (2018-2019) Master in Innovation and Research in Informatics (MIRI) Instructors Argimiro Arratia, argimiro@cs.upc.edu, http://www.cs.upc.edu/~argimiro/
More information3rd International Conference on Mechanical Engineering and Intelligent Systems (ICMEIS 2015)
3rd International Conference on Mechanical Engineering and Intelligent Systems (ICMEIS 2015) Development Of SSP510 Frequency Voltage Emergency Control Device Qinghua Si 1,2,a *, Zhukun Li 1,2, Yunsong
More informationSmall Worlds in Security Systems: an Analysis of the PGP Certificate Graph
Small Worlds in Security Systems: an Analysis of the PGP Certificate Graph Srdjan Čapkun, Levente Buttyán and Jean-Pierre Hubaux Laboratory for Computer Communications and Applications (LCA) School of
More informationStability Assessment of Electric Power Systems using Growing Neural Gas and Self-Organizing Maps
Stability Assessment of Electric Power Systems using Growing Gas and Self-Organizing Maps Christian Rehtanz, Carsten Leder University of Dortmund, 44221 Dortmund, Germany Abstract. Liberalized competitive
More informationJournal of Chemical and Pharmaceutical Research, 2015, 7(3): Research Article
Available online www.jocpr.com Journal of Chemical and Pharmaceutical esearch, 015, 7(3):175-179 esearch Article ISSN : 0975-7384 CODEN(USA) : JCPC5 Thread image processing technology research based on
More informationDesign of Coal Mine Power Supply Monitoring System
2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016) Design of Coal Mine Power Supply Monitoring System Lei Shi 1, Guo Jin 2 and Jun Xu 3 1 2 Department of electronic
More informationLightning Protection Performance Assessment of Transmission Line Based on ATP model Automatic Generation
MATEC Web of Conferences 55, 03001 () DOI: 10.1051/ matecconf/5503001 Lightning Protection Performance Assessment of Transmission Line Based on ATP model Automatic Generation Luo Hanwu 1, Li Mengke 1,
More informationTCM Health-keeping Proverb English Translation Management Platform based on SQL Server Database
2019 2nd International Conference on Computer Science and Advanced Materials (CSAM 2019) TCM Health-keeping Proverb English Translation Management Platform based on SQL Server Database Qiuxia Zeng1, Jianpeng
More informationWeb 2.0 Social Data Analysis
Web 2.0 Social Data Analysis Ing. Jaroslav Kuchař jaroslav.kuchar@fit.cvut.cz Structure(1) Czech Technical University in Prague, Faculty of Information Technologies Software and Web Engineering 2 Contents
More informationSystems, ESD.00. Networks II. Lecture 8. Lecturers: Professor Joseph Sussman Dr. Afreen Siddiqi TA: Regina Clewlow
Introduction to Engineering Systems, ESD.00 Networks II Lecture 8 Lecturers: Professor Joseph Sussman Dr. Afreen Siddiqi TA: Regina Clewlow Outline Introduction to networks Infrastructure networks Institutional
More informationDistributed Network Routing Algorithms Table for Small World Networks
Distributed Network Routing Algorithms Table for Small World Networks Mudit Dholakia 1 1 Department of Computer Engineering, VVP Engineering College, Rajkot, 360005, India, Email:muditdholakia@gmail.com
More informationReliability Assessment and Modeling of Cyber Enabled Power Systems with Renewable Sources and Energy Storage
Reliability Assessment and Modeling of Cyber Enabled Power Systems with Renewable Sources and Energy Storage Final Project Report T-53 Power Systems Engineering Research Center Empowering Minds to Engineer
More informationUSE CASE 14 CONTROLLED ISLANDING
I USE CASE 14 CONTROLLED ISLANDING Use Case Title Centralized application separates grid into islands to prevent blackout Use Case Summary Controlled islanding is a method that can significantly improve
More informationComplex networks: A mixture of power-law and Weibull distributions
Complex networks: A mixture of power-law and Weibull distributions Ke Xu, Liandong Liu, Xiao Liang State Key Laboratory of Software Development Environment Beihang University, Beijing 100191, China Abstract:
More informationHigh Resolution Remote Sensing Image Classification based on SVM and FCM Qin LI a, Wenxing BAO b, Xing LI c, Bin LI d
2nd International Conference on Electrical, Computer Engineering and Electronics (ICECEE 2015) High Resolution Remote Sensing Image Classification based on SVM and FCM Qin LI a, Wenxing BAO b, Xing LI
More informationNETWORK FLOW WITH FUZZY ARC LENGTHS USING HAAR RANKING
NETWORK FLOW WITH FUZZY ARC LENGTHS USING HAAR RANKING S. Dhanasekar 1, S. Hariharan, P. Sekar and Kalyani Desikan 3 1 Vellore Institute of Technology, Chennai Campus, Chennai, India CKN College for Men,
More informationExcavation Balance Routing Algorithm Simulation Based on Fuzzy Ant Colony
2018 5th International Conference on Electrical & Electronics Engineering and Computer Science (ICEEECS 2018) Excavation Balance Routing Algorithm Simulation Based on Fuzzy Ant Colony Luo Xiaojuan, Yan
More informationImproving Real-time Fault Analysis and Validating Relay Operations to Prevent or Mitigate Cascading Blackouts
1 Improving Real-time Fault Analysis and Validating Relay Operations to Prevent or Mitigate Cascading Blackouts Nan Zhang, Student Member, IEEE, and Mladen Kezunovic, Fellow, IEEE Abstract This paper proposes
