Next Article in Journal
Entanglement Degradation in Two Interacting Qubits Coupled to Dephasing Environments
Next Article in Special Issue
Distributed Formation Control of Multi-Robot Systems with Path Navigation via Complex Laplacian
Previous Article in Journal
Synchronization of Complex Dynamical Networks with Stochastic Links Dynamics
Previous Article in Special Issue
Response Analysis of the Three-Degree-of-Freedom Vibroimpact System with an Uncertain Parameter
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Recovering Power Grids Using Strategies Based on Network Metrics and Greedy Algorithms

1
Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology, 2628 CD Delft, The Netherlands
2
Asset Management, System Insights and Advanced Analytics, Stedin, 3011 TA Rotterdam, The Netherlands
3
DS Information Technology Co., Ltd., Shanghai 200032, China
4
Unit ICT, Strategy and Policy, Netherlands Organisation for Applied Scientific Research (TNO), 2595 DA Den Haag, The Netherlands
*
Author to whom correspondence should be addressed.
Entropy 2023, 25(10), 1455; https://doi.org/10.3390/e25101455
Submission received: 5 September 2023 / Revised: 29 September 2023 / Accepted: 7 October 2023 / Published: 17 October 2023
(This article belongs to the Special Issue Nonlinear Dynamical Behaviors in Complex Systems)

Abstract

:
For this study, we investigated efficient strategies for the recovery of individual links in power grids governed by the direct current (DC) power flow model, under random link failures. Our primary objective was to explore the efficacy of recovering failed links based solely on topological network metrics. In total, we considered 13 recovery strategies, which encompassed 2 strategies based on link centrality values (link betweenness and link flow betweenness), 8 strategies based on the products of node centrality values at link endpoints (degree, eigenvector, weighted eigenvector, closeness, electrical closeness, weighted electrical closeness, zeta vector, and weighted zeta vector), and 2 heuristic strategies (greedy recovery and two-step greedy recovery), in addition to the random recovery strategy. To evaluate the performance of these proposed strategies, we conducted simulations on three distinct power systems: the IEEE 30, IEEE 39, and IEEE 118 systems. Our findings revealed several key insights: Firstly, there were notable variations in the performance of the recovery strategies based on topological network metrics across different power systems. Secondly, all such strategies exhibited inferior performance when compared to the heuristic recovery strategies. Thirdly, the two-step greedy recovery strategy consistently outperformed the others, with the greedy recovery strategy ranking second. Based on our results, we conclude that relying solely on a single metric for the development of a recovery strategy is insufficient when restoring power grids following link failures. By comparison, recovery strategies employing greedy algorithms prove to be more effective choices.

1. Introduction

The power grid system is vulnerable to disruptions caused by manufacturing defects, natural disasters, and human actions, such as terrorist attacks [1,2,3]. Even minor initial disturbances can lead to severe consequences, including economic and social instability [4,5,6]. To reduce the costs associated with the disruptions, one research direction is to enhance the robustness of the power grid to withstand perturbations. The other direction is to propose efficient restoration strategies.
The power grid can be represented as a complex network, where nodes represent generators and loads, and where links represent transmission lines and transformers. Analyzing the power grid’s robustness from a network perspective has attracted significant attention. Network robustness is typically evaluated by assessing changes in network performance due to fluctuations such as node removals or link removals [7]. Identifying critical nodes and links within the power grid can inform strategies for enhancing robustness by protecting the vital components [8,9,10]. Furthermore, robust failure responses, like partitioning grids into islands, can mitigate the effects of components disruptions [11,12]
Numerous studies have focused on strategies for power grid recovery [13], from black start [14]—like an optimal generator start-up strategy by solving a mixed integer linear programming (MILP) problem [15]—to a method that partitions the network to restore parts of the power grid separately and then interconnects them afterward [16]. Additionally, research has been conducted on recovering power grids after partial component failures. Machine learning methods, specifically reinforcement learning, have been developed for restoring networks after node failures [17] and link failures [18]. The machine learning methods demonstrated better performance for node recovery strategies based on node degrees or node loads and link recovery strategies based on link betweenness. Li et al. [19] developed the Q-learning method, to find an optimal method to recover power grids with link failures. From a network perspective, Wu et al. [20] developed an effective tool for the sequential recovery graph, to recover nodes in power grids, which performed better than recovery strategies based on node degree and node loads. Forming microgrids can improve the resilience of the system after blackouts. Igder et al. [21] applied deep reinforcement learning, to establish microgrids from black start after blackouts, so as to restore service in distribution networks. Yeh et al. [22] developed an enhanced genetic algorithm, to minimize costs while optimizing dispatch in stand-alone microgrid systems.
Despite extensive research on power grid recovery, there is still a lack of investigation into the effectiveness of recovery strategies that rely solely on different network metrics following transmission line failures. From this study, our main contributions are as follows:
  • We examined recovery strategies based on various network metrics, including degree, betweenness, flow betweenness, eigenvector centrality, weighted eigenvector centrality, closeness, electrical closeness, electrical weighted closeness, zeta vector centrality, and weighted zeta vector centrality. Additionally, we compared these strategies to the random recovery, greedy, and two-step greedy strategies.
  • To assess the effectiveness of recovery methods, we utilized the general recoverability framework proposed by He et al. [23], to measure power grid recoverability in the context of random link removals, where recoverability signifies a network’s ability to return to a predefined desired performance level.
  • Our study did not consider cascading failures after the recovery or removal of a single transmission line. Instead, we used the direct current (DC) power flow model to maximize power flow satisfaction for loads after a link removal or addition.
The paper is structured as follows: Section 2 provides an overview of network robustness, laying the foundation for the subsequent analyses. Section 3 details the modeling of power grids, including how to transfer a power grid into a network and optimize the DC power flow model. Section 4 presents the attack and recovery processes, with a focus on the strategies employed. The results and conclusion are presented in Section 5 and Section 6, respectively.

