Vulnerable node identification method for distribution networks based on complex networks and improved TOPSIS theory

被引:1
|
作者
Jiang, Enyu [1 ]
Zhang, Wentao [1 ]
Xue, Ang [1 ]
Lin, Shunfu [1 ]
Mi, Yang [1 ]
Li, Dongdong [1 ]
机构
[1] Shanghai Univ Elect Power, Shanghai 200090, Peoples R China
基金
中国国家自然科学基金;
关键词
complex network theory; improved TOPSIS; operational status; power system; vulnerable node; POWER GRIDS; PERFORMANCE;
D O I
10.1049/gtd2.13011
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A method for identifying vulnerable nodes in distribution networks is proposed, which is based on complex networks and optimized TOPSIS. This method aims to address the issues of one-sided evaluation indicators and inaccurate indicator weights that are present in existing methods for identifying vulnerable nodes in distribution networks. Based on the theory of complex networks, a comprehensive set of vulnerability indicators for distribution network nodes is constructed by considering both the topology structure and system operation status of the distribution network. The TOPSIS comprehensive evaluation model for optimization is proposed to enhance the selection process of optimal and worst indicator values. The advantages and disadvantages of each indicator are characterized using Mahalanobis distance. The calculation of proximity is optimized by establishing a virtual negative ideal solution, which makes the identification of vulnerable nodes more reasonable. The simulation results demonstrate that this method is more effective in identifying vulnerable nodes in the power grid compared to traditional methods, and has significant practical applications. This article accurately and effectively identifies vulnerable nodes in the distribution network, which has significant practical implications for the safe and reliable operation of the power grid, as well as for preventing and reducing large-scale power outages.image
引用
收藏
页码:4991 / 5002
页数:12
相关论文
共 50 条
  • [11] A new method of identifying influential nodes in complex networks based on TOPSIS
    Du, Yuxian
    Gao, Cai
    Hu, Yong
    Mahadevan, Sankaran
    Deng, Yong
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2014, 399 : 57 - 69
  • [12] A New Metric to Find the Most Vulnerable Node in Complex Networks
    Amani, Ali Moradi
    Jalili, Mahdi
    Yu, Xinghuo
    Stone, Lewi
    2018 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2018,
  • [13] An extended improved global structure model for influential node identification in complex networks
    Zhu, Jing-Cheng
    Wang, Lun-Wen
    CHINESE PHYSICS B, 2022, 31 (06)
  • [14] Identification of vulnerable links of complex networks in cascading failures
    Li, Shu-Dong
    Han, Kun
    Zhang, Da-Cheng
    Li, Li-Xiang
    Luo, Qun
    Nanjing Li Gong Daxue Xuebao/Journal of Nanjing University of Science and Technology, 2012, 36 (SUPPL.1): : 143 - 149
  • [15] Important Node Identification and Robustness of Complex Networks
    Wang, Sichen
    Qian, Xiaodong
    PROCEEDINGS OF 2023 7TH INTERNATIONAL CONFERENCE ON ELECTRONIC INFORMATION TECHNOLOGY AND COMPUTER ENGINEERING, EITCE 2023, 2023, : 1666 - 1671
  • [16] GIS-Based Identification of Locations in Water Distribution Networks Vulnerable to Leakage
    Alzarooni, Eisa
    Ali, Tarig
    Atabay, Serter
    Yilmaz, Abdullah Gokhan
    Mortula, Md. Maruf
    Fattah, Kazi Parvez
    Khan, Zahid
    APPLIED SCIENCES-BASEL, 2023, 13 (08):
  • [17] A Seed-Expanding Method Based on TOPSIS for Community Detection in Complex Networks
    Cheng, Jianjun
    Zhang, Wenbo
    Yang, Haijuan
    Su, Xing
    Ma, Tao
    Chen, Xiaoyun
    COMPLEXITY, 2020, 2020
  • [18] Key node identification method for two-layer fusion networks based on improved structural holes
    Chen, Bo
    Zhang, Yulin
    Wang, Yunming
    Tong, Rui
    Chen, Yufeng
    Sun, Lingdong
    Xie, Wenxue
    JOURNAL OF SUPERCOMPUTING, 2025, 81 (02):
  • [19] Public Transit Hubs Identification Based on Complex Networks Theory
    Chen, Dongming
    Huang, Xinyu
    Wang, Dongqi
    Jia, Lulu
    IETE TECHNICAL REVIEW, 2014, 31 (06) : 440 - 451
  • [20] Identifying Vulnerable Nodes of Complex Networks in Cascading Failures Induced by Node-Based Attacks
    Li, Shudong
    Li, Lixiang
    Jia, Yan
    Liu, Xinran
    Yang, Yixian
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2013, 2013