Zobrazeno 1 - 10
of 613
pro vyhledávání: '"network vulnerability"'
Publikováno v:
International Journal of Transportation Science and Technology, Vol 15, Iss , Pp 155-169 (2024)
The constraints of transportation networks are fundamental to disaster planning. Having the capability of evaluating the emergent dynamics of such networks in the context of large traffic incidents can inform the design of traffic management strategi
Externí odkaz:
https://doaj.org/article/9834e6f79a3743a6a070720fd119eddd
Publikováno v:
Zhejiang dianli, Vol 43, Iss 8, Pp 20-27 (2024)
With the advancement of new-type power systems, the large-scale integration of distributed generation (DG) poses challenges to the optimal operation of distribution networks. In response, a multi-objective reconfiguration method for distribut
Externí odkaz:
https://doaj.org/article/f350df85231c47b99e194e90d793a8b9
Publikováno v:
Kybernetes, 2023, Vol. 53, Issue 6, pp. 2132-2152.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/K-12-2022-1651
Autor:
Eko Yudo Pramono, Ardylla Rommyonegge, Bambang Anggoro Soedjarno, Kevin Marojahan Banjar-Nahor, Nanang Hariyanto
Publikováno v:
IEEE Access, Vol 12, Pp 26492-26505 (2024)
Intentional physical attacks on a wide-ranging transmission network may result in load shedding or outages in the electrical grid. This vulnerability can be mitigated through modern transmission expansion planning that takes into account grid risk an
Externí odkaz:
https://doaj.org/article/b14c84d05e4d4bc4887b6e4797b0af8d
Publikováno v:
Mathematics, Vol 12, Iss 18, p 2894 (2024)
In the design of real-world networks, researchers evaluate various structural parameters to assess vulnerability, including connectivity, toughness, and tenacity. Recently, the tightness metric has emerged as a potentially superior vulnerability meas
Externí odkaz:
https://doaj.org/article/076b4833884f455393ce51c500514d78
Publikováno v:
Electronic Research Archive, Vol 31, Iss 3, Pp 1524-1542 (2023)
Identification of network vulnerability is one of the important means of cyberspace operation, management and security. As a typical case of network vulnerability, network cascading failures are often found in infrastructure networks such as the powe
Externí odkaz:
https://doaj.org/article/aad33cb425ca439aa602503af50a4059
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Mohammed Obaid, Árpád Török
Publikováno v:
European Transport Research Review, Vol 14, Iss 1, Pp 1-12 (2022)
Abstract Purpose This study first presents a method to identify the parameters increasing road vulnerability on a macroscopic road network model. The second part exploresthe effect size difference of the analyzed attributes on network vulnerability t
Externí odkaz:
https://doaj.org/article/babbc9c1c8e64a57b4d190dd2fc3c91a
Publikováno v:
IEEE Access, Vol 10, Pp 67181-67197 (2022)
Power communication network (PCN) is the cornerstone of the stable operation of smart grid. The evaluation of the essential vulnerability of the PCN based on the node importance is advantageous to the protection of critical nodes and the improvement
Externí odkaz:
https://doaj.org/article/a812f4f9e6524558bda2aee12e7c2f33
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.