2. Preliminary for Network Robustness

2.1. R-Value and Challenges

In a framework for computing network robustness [7], network robustness is interpreted as a measure of the network’s response to perturbations, such as failures or attacks. The robustness value R was proposed to measure the performance of a network at a certain time, which is related to the function of the network, i.e., the type of service the network is supposed to support, such as road transport, neuron transport or the spreading of news on a social network. The R-value is normalized in the range [ 0 , 1 ] . Here, R = 0 corresponds to a network completely lacking robustness, while R = 1 corresponds to an optimally robust network.
We assume that perturbations are imposed on a network through a number of elementary changes [7,23,24]. We denote the total number of the changes by K. An elementary change in a network is defined as an event that changes the topology of a network, such as a link addition, a link removal or a change in the link weight. An elementary change in the network may result in a change of the R-value. For this paper, we considered elementary changes as the random removal of a link during the attack phase and the recovery of a link previously removed in the attack phase. Additionally, we denoted the number of challenges in the attack process as K a and in the recovery process as K r .

2.2. Recoverability Indicator of a Recovery Strategy

The performance of a power grid at any time can be captured by a specific R-value, which possibly changes when an elementary change occurs. The R-value at challenge k is denoted as R [ k ] . The areas under the R-value line during the processes can reflect the effectiveness of the attack strategy or the recovery strategy [25], which is shown in Figure 1. We define the attack strength S a and the recovery strength S r , which satisfy the following relations:
S a = k = 0 K a R [ k ]
and
S r = k = K a K a + K r R [ k ] ,
where K a is the total number of challenges in the attack process and K r is the total number of challenges in the recovery process. Furthermore, we define the recoverability energy ratio η , as follows:
η = S r S a .
The recoverability energy ratio η presents the efficiency of the recovery strategy, with respect to the attack strategy. The larger the recoverability energy ratio η is, the more efficient the recovery strategy is.

3. Modeling Power Grids

3.1. Network Model of Power Grids

A power grid can be represented by a graph G , where the set of N nodes is denoted as N and the set of L links is denoted as L . For an unweighted and undirected graph, the symmetric adjacency matrix A has elements a i j = 1 if the nodes i and j are connected by a link l i j L , otherwise, a i j = 0 . Alternatively, we can also model a power grid as a weighted graph. The link weight is related to the impedance of transmission line l i j , which will be denoted as y i j . The weighted symmetric adjacency matrix A ˜ has elements a ˜ i j = 1 y i j if a link l i j L exists, otherwise, a ˜ i j = 0 [26].
For this study, we chose three power grids [27]: IEEE 30, IEEE 39, and IEEE 118. We present the number of nodes N, the number of links L, and the average degree d a v of the unweighted power grids in Table 1.

3.2. Performance of Power Grids

As proposed by Cetinay et al. [28], we employ an R-value in a power grid: the ratio of the total satisfied demand to the total initial demand, called the yields. At challenge k, we denote the amount of satisfied demand at bus i by L i [ k ] and the amount of supply at bus i by G i [ k ] . Therefore, the injected power P i at node i satisfies P i [ k ] = G i [ k ] L i [ k ] . As the total demand matches the supply in a power grid, it holds that i = 1 N L i [ k ] = i = 1 N G i [ k ] . At challenge k = 0 , the power grid has not been attacked and the initial demand of bus i is L i [ 0 ] . Then, the yields—an R-value at a challenge k—can be calculated by
R [ k ] = i = 1 N L i [ k ] i = 1 N L i [ 0 ] .