More informationA Statistical Method for Synthetic Power Grid Generation based on the U.S. Western Interconnection
A Statistical Method for Synthetic Power Grid Generation based on the U.S. Western Interconnection Saleh Soltan, Gil Zussman Columbia University New York, NY Failures in Power Grids One of the most essential
More informationarxiv: v2 [physics.soc-ph] 21 Mar 2012
The Power Grid as a Complex Network: a Survey Giuliano Andrea Pagani and Marco Aiello Distributed Systems Group Johann Bernoulli Institute for Mathematics and Computer Science University of Groningen Groningen,
More informationChapter X Security Performance Metrics
Chapter X Security Performance Metrics Page 1 of 10 Chapter X Security Performance Metrics Background For many years now, NERC and the electricity industry have taken actions to address cyber and physical
More informationGeomagnetic Disturbances and High-Altitude Electromagnetic Pulse Research
Geomagnetic Disturbances and High-Altitude Electromagnetic Pulse Research Bob Arritt, Technical Executive Grid Operations and Planning, Electric Power Research Institute Grid Security Conference (GridSecCon)
More informationCyber Vulnerabilities on Agent-based Smart Grid Protection System
Cyber Vulnerabilities on Agent-based Smart Grid Protection System Md Shihanur Rahman and Hemanshu R. Pota School of Engineering and Information Technology University of New South Wales PO Box 796, Canberra
More informationRisk Assessment of Damages due to Lightning Discharges: A Case Study to a Telecommunication System in Singburi Province of Thailand.
Proceedings of the 2007 WSEAS Int. Conference on Circuits, Systems, Signal and s, Gold Coast, Australia, January 17-19, 2007 216 Risk Assessment of Damages due to Lightning Discharges: A Case Study to
More informationTopology Affects the Efficiency of Network Coding in Peer-to-Peer Networks
Topology Affects the Efficiency of Network Coding in Peer-to-Peer Networks Tara Small, Baochun Li, and Ben Liang Department of Electrical and Computer Engineering University of Toronto {tsmall, bli}@eecg.toronto.edu,
More informationDesign and application of computer network system integration based on network topology
Acta Technica 62 No. 1B/2017, 79 88 c 2017 Institute of Thermomechanics CAS, v.v.i. Design and application of computer network system integration based on network topology Shuna Zhou 1 Abstract. To explore
More informationA New Algorithm for Black-start Zone Partitioning Based on Fuzzy Clustering Analysis
Energy and Power Engineering, 2013, 5, 763-768 doi:10.4236/epe.2013.54b147 Published Online July 2013 (http://www.scirp.org/journal/epe) A New Algorithm for Black-start Zone Partitioning Based on Fuzzy
More informationThe Sequential Attack against Power Grid Networks. Associate Professor at University of Rhode Island
The Sequential Attack against Power Grid Networks Yihai i Zhu, Jun Yan, YfiT Yufei Tang, Yan (Lindsay) Sun, Haibo Hib He Presenter: Yan (Lindsay) Sun Associate Professor at University of Rhode Island Email:
More informationOpen Access Research on the Prediction Model of Material Cost Based on Data Mining
Send Orders for Reprints to reprints@benthamscience.ae 1062 The Open Mechanical Engineering Journal, 2015, 9, 1062-1066 Open Access Research on the Prediction Model of Material Cost Based on Data Mining
More informationSmall-world networks
Small-world networks c A. J. Ganesh, University of Bristol, 2015 Popular folklore asserts that any two people in the world are linked through a chain of no more than six mutual acquaintances, as encapsulated
More informationResearch on Invulnerability of Wireless Sensor Networks Based on Complex Network Topology Structure
Research on Invulnerability of Wireless Sensor Networks Based on Complex Network Topology Structure https://doi.org/10.3991/ijoe.v13i03.6863 Zhigang Zhao Zhejiang University of Media and Communications,
More informationA Hybrid Communication Architecture for Internet of Things (IOT) Application in Smart Grid
A Hybrid Communication Architecture for Internet of Things (IOT) Application in Smart Grid Yijia Cao Hunan University, China 2014-10 10-21 OUTLINE 1 IOT Application in Smart Grid 2 3 Requirements for Communication
More informationA Data Classification Algorithm of Internet of Things Based on Neural Network
A Data Classification Algorithm of Internet of Things Based on Neural Network https://doi.org/10.3991/ijoe.v13i09.7587 Zhenjun Li Hunan Radio and TV University, Hunan, China 278060389@qq.com Abstract To
More informationC I R E D 22 nd International Conference on Electricity Distribution Stockholm, June 2013
C I R E D 22 nd International Conference on Electricity Distribution Stockholm, 0-3 June 203 Paper 399 PROTECTION OPERATION ANALYSIS IN SMART GRIDS Alexander Apostolov OMICRON electronics - USA alex.apostolov@omicronusa.com
More informationDesign of Substation and Distribution Station Monitoring System Based on DELPHI and Intelligent Modules
Journal of Information Hiding and Multimedia Signal Processing c 2016 ISSN 2073-4212 Ubiquitous International Volume 7, Number 4, July 2016 Design of Substation and Distribution Station Monitoring System
More information