Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Grid structure vulnerability node identification method

A technology of power grid structure and identification method, applied in the direction of instrument, data processing application, calculation, etc., can solve the problems of poor identification performance of vulnerable nodes, insufficient consideration of calculation and identification, and no dynamic consideration of node vulnerability.

Inactive Publication Date: 2017-08-25
杭州创云一智科技有限公司
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The evaluation index of the network topology structure is simple and intuitive, and the calculation and identification of node vulnerability are not considered deeply. There is no dynamic consideration of the change of node vulnerability with the change of network structure, and the identification of vulnerable nodes is not good.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Grid structure vulnerability node identification method
  • Grid structure vulnerability node identification method
  • Grid structure vulnerability node identification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] A method for identifying vulnerable nodes of a power grid structure, comprising the following steps:

[0026] 1) Read in the grid topology node connection relationship data (if there is a connection between two nodes, there will be a record), and configure the number k of nodes to be attacked or destroyed;

[0027] 2) Based on the network topology, calculate the shortest path between two nodes , the shortest path is the least number of edges from node i to node j. The average path length L of the network is defined as the average value of the shortest distance between any two nodes. The calculation formula is as follows:

[0028] (1)

[0029] in, is the shortest path between two nodes, and N is the number of nodes;

[0030] 3) Based on the shortest path between two nodes , according to formula (2) to calculate the network efficiency E,

[0031] (2);

[0032] 4) On the basis of the original input node pair data, delete the relevant paths connected to the n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for identifying vulnerable nodes of a grid structure, which includes: 1) reading in the node connection relationship data of the grid topology structure, and configuring the number k of pre-attacked or destroyed nodes; 2) calculating two nodes based on the network topology structure The shortest path between and the average path length L of the network; 3) Calculate the network efficiency E; 4) Delete the relevant path connected to the node and recalculate the network efficiency Ei of the point; 5) Calculate the network efficiency Ei of each node based on the network efficiency Ei 6) Based on the node vulnerability index, use the original input node connection relationship data to obtain the network topology diagram; 7) Remove the node with the largest node vulnerability value Vi, and loop through steps 2)-6) to obtain the second vulnerability node; 8) loop k times, and finally complete the identification of N-k vulnerability points. The vulnerability node identification method described above can dynamically identify the node vulnerability, taking into account the change of the node vulnerability under the changed network topology after the node is deleted.

Description

technical field [0001] The invention relates to a method for identifying vulnerable nodes of a grid structure, belonging to the field of grid control. Background technique [0002] At present, the vulnerability evaluation indicators for the network topology physical structure are based on conventional indicators such as node degree, edge betweenness, node betweenness, average shortest path, and aggregation coefficient in the network package. The evaluation index of the network topology is simple and intuitive, and the calculation and identification of node vulnerability are not considered deeply. There is no dynamic consideration of the change of node vulnerability with the change of network structure, and the identification of vulnerable nodes is not good. [0003] The existing research results on the vulnerability identification and indicators of the grid structure are all based on the grid current, load, voltage, switch, etc. to discuss the node vulnerability. In fact, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q50/06
CPCG06Q50/06
Inventor 周长星杨自强高军晖
Owner 杭州创云一智科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products