3.3. Optimizing the DC Power Flow Model

Compared to cascading failure models in power grids, we propose a power flow redistribution mechanism to achieve a steady state by optimizing the total satisfied demand value. The mechanism adjusts the supply and demand of buses, using a linear programming method to ensure that line flows are below the line capacity. Specifically, the objective of the proposed model is to optimize the total satisfied demand while satisfying several constraints, including: (1) the power grid satisfies Kirchhoff’s Law and Ohm’s Law; (2) the total supply matches the total demand at each challenge; (3) the supply and demand of a bus are not beyond its initial values; (4) the absolute value of a line flow is not beyond the line capacity. The DC power flow model [28] at challenge k obeys the optimization situation:
minimize i = 1 N G i [ k ] subject to G [ k ] L [ k ] = Q ˜ [ k ] Θ [ k ] , F [ k ] = B ˜ T [ k ] Θ [ k ] , i N G i [ k ] i N L i [ k ] = 0 , 0 G [ k ] G [ 0 ] , 0 L [ k ] L [ 0 ] , C F [ k ] C .
The weighted Laplacian matrix is Q ˜ [ k ] = Δ ˜ [ k ] A ˜ [ k ] , where Δ ˜ [ k ] is the weighted degree matrix and A ˜ [ k ] is the weighted adjacency matrix; Θ is the N × 1 vector with elements θ i , which presents the phase angle of bus i; B ˜ [ k ] is the N × L weighted incidence matrix with elements
b ˜ i l = a ˜ i j if link e l = i j , a ˜ i j if link e l = i j , 0 otherwise ,
and Q ˜ [ k ] = B ˜ [ k ] B ˜ [ k ] T .
The supply and demand vectors G [ k ] and L [ k ] include the supply G i [ k ] and demand L i [ k ] of each bus i, respectively. The initial supply and demand values of all buses are stored in the vectors G [ 0 ] and L [ 0 ] at challenge k = 0 . The active power flow vector F [ k ] has L elements, each representing the power flow f i j [ k ] of a transmission line l i j connecting buses i and j. The capacity vector C is a vector with L elements and each element c i j representing the capacity of each transmission line l i j .
For the power grid, the line capacity c i j is defined as α f i j [ 0 ] , where flow vector F [ 0 ] is the active power flow of each line at the initial stage (at challenge k = 0 ) and α is the tolerance level [29].

4. The Attack and Recovery Process

4.1. The Attack Process

In the attack process, we select links uniformly at random, to be removed iteratively until the R value of the power grid falls below a predetermined threshold. The flowchart of the attack process is shown in Figure 2a:

4.2. The Recovery Process

In the recovery process, links previously removed from the power grid are gradually added back individually, with the order of additions determined by a chosen recovery strategy. The flowchart of the recovery process is presented in Figure 2b. We explore the efficiency of 13 different recovery strategies introduced in the following section. It is important to note that strategies based on topological network metrics are calculated based on the original network configuration before the attack process. The flow chart of recovery strategies based on network metrics is presented in Figure 3.

4.2.1. Random Recovery Strategy (Rand)

A link is randomly selected, to add to the power grid one by one from the set of links that were removed during the attack process.

4.2.2. Greedy and Two-Step Greedy Recovery Strategies (Greedy and TwoGreedy)

The greedy recovery strategy is to optimize the performance of the power grid at each stage of the recovery process. The strategy selects the link that yields the largest R-value of the power grid in each step and adds the link to the grid. The greedy recovery strategy flow chart is depicted in Figure 4a.
In contrast to the greedy recovery strategy, which focuses on identifying a single link that significantly improves the R-value in one step, an improved approach involves selecting n links that collectively maximize the summation of the R-value in n steps, which can be achieved by exhaustively enumerating all permutations of n links from the set of potential links to be added. By considering multiple steps, more information is incorporated, resulting in potentially better solutions for the n-step greedy recovery strategy. However, if the value of n becomes excessively large, the computational cost becomes prohibitive. Therefore, in this study, we chose to investigate the performance of the two-step greedy recovery strategy. Specifically, the two-step greedy strategy aims to determine two links to be added sequentially, optimizing the sum of the R-values achieved in the two steps. We present the flowchart of the two-step greedy strategy in Figure 4b.

4.2.3. Degree Recovery Strategy (Degree)

The degree d i is the number of neighboring nodes of node i, which can be used to measure the node’s importance. By using the adjacency matrix A, the calculation of the degree is d i = j = 1 N a i j . To evaluate the significance of a link, we can use the product d i j of the degrees of the nodes connected by the link l i j [30], denoted as d i j = d i d j .
The degree recovery strategy involves a sequence of link additions, based on the descending order of the product of the degrees of the end points of each removed link. Consequently, the first link to be added possesses the largest product of the degrees of its end points in the removed link set.

