{"title":"孟加拉国电网脆弱性分析","authors":"Fahim Al Hasnain, Atique Mahmud, A. Chowdhury","doi":"10.1109/ICECE.2016.7853939","DOIUrl":null,"url":null,"abstract":"An electric power system network is always under stress. Because of its overall interconnectivity it becomes very much necessary to protect the power system if there is any major failure. Otherwise, it will cause the whole system to collapse. Vulnerability analysis of the power system network indicates the major vulnerable nodes that should be given special protective measures for reliable power transmission and operation. Centrality approach is an effective way to determine the most sensitive edges and nodes of a power system network. This mathematical based criterion has been applied with proper algorithm for Bangladesh power system network to evaluate the most vulnerable parts of the network.","PeriodicalId":122930,"journal":{"name":"2016 9th International Conference on Electrical and Computer Engineering (ICECE)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Vulnerability analysis of Bangladesh power system network\",\"authors\":\"Fahim Al Hasnain, Atique Mahmud, A. Chowdhury\",\"doi\":\"10.1109/ICECE.2016.7853939\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"An electric power system network is always under stress. Because of its overall interconnectivity it becomes very much necessary to protect the power system if there is any major failure. Otherwise, it will cause the whole system to collapse. Vulnerability analysis of the power system network indicates the major vulnerable nodes that should be given special protective measures for reliable power transmission and operation. Centrality approach is an effective way to determine the most sensitive edges and nodes of a power system network. This mathematical based criterion has been applied with proper algorithm for Bangladesh power system network to evaluate the most vulnerable parts of the network.\",\"PeriodicalId\":122930,\"journal\":{\"name\":\"2016 9th International Conference on Electrical and Computer Engineering (ICECE)\",\"volume\":\"23 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 9th International Conference on Electrical and Computer Engineering (ICECE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICECE.2016.7853939\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 9th International Conference on Electrical and Computer Engineering (ICECE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECE.2016.7853939","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Vulnerability analysis of Bangladesh power system network
An electric power system network is always under stress. Because of its overall interconnectivity it becomes very much necessary to protect the power system if there is any major failure. Otherwise, it will cause the whole system to collapse. Vulnerability analysis of the power system network indicates the major vulnerable nodes that should be given special protective measures for reliable power transmission and operation. Centrality approach is an effective way to determine the most sensitive edges and nodes of a power system network. This mathematical based criterion has been applied with proper algorithm for Bangladesh power system network to evaluate the most vulnerable parts of the network.