2018
DOI: 10.1049/iet-gtd.2017.0767
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerable transmission line identification considering depth of K ‐shell decomposition in complex grids

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
25
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(25 citation statements)
references
References 26 publications
0
25
0
Order By: Relevance
“…In recent years, a wide range of real-world complex systems, such as social network [1], [2], power grids [3]- [5], computer system [6], [7] and traffic system [8], [9], can be described by complex networks. Although complex systems bring us great convenience, the related hazards will also occur, such as the high speed and large scale of WannaCry's spread, the outbreak of infectious diseases, and the North American blackout.…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, a wide range of real-world complex systems, such as social network [1], [2], power grids [3]- [5], computer system [6], [7] and traffic system [8], [9], can be described by complex networks. Although complex systems bring us great convenience, the related hazards will also occur, such as the high speed and large scale of WannaCry's spread, the outbreak of infectious diseases, and the North American blackout.…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, the study of complex network theory has received sustained attention in various academic fields, such as aviation networks [1,2], power networks [3][4][5], social networks [6][7][8], and biological networks [9][10][11]. By collecting and analyzing data from actual networks, researchers have studied the statistical characteristics [12,13] and the dynamic behavior of networks [14].…”
Section: Introductionmentioning
confidence: 99%
“…Ma et al [33] applied the PageRank algorithm to screen the vulnerable lines. Structural hole [34], K-shell decomposition [35] had also been applied to the identification of vulnerable lines. In addition, a Bayes network was established to predict the cascading failure propagation based on N-1 contingency [36].…”
Section: Introductionmentioning
confidence: 99%
“…However, the blackouts propagate in the form of cascade faults. The correlation network established by the N-1 contingency [28], [33]- [35] only grasped the first stage of the cascading failure process, the depth of the fault chain was insufficiently grasped, and the vulnerability of the line in the latter failure stage cannot be well quantified, which may result in omissions or misidentifications.…”
Section: Introductionmentioning
confidence: 99%