2022
DOI: 10.3390/s22166006
|View full text |Cite
|
Sign up to set email alerts
|

Reducing Detrimental Communication Failure Impacts in Microgrids by Using Deep Learning Techniques

Abstract: A Microgrid (MG), like any other smart and interoperable power system, requires device-to-device (D2D) communication structures in order to function effectively. This communication system, however, is not immune to intentional or unintentional failures. This paper discusses the effects of communication link failures on MG control and management and proposes solutions based on enhancing message content to mitigate their detritus impact. In order to achieve this goal, generation and consumption forecasting using… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 40 publications
0
2
0
Order By: Relevance
“…In the first stage of the game, defense resources are allocated to CEs. Among them, certain defense resources are allocated to CEs (6,4), (4,6), (7,6), (6,7), (9,7), (7,9), (13,15), (15,13), (14,7), (7,14), (14,15), (15,14), (16,8), (8,16), (16,17), (17,16), (17,20), (20,17), (18,19), (19,18), (19,20), and (20,19). The failure probabilities p ij during attack are 0.769, 0.769, 0.769, 0.769, 0.769, 0.833, 0.833, 0.833, 0.833, 0.472, 0.472, 0.833, 0.833, 0.714, 0.714, 0.769, 0.769, 0.909, 0.909, 0.625, 0.625, 0.556, and 0.556, respectively.…”
Section: Simulation Experiments On the Three-stage Process Of Cpps At...mentioning
confidence: 99%
See 1 more Smart Citation
“…In the first stage of the game, defense resources are allocated to CEs. Among them, certain defense resources are allocated to CEs (6,4), (4,6), (7,6), (6,7), (9,7), (7,9), (13,15), (15,13), (14,7), (7,14), (14,15), (15,14), (16,8), (8,16), (16,17), (17,16), (17,20), (20,17), (18,19), (19,18), (19,20), and (20,19). The failure probabilities p ij during attack are 0.769, 0.769, 0.769, 0.769, 0.769, 0.833, 0.833, 0.833, 0.833, 0.472, 0.472, 0.833, 0.833, 0.714, 0.714, 0.769, 0.769, 0.909, 0.909, 0.625, 0.625, 0.556, and 0.556, respectively.…”
Section: Simulation Experiments On the Three-stage Process Of Cpps At...mentioning
confidence: 99%
“…Reference [13] proposes a risk assessment algorithm for power communication service routing, which optimizes the traffic channel of communication risk through a dynamic routing constraint algorithm to reduce the risk of power interruption, Reference [14] proposes ant colony optimization algorithms to optimize the power communication line and obtain the shortest distance and the optimal path. Reference [15] considers the impact of communication link failures in device-to-device (D2D) communication structures on the microgrid (MG), and implements MG control and management through deep learning methods.…”
Section: Introductionmentioning
confidence: 99%