Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Reliability Evaluation of Cyber Physical Distribution System considering EPON

View through CrossRef
Abstract As cyber-physics highly coupled distribution system, the influence of communication network on the reliability of power supply can not be ignored. Based on the EPON redundant protection network, this paper analyzes the influence of the loss of cyber link effectiveness on the self-healing control process in the process of power distribution network failure. With the help of the region adjacency matrix, combined with the cyber system failure model, the classification algorithm of the region after failure is given, and a reliability evaluation method coveannular different cyber system failure modes is proposed. Finally, the feasibility of this method is verified by a case study, and the influence of EPON cyber element failure rate and EPON networking mode on the reliability indices is compared and analyzed.
Title: Reliability Evaluation of Cyber Physical Distribution System considering EPON
Description:
Abstract As cyber-physics highly coupled distribution system, the influence of communication network on the reliability of power supply can not be ignored.
Based on the EPON redundant protection network, this paper analyzes the influence of the loss of cyber link effectiveness on the self-healing control process in the process of power distribution network failure.
With the help of the region adjacency matrix, combined with the cyber system failure model, the classification algorithm of the region after failure is given, and a reliability evaluation method coveannular different cyber system failure modes is proposed.
Finally, the feasibility of this method is verified by a case study, and the influence of EPON cyber element failure rate and EPON networking mode on the reliability indices is compared and analyzed.

Related Results

Domination of Polynomial with Application
Domination of Polynomial with Application
In this paper, .We .initiate the study of domination. polynomial , consider G=(V,E) be a simple, finite, and directed graph without. isolated. vertex .We present a study of the Ira...
An Empirical Study on Cyber Crimes Against Women and Children in India
An Empirical Study on Cyber Crimes Against Women and Children in India
The aim of the study is to understand the Cyber-crimes against women and Children in India for a period of five years from 2017 to 2021. The study is based on Secondary data collec...
Evaluating the Science to Inform the Physical Activity Guidelines for Americans Midcourse Report
Evaluating the Science to Inform the Physical Activity Guidelines for Americans Midcourse Report
Abstract The Physical Activity Guidelines for Americans (Guidelines) advises older adults to be as active as possible. Yet, despite the well documented benefits of physical a...
Cyber operational risk scenarios for insurance companies
Cyber operational risk scenarios for insurance companies
Abstract Cyber Operational Risk: Cyber risk is routinely cited as one of the most important sources of operational risks facing organisations today, in various publications and ...
Cyber Espionage
Cyber Espionage
Cyberspace gives rise to risks as well as opportunities, and a prominent threat emerging from this domain is cyber espionage. Because no internationally and legally recognized defi...
Security Concerns in Smart Grid Cyber-Physical System
Security Concerns in Smart Grid Cyber-Physical System
A smart grid cyber physical system (SG-CPS) is an optimal fusion of a power network infrastructure and cyber system based on a communicating network. The SG-CPS employs advanced te...
The challenges of cybersecurity insurance development: The case of Latvia
The challenges of cybersecurity insurance development: The case of Latvia
Purpose. This paper aims to provide an overview of the current challenges of cybersecurity insurance, focusing on the identification of development constraints and opportunities an...
Domination of polynomial with application
Domination of polynomial with application
In this paper, .We .initiate the study of domination. polynomial , consider G=(V,E) be a simple, finite, and directed graph without. isolated. vertex .We present a study of the Ira...

Back to Top