Comprehensive vulnerability assessment method based on power communication network structure and state

A power communication network, vulnerability technology, applied in electrical components, data exchange networks, digital transmission systems, etc., can solve problems such as incomplete evaluation and inaccurate evaluation

Active Publication Date: 2017-04-26
国网新疆电力有限公司信息通信公司 +1
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The invention provides a comprehensive vulnerability assessment method based on the structure and state of the power communication network, which solves the technical problems of incomplete and inaccurate assessment in the existing vulnerability assessment method of the power communication network, and realizes the current operation of the fusion network After the status, the vulnerable links in the network can be located more comprehensively, and the technical effect of vulnerability assessment can be carried out according to different network topologies and operating states

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Comprehensive vulnerability assessment method based on power communication network structure and state
  • Comprehensive vulnerability assessment method based on power communication network structure and state
  • Comprehensive vulnerability assessment method based on power communication network structure and state

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The invention provides a comprehensive vulnerability assessment method based on the structure and state of the power communication network, which solves the technical problems of incomplete and inaccurate assessment in the existing vulnerability assessment method of the power communication network, and realizes the current operation of the fusion network After the status, the vulnerable links in the network can be located more comprehensively, and the technical effect of vulnerability assessment can be carried out according to different network topologies and operating states.

[0041] In order to understand the above-mentioned purpose, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted that, under the condition of not conflicting with each other, the embodiments of the present application and the features ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a comprehensive vulnerability assessment method based on a power communication network structure and state, and the method comprises the following steps: 1, obtaining the impact on the assessment of the vulnerability of the power communication network structure from the vulnerable features of the power communication network structure; 2, obtaining the impact on the assessment of the vulnerability of the power communication network structure from the operation state features of a power communication network; 3, integrating the impact on the assessment of the vulnerability of the power communication network structure from the structural characteristics and operation state features of the power communication network, and obtaining a final power communication network vulnerability assessment result. The method achieve the technical effects that the method can locate a vulnerable link in a network more comprehensively after the integration of the current operation state of the network, and can carry out the vulnerability assessment according to different network topologies and operation states.

Description

technical field [0001] The invention relates to the field of vulnerability assessment of power communication networks, in particular to a comprehensive vulnerability assessment method based on the structure and status of power communication networks. Background technique [0002] As the supporting network of the smart grid, the safe and stable operation of the power communication network has become a prerequisite for the intelligent, economical and safe operation of the smart grid. As for the vulnerability assessment of power communication network, the methods currently used to assess the vulnerability of power communication network include, based on the theoretical knowledge of complex networks, using certain indicators such as betweenness and closeness to evaluate the vulnerability of network units, or according to the theoretical indicators of complex networks , Integrating the impact of the power station, analyzing the vulnerability of network units, the power communicat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24
Inventor 周文婷黄宏光尹军崔力民张玮王鑫李路民陈建新
Owner 国网新疆电力有限公司信息通信公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products