4.2.4. Betweenness and Flow Betweenness Recovery Strategies (Bet and FlowBet)

The betweenness of a link is widely used to measure the importance of a link l i j in the network. It is defined as the ratio of the shortest paths through the link l i j to the number of all shortest paths in the network [31]. If we denote the number of shortest paths from node s to node t as P s t and the number of the shortest paths from node s to node t through the link l i j as P s t ( l i j ) , the betweenness b i j of link l i j can be calculated by
b i j = s , t N P s t ( l i j ) P s t .
The shortest paths are the most efficient ways for a flow in a network to travel from one node to another node if the traveling cost of every link is the same and there are no other limitations in the network, like link capacity. However, in a power grid, the distribution of the power flow is determined by the Kirchhoff and Ohm laws, not by the shortest paths. Therefore, Newman [32] proposed flow betweenness to measure the link importance in a power grid. The flow betweenness b ¯ i j of link l i j is defined as the sum of the power flow through link l i j for any node pair s and t if one unit of power is injected to node s and one unit of power is extracted from node t. The flow betweenness b ¯ i j of link l i j can be calculated by
b ¯ i j = s , t N | f s t ( l i j ) | ,
where | f s t ( l i j ) | is the magnitude of flow through the link l i j according to DC flow equations and Ohm’s law when we inject one unit of active power to node s and extract one unit of active power from node t.
The sequence of added links in the betweenness or flow betweenness recovery strategies assumes a descending order of betweenness or flow betweenness of links.

4.2.5. Eigenvector and Weighted Eigenvector Recovery Strategies (Eigen and WeiEigen)

The eigenvector centrality measures the importance of a node by not only taking into account the number of its connected nodes but also considering the importance of its connected nodes [30,33]. The eigenvector centrality x i of node i is the i-th element of the eigenvector with the largest eigenvalue of the adjacency matrix A. Compared to the eigenvector centrality, the weighted eigenvector centrality x ¯ i of node i is the i-th element of the eigenvector with the largest eigenvalue of the weighted adjacency matrix A ˜ . The products e i j and e ¯ i j of the eigenvector centrality and the weighted eigenvector centrality of link l i j ’s end points are calculated by e i j = x i x j , e ¯ i j = x ¯ i x ¯ j .
The sequences of links are added in the descending order of the products e i j or e ¯ i j of the links in the eigenvector or the weighted eigenvector recovery strategies.

4.2.6. Closeness, Electrical Closeness, and Electrical Weighted Closeness Recovery Strategies (Close, EleClose, and EleWeiClose)

The closeness centrality of a node relates to the node’s distance from all other nodes [34]. If the distance of the shortest path between node i and node j is denoted by H i j , then the closeness c ¯ i of node i is defined as
c ¯ i = 1 j = 1 N H i j .
We calculate the product c ¯ i j of the closeness of link l i j ’s end points, c ¯ i j = c ¯ i c ¯ j , which is used in the closeness recovery strategy, to measure the importance of a link.
As the flow in a power grid follows the Kirchhoff law—not only the shortest path—using so-called effective resistance is a more appropriate way to quantify the distance between a pair of nodes in a power grid [35]. The effective resistance between node i and node j is denoted as Ω i j , which can be calculated by using the pseudo-inverse matrix Q of the Laplacian matrix Q of the adjacency matrix A: Ω i j = ( Q ) i i + ( Q ) j j 2 ( Q ) i j [36]. By analogy with closeness, the electrical closeness c ˜ i of node i is given by
c ˜ i = 1 j = 1 N Ω i j .
We use the product c ˜ i j of the electrical closeness values of the end points of link l i j in the electrical closeness recovery strategy, where c ˜ i j = c ˜ i c ˜ j .
Compared to the electrical closeness of a link, the difference in calculating the electrical weighted closeness of a link is that we use the Laplacian matrix Q ˜ of the weighted adjacency matrix A ˜ . Analogously, we firstly obtain the effective resistance Ω ˜ using Ω ˜ i j = ( Q ˜ ) i i + ( Q ˜ ) j j 2 ( Q ˜ ) i j , where Q ˜ is the pseudo-inverse matrix of the Laplacian matrix Q ˜ . Then, the electrical weighted closeness w i of node i is calculated by
w i = 1 j = 1 N Ω ˜ i j .
The product w i j of the electrical weighted closeness values of the end points of link l i j , w i j = w i w j , is the measurement of a link in the electrical weighted closeness strategy.
In the closeness, electrical closeness, and electrical weighted closeness recovery strategies, we prioritize the recovery of links based on the descending order of the products c ¯ i j , c ˜ i j or w i j .

