Electric Power Communication Network Optimization Algorithm Based on the Equivalent Network

2014 ◽  
Vol 596 ◽  
pp. 653-658 ◽  
Author(s):  
Ning Zhe Xing ◽  
Jia Qi Guo ◽  
Ran Yu

Reliable power network can provide reliable operation of electric power for dispatching communication security, due to many key network nodes external connectivity in the electric power communication network has only one path, so once the link damage because of emergencies, these networks because of the failure of nodes (or communication link) and power operation scheduling of exception can occur easily, thus to cause great damage to the safe operation of the whole power network. In order to improve the robustness of system in this case, this paper designed a new optimization algorithm based on the equivalent network to simplify the real network and the network analysis.

1970 ◽  
Vol 1 (1) ◽  
Author(s):  
Li Wei Wei

When an intruder attacks an object in an electric power network, it is necessary to successfully invade the target node along an attack path. However, as the number of target power optical network nodes increases gradually, the attack path will be exponential growth, resulting in path redundancy, affecting the overall performance of the generated path. To this end, a new power optical network attack path generation and visual display method, introduced the atomic attack, attack map and attack path definition. Based on the analysis of the cost and benefit of the attack path, the intrusion feasibility model is proposed, and the intruder’s choice of the attack path becomes the problem of the feasibility of the invasion. When the POS set contains all the directional edges of the power optical network attack map, generate the attack path of the power optical network by traversing the POS collection element. The process of generating the attack path of the electric power network is displayed. The experimental results show that there is no redundant phenomenon in the proposed method, and the generated attack path is effective and the reliability is high.


2005 ◽  
Author(s):  
Shinichi Nakasuka ◽  
Takashi Eishima ◽  
Hironori Sahara ◽  
Yuya Nakamura ◽  
Yoshiki Sugawara ◽  
...  

Author(s):  
Uche Chinweoke Ogbuefi ◽  
Boniface Onyemaechi Anyaka ◽  
Muncho Josephine Mbunwe

1998 ◽  
pp. 239-273
Author(s):  
Olle I. Elgerd ◽  
Patrick D. van der Puije
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document