All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Method of Selecting the Most Important Power Lines in a Transmission and Distribution Network

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F61989100%3A27200%2F14%3A86090149" target="_blank" >RIV/61989100:27200/14:86090149 - isvavai.cz</a>

  • Result on the web

    <a href="http://red.pe.org.pl/articles/2014/11/41.pdf" target="_blank" >http://red.pe.org.pl/articles/2014/11/41.pdf</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.12915/pe.2014.11.41" target="_blank" >10.12915/pe.2014.11.41</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Method of Selecting the Most Important Power Lines in a Transmission and Distribution Network

  • Original language description

    This article describes the method used to graph theory in security analysis. For the pursposes of this study, an environment is referred to here as a network of power lines and devices and a power grid is considered as a system of vertices which combineto make a network. Exploration of Fiedler´s theory will be applied herein to select the most important power lines for the entire network. Components related to these lines are logicly ordered and considered by the author´s modified analysis. This methodhas been improved and optimalized for risks related with illegal acts. Each power grid component has been connected with a variety of possible attacks and this device was gradually evaluated by five coefficients which takes values from 1 to 10. the level of risk was also assessed on the coefficient basis. In the last phase the most risky electricity network devices have been selected. Security measures have been proposed on the selected devices

  • Czech name

  • Czech description

Classification

  • Type

    J<sub>x</sub> - Unclassified - Peer-reviewed scientific article (Jimp, Jsc and Jost)

  • CEP classification

    AQ - Safety and health protection, safety in operating machinery

  • OECD FORD branch

Result continuities

  • Project

    <a href="/en/project/VG20102015059" target="_blank" >VG20102015059: The influence of terrorist attack on select industrial technology with dust detonation hazard</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)

Others

  • Publication year

    2014

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Name of the periodical

    Przeglad elektrotechniczny

  • ISSN

    0033-2097

  • e-ISSN

  • Volume of the periodical

    90

  • Issue of the periodical within the volume

    11/2014

  • Country of publishing house

    PL - POLAND

  • Number of pages

    4

  • Pages from-to

    152-155

  • UT code for WoS article

  • EID of the result in the Scopus database