4.2.7. Zeta Vector and Weighted Zeta Recovery Strategies (Zeta and WeiZeta)

The zeta vector ζ , inspired by the electrical flow in a resistant network, serves as a representation of nodal spread capacity. The minimization of the zeta vector leads to the identification of the best spreader [26]. Specifically, the zeta vector consists of the diagonal elements of the pseudo-inverse matrix Q , derived from the Laplacian matrix Q. Thus, ζ = ( ( Q ) 11 , ( Q ) 22 , , ( Q ) i i ) , where ( Q ) i i represents the zeta vector value ζ i associated with node i.
When employing the weighted adjacency matrix A ˜ , the weighted zeta vector ζ ˜ is the diagonal elements of the pseudo-inverse matrix of the weighted Laplacian matrix Q ˜ , denoted as ζ ˜ = ( ( Q ˜ ) 11 , ( Q ˜ ) 22 , , ( Q ˜ ) i i ) . Here, ( Q ˜ ) i i represents the weighted zeta vector value ζ ˜ i associated with node i.
To assess the significance of a link based on the zeta vector values of its end points, we introduce the zeta vector metric ζ i j = ζ i ζ j and the weighted zeta vector metric ζ ˜ i j = ζ i ˜ ζ j ˜ for a given link l i j . The metrics are calculated by multiplying the zeta vector values or the weighted zeta vector values of the link end points.
To restore the removed links in the zeta vector and weighted zeta vector recovery strategies, we adopt a ranking scheme based on the descending order of the links’ zeta vector metric values or weighted zeta vector metric values.

5. Results

To investigate the effectiveness of recovery strategies in power grids, we conducted simulations on three different power grids: the IEEE 30 bus system, the IEEE 39 bus system, and the IEEE 118 bus system. In each realization, we randomly removed links until the R-value of the system fell below a specified threshold. We then used various strategies to restore the system until all the removed links were added. Finally, we computed the recoverability energy ratio of each recovery strategy, given the same random removal process. To explore the impact of thresholds and tolerance levels, we selected two thresholds (0.8 and 0.5) and four tolerance levels (1, 2, 2.5, and 3) and performed 1000 realizations for a power grid with each setting. In Figure 5, we demonstrate how the R-value varied in a realization with different recovery strategies for the IEEE 39 bus system and the abbreviations of the strategies used in the following figures and tables in Table 2.
We present the recoverability energy ratios of various recovery strategies concerning two thresholds and a tolerance level equal to 1 for the considered power grids, as shown in Table 3, Table 4 and Table 5. The tables illustrate that the greedy two-step method exhibited the highest mean value of recoverability energy ratio and the lowest standard deviation value for all three power grids in both threshold cases. Additionally, the greedy method consistently maintained the second-best performance, in terms of the recoverability energy ratio mean value for all three power grids, albeit its performance was slightly inferior to that of the greedy two-step method. Notably, the difference in performance between the greedy two-step method and the greedy method was more pronounced when the threshold was equal to 0.5, compared to the case when the threshold was 0.8. This observation suggests that the greedy two-step method outperforms the greedy method when the removal link set is relatively large. Another noteworthy finding concerned the results of the random recovery method. The mean recoverability energy ratios of all the power grids with different thresholds of the random recovery method were less than 1, indicating that the cost of recovery outweighed the cost of attacks.
For the recovery strategies utilizing link metrics or the product of node centralities of link end points, we observed noteworthy variations in performance across different power grids. Specifically, the recovery method based on link betweenness exhibited diverse rankings of mean recoverability energy ratio when applied to the three power grids under consideration. In the IEEE 30 bus system, the mean recoverability energy ratio rank of the betweenness recovery method fell within the bottom two. Conversely, within the IEEE 39 bus system, the betweenness recovery method achieved an intermediate rank among all the methods based on the mean recoverability energy ratio. Remarkably, the recovery method based on betweenness centrality yielded the highest mean recoverability energy ratio among all the recovery strategies based on ink metrics or the product of the node centrality values of link end points in the IEEE 118 bus system.
In addition to the betweenness recovery strategy, the zeta vector recovery strategy exhibited a similar performance pattern. The strategy demonstrated effectiveness in the IEEE 30 bus system, with a threshold value of 0.5, as well as in the IEEE 39 bus system. However, the efficiency diminished when applied to the IEEE 118 bus system. The results indicate that the efficacy of recovery methods based on link metrics or the product of node centralities of link end points is contingent upon the underlying network topology and dynamics of the networks.
The observation can be attributed to the distinct allocation of generators in the IEEE 39 bus system, as illustrated in Figure 6. Specifically, the majority of the generators in the IEEE 39 bus system had only one neighbor, and the proportion of links attached to generators was 22.74%, which was significantly higher than the corresponding proportions in the other two systems. By contrast, the IEEE 30 bus system had only one generator with a neighbor, and the proportion of links connected to generators was 14.63%, while the IEEE 118 bus system had three generators with a neighbor, and the proportion of links connected to generators was 10.62%. Therefore, the location of generators in the IEEE 39 system made the links connected to generators more susceptible to attacks and less likely to be recovered than the other two systems. Based on calculating the average values of the link metrics used for the different recovery strategies of two kinds of links—links connecting generators and loads, and links connecting loads and loads in Appendix A Table A2—we found that in the IEEE 39 system, the link metrics of the links connecting generators and loads were larger than the link metrics of the links connecting loads and loads in the zeta recovery strategy and weighted zeta recovery strategy, indicating that recovering the links connecting generators and loads matters in the recovery process.
Compared to the IEEE 30 bus system and the IEEE 39 bus system, the recovery methods based on link metrics and the product of node centrality values of link end points in the IEEE 118 system demonstrated substantially better performance. Specifically, most recovery strategies based on link metrics and the product of node centrality values of link end points exhibited higher average recoverability energy ratios than the random recovery strategy for both thresholds.
Link capacity is a crucial factor in causing blackouts in power grids. Although our method did not employ the cascading failure model, we investigated the impact of link capacity on recovery strategies. To this end, we conducted simulations with different tolerance levels ( α = 1 ,   α = 2 ,   α = 2.5 ,   α = 3 ), and we analyzed the results, which are presented in Figure 7 for the IEEE 30 bus system, the IEEE 39 bus system, and the IEEE 118 bus system. The simulation results show that the mean values of the recoverability energy ratio with respect to different tolerance levels did not change monotonically for the same recovery method, which could inspire study of the optimal tolerance level. The ranking of recovery strategies based on network metrics may have varied slightly, but the two-step greedy recovery strategy consistently performed the best, with the greedy recovery strategy following closely behind. Moreover, the results indicate that the recovery strategy based on betweenness outperformed the recovery strategy based on flow betweenness, while the electrical weighted closeness recovery strategy was the best among the electrical closeness recovery strategy, closeness recovery strategy, and electrical weighted closeness recovery strategy.

6. Conclusions and Discussion

Based on our study, we observed significant variations in the performances of different recovery strategies. Firstly, the recovery strategies based on link metrics and the product of the node centrality values of link endpoints did not achieve the highest performance. Secondly, the performance of those recovery strategies varied notably across different power systems, emphasizing the significance of network topology and generator placements in power grids. Thirdly, the two-step greedy recovery strategy consistently outperformed all other network metric-based recovery methods across all power systems, thresholds, and tolerance levels. The greedy recovery strategy, which was slightly less effective than the two-step greedy recovery strategy, also showed promising results. The findings confirm that implementing an effective recovery strategy can significantly improve the recoverability of power grids and that the two-step greedy strategy is particularly efficient, while relying solely on one network metric for recovery is less effective.
For future research directions, several avenues are worth exploring. Firstly, we can develop hierarchical recovery strategies, by classifying links into two groups—those connected to generators and those not connected to generators—and then prioritizing restoring links connected to generators. Secondly, we can investigate whether allowing cascading failures after link recovery or removal impacts the conclusions of this study. Thirdly, we can introduce additional constraints—such as generator costs—and incorporate cost minimization as an objective within the DC power flow model. Finally, given that distributed energy systems enhance power system resilience, it is promising to research how to establish and integrate such systems after a blackout, using the discussed strategies.

Author Contributions

Conceptualization, H.C., Z.H. and F.W.; methodology, P.V.M., Z.H. and R.E.K.; software, H.C. and F.W.; validation, F.W. and R.E.K.; formal analysis, F.W. and Z.H.; investigation, F.W. and L.L.; resources, H.C., F.W. and R.E.K.; data curation, F.W. and H.C.; writing—original draft preparation, F.W., H.C. and Z.H.; writing—review and editing, F.W., H.C., Z.H., L.L., P.V.M. and R.E.K.; visualization, F.W.; supervision, P.V.M. and R.E.K.; project administration, P.V.M. and R.E.K.; funding acquisition, F.W., Z.H. and P.V.M. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by the China Scholarship Council (No. 201906040194), the Shanghai Science and Technology “Rising-Star” Program (22QB1400200), the European Research Council under the European Union’s Horizon 2020 research and innovation program (Grant Agreement 101019718).

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

We thank Yigu Liu for helpful discussion. F.W. was supported by the China Scholarship Council (No. 201906040194). Z.H. was supported by the Shanghai Science and Technology “Rising-Star” Program (22QB1400200), and P.V.M. was supported by the European Research Council under the European Union’s Horizon 2020 research and innovation program (Grant Agreement 101019718).

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
K a the number of challenges in the attack process;
K r the number of challenges in the recovery process;
R [ k ] the value of R at challenge k;
S a the attack strength;
S r the recovery strength;
η the recoverability energy ratio;
G a graph;
Nthe number of nodes in a graph;
N the set of N nodes;
Lthe number of links in a graph;
L the set of L links;
Athe adjacency matrix;
a i j the element of the adjacency matrix;
l i j the link connecting node i and node j;
y i j the impedance of transmission line l i j ;
A ˜ the weighted adjacency matrix;
a ˜ i j the element of the weighted adjacency matrix;
d a v the average degree;
L i [ k ] the amount of satisfied demand at bus i at challenge k;
G i [ k ] the amount of supply at bus i at challenge k;
P i the injected power at node i;
Q ˜ the weighted Laplacian matrix;
Δ ˜ the weighted degree matrix;
θ i the phase angle of bus i;
Θ the N × 1 vector with elements θ ;
B ˜ the weighted incidence matrix;
b ˜ i j the element of the weighted incidence matrix;
G [ k ] the supply vector, including the supply G i [ k ] of each bus i at challenge k;
L [ k ] the demand vector, including the demand L i [ k ] of each bus i at challenge k;
F [ k ] the active power flow vector at challenge k;
f i j [ k ] the power flow of line l i j at challenge k;
C the capacity vector, including the capacity of all transmission lines;
c i j the capacity of each transmission line l i j ;
α the tolerance level;
d i the degree of node i;
d i j the degree of link l i j ;
b i j the betweenness of link l i j ;
P s t the number of shortest paths from node s to node t;
P s t ( l i j ) the number of shortest paths from node s to node t through link l i j ;
b ¯ i j the flow betweenness;
| f s t ( l i j ) | the magnitude of flow through the link l i j when we inject one unit of active
power to node s and extract one unit of active power from node t;
x i the eigenvector centrality of node i;
e i j the product of the eigenvector centrality values of the end points of link l i j ;
x ¯ i the weighted eigenvector centrality of node i;
e ¯ i j the product of the weighted eigenvector centrality values of the end points of link l i j ;
H i j the distance of the shortest path between node i and node j;
c ¯ i the closeness of node i;
c ¯ i j the product of the closeness values of the end points of link l i j ;
Qthe Laplacian matrix of adjacency matrix A;
Q the pseudo-inverse Laplacian matrix of the Laplacian matrix Q;
Ω i j the effective resistance between node i and node j, calculated by
using the pseudo-inverse matrix Q ;
c ˜ i the electrical closeness of node i;
c ˜ i j the product of the electrical closeness values of the end points of link l i j ;
Q ˜ the pseudo-inverse matrix of the weighted Laplacian matrix Q ˜ ;
Ω ˜ i j the effective resistance between node i and node j, calculated by
using the pseudo-inverse matrix Q ˜ ;
w i the electrical weighted closeness of node i;
w i j the product of the electrical weighted closeness values of the end points of link l i j ;
ζ the zeta vector;
ζ ˜ the weighted vector;
ζ i j the product of the zeta vector values of the end points of link l i j ;
ζ ˜ i j the product of the weighted zeta vector values of the end points of link l i j .

Appendix A. Link Measurements Based on Whether Links Are Connected to Generators

Table A1. IEEE 30 bus system.
Table A1. IEEE 30 bus system.
MetricsConnected to GeneratorsNot Connected to Generators
MeanStdMeanStd
FlowBet94.77055144.594022114.74275247.264862
Degree10.4000006.23125812.2692319.101902
Zeta0.5285840.2964560.4923460.434582
Bet0.0812260.0443530.0802830.063794
Eigen0.0323070.0423180.0505330.055398
WeiZeta0.0259840.0316590.0249180.050187
EleWeiClose0.0128890.0046150.0146700.005090
WeiEigen0.0457590.1224300.0098240.037966
EleClose0.0004880.0001320.0005350.000167
Close0.0001230.0000290.0001360.000038
Table A2. IEEE 39 bus system.
Table A2. IEEE 39 bus system.
MetricsConnected to GeneratorsNot Connected to Generators
MeanStdMeanStd
FlowBet96.37020145.321198240.779292107.181289
Degree3.2727270.6466708.8000002.654630
Zeta3.1146071.7471251.1386560.685581
EleWeiClose0.2293490.0686450.4377750.126349
Bet0.0503010.0058540.1198770.072109
Eigen0.0084640.0049230.0370580.016150
WeiEigen0.0034690.0102970.0301480.074798
WeiZeta0.0010330.0007090.0003100.000363
EleClose0.0000700.0000180.0001150.000027
Close0.0000260.0000050.0000390.000010
Table A3. IEEE 118 bus system.
Table A3. IEEE 118 bus system.
MetricsConnected to GeneratorsNot Connected to Generators
MeanStdMeanStd
FlowBet832.375534764.6106778.816749542.1641
Degree19.18918910.9026510.7619055.989612
Zeta1.0918841.303061.3382460.9381184
Bet0.0465040.06074670.0273090.0374265
WeiZeta0.0093820.01389220.0113880.0088103
WeiEigen0.0025170.01543070.0054040.0468745
Eigen0.0205860.0228950.0050410.008672
EleWeiClose0.0020650.00069410.0017720.0005885
EleClose0.0000170.00000510.0000140.0000038
Close0.0000020.00000080.0000020.0000006

References

  1. Nuti, C.; Rasulo, A.; Vanzi, I. Seismic safety evaluation of electric power supply at urban level. Earthq. Eng. Struct. Dyn. 2007, 36, 245–263. [Google Scholar] [CrossRef]
  2. Zhou, X.; Yan, C. A blackout in Hainan Island power system: Causes and restoration procedure. In Proceedings of the 2008 IEEE Power and Energy Society General Meeting-Conversion and Delivery of Electrical Energy in the 21st Century, Pittsburgh, PA, USA, 20–24 July 2008; pp. 1–5. [Google Scholar] [CrossRef]
  3. Wang, C.; Ju, P.; Wu, F.; Pan, X.; Wang, Z. A systematic review on power system resilience from the perspective of generation, network, and load. Renew. Sustain. Energy Rev. 2022, 167, 112567. [Google Scholar] [CrossRef]
  4. Muir, A.; Lopatto, J. Final Report on the August 14, 2003 Blackout in the United States and Canada: Causes and Recommendations; Technical Report; U.S.-Canada Power System Outage Task Force: Ottawa, ON, Canada; Washington, DC, USA, 2004.
  5. LaCommare, K.H.; Eto, J.H. Understanding the Cost of Power Interruptions to US Electricity Consumers; Technical Report; Lawrence Berkeley National Lab. (LBNL): Berkeley, CA, USA, 2004. [Google Scholar]
  6. Hines, P.; Apt, J.; Talukdar, S. Large blackouts in North America: Historical trends and policy implications. Energy Policy 2009, 37, 5249–5259. [Google Scholar] [CrossRef]
  7. Van Mieghem, P.; Doerr, C.; Wang, H.; Hernandez, J.M.; Hutchison, D.; Karaliopoulos, M.; Kooij, R. A Framework for Computing Topological Network Robustness; Report20101218; Delft University of Technology: Delft, The Netherlands, 2010. [Google Scholar]
  8. Cetinay, H.; Devriendt, K.; Van Mieghem, P. Nodal vulnerability to targeted attacks in power grids. Appl. Netw. Sci. 2018, 3, 34. [Google Scholar] [CrossRef]
  9. Schäfer, B.; Witthaut, D.; Timme, M.; Latora, V. Dynamically induced cascading failures in power grids. Nat. Commun. 2018, 9, 1975. [Google Scholar] [CrossRef]
  10. Pagani, G.A.; Aiello, M. The power grid as a complex network: A survey. Phys. A Stat. Mech. Its Appl. 2013, 392, 2688–2700. [Google Scholar] [CrossRef]
  11. Rocchetta, R. Enhancing the resilience of critical infrastructures: Statistical analysis of power grid spectral clustering and post-contingency vulnerability metrics. Renew. Sustain. Energy Rev. 2022, 159, 112185. [Google Scholar] [CrossRef]
  12. Kyriacou, A.; Demetriou, P.; Panayiotou, C.; Kyriakides, E. Controlled Islanding Solution for Large-Scale Power Systems. IEEE Trans. Power Syst. 2018, 33, 1591–1602. [Google Scholar] [CrossRef]
  13. Younesi, A.; Shayeghi, H.; Wang, Z.; Siano, P.; Mehrizi-Sani, A.; Safari, A. Trends in modern power systems resilience: State-of-the-art review. Renew. Sustain. Energy Rev. 2022, 162, 112397. [Google Scholar] [CrossRef]
  14. Liu, Y.; Fan, R.; Terzija, V. Power system restoration: A literature review from 2006 to 2016. J. Mod. Power Syst. Clean Energy 2016, 4, 332–341. [Google Scholar] [CrossRef]
  15. Sun, W.; Liu, C.C.; Zhang, L. Optimal generator start-up strategy for bulk power system restoration. IEEE Trans. Power Syst. 2010, 26, 1357–1366. [Google Scholar] [CrossRef]
  16. Sarmadi, S.A.N.; Dobakhshari, A.S.; Azizi, S.; Ranjbar, A.M. A sectionalizing method in power system restoration based on WAMS. IEEE Trans. Smart Grid 2011, 2, 190–197. [Google Scholar] [CrossRef]
  17. Wu, J.; Fang, B.; Fang, J.; Chen, X.; Chi, K.T. Sequential topology recovery of complex power systems based on reinforcement learning. Phys. A Stat. Mech. Its Appl. 2019, 535, 122487. [Google Scholar] [CrossRef]
  18. Zhang, Y.; Wu, J.; Chen, Z.; Huang, Y.; Zheng, Z. Sequential Node/Link Recovery Strategy of Power Grids Based on Q-Learning Approach. In Proceedings of the 2019 IEEE International Symposium on Circuits and Systems (ISCAS), Sapporo, Japan, 26–29 May 2019; pp. 1–5. [Google Scholar] [CrