计算机科学 ›› 2014, Vol. 41 ›› Issue (5): 275-279.doi: 10.11896/j.issn.1002-137X.2014.05.058
张颖淳,王淑良
ZHANG Ying-chun and WANG Shu-liang
摘要: 电力网络作为典型的关键基础设施网络,其组件的关键性辨识对于分析、理解、识别电力网络的脆弱性,进而提出相应的保护措施和改进策略有着重要的意义。基于此,利用复杂网络理论和方法,从复杂网络统计指标、扰动下电力网络性能变化两个不同角度探讨了电力网络的关键组件辨识方法,获取了电力网络的关键节点与关键边。通过识别网络的关键组件可以控制级联故障,指出哪些组件需要重点保护,并采取缓解策略来降低其在扰动下的脆弱性。
[1] President’s Commission on Critical Infrastructure Protection,Critical Foundations:Protecting America’s Infrastructures.http://www.fas.org/sgp/library/pccip.pdf,1997 [2] Presidential Decision Directive 63.http://www.ciao.gov [3] Apostolakis G E.How useful is quantitative risk assessment?[J].Risk Analysis,2004,24:515-520 [4] Liu H,Davidson R A,Rosowsky D V,et al.Negative binomial regression of electric power outages in hurricanes[J].Journal of Infrastructure Systems,2009,11(4):258-267 [5] Wang J.Robustness of complex networks with the local protection strategy against cascading failures[J].Safety Science,2013,53:219-225 [6] 朱勤,彭希哲,吴开亚.基于投入产出模型的居民消费品载能碳排放测算与分析[J].自然资源学报,2012,27(12):2018-2029 [7] Konig M D,Battiston S,Napoletano M,et al.The efficiency and stability of R&D networks[J].Games and Economic Behavior,2012,75(2):694-713 [8] Watt D J,Strogatz S H.Collective dynamics of "small world" network [J].Nature,1998,393:440-442 [9] 邓宏钟,吴俊,李勇,等.复杂网络拓扑结构对系统抗毁性影响研究[J].系统工程与电子技术,2008,30(12):2425-2428 [10] Wang S L,Hong L,Ouyang M,et al.Vulnerability analysis of interdependent infrastructure systems under edge attack strategies[J].Safety Science,2013,1(1):328-337 [11] Arenas A,Díaz-Guilera A,Kurths J,et al.Synchronization incomplex networks [J].Physics Report,2008,469(3):93-153 [12] Chen H H,Sheu G J,Lin Y L,et al.Chaos synchronization between two different chaotic systems via nonlinear feedback control [J].Nonlinear Analysis,2009,70:4393-4401 [13] 刘建香.复杂网络及其在国内研究进展的综述[J].系统科学学报,2009,17(5):31-37 [14] Zhou T,Fu Z Q,Wang B H.Epidemic dynamics on complex networks[J].Progress in Natural Science,2006,16(5):452-457 [15] Criado R,Garcia A,Hernández-Bermejo B,et al.New results on computable efficiency and its stability for complex networks[J].Journal of Computational and Applied Mathematics,2006,192(1):59-74 [16] Crucitti P,Latora V,Marchiori M,et al.Efficiency of scale-free networks:Error and attack tolerance[J].Physica A,2003,320:622-642 [17] Holme P,Kim B J,Yoon C N,et al.Attack vulnerability of com-plex networks[J].Physical Review E,2002,65(1):056109 [18] Criado R,Flores J,Hernández-Bermejo B,et al.Effective mea-surement of network vulnerability under random and intentional attacks[J].Journal of Mathematical Modeling and Algorithms,2005,4(3):307-316 [19] Volkanovski A,Cepin M,Mavko B.Application of the fault tree analysis for assessment of power system reliability[J].Reliability Engineering & System Safety,2009,94(6):1116-1127 [20] Zio E,Golea L R.Analyzing the topological,electrical and relia-bility characteristics of a power transmission system for identi-fying its critical elements[J].Reliability Engineering & System Safety,2012,101:67-74 [21] 邓雪波,王小强,陈曦,等.基于效能模型的电力通信网可靠性研究[J].重庆邮电大学学报:自然科学版,2012,4(3):378-382 |
No related articles found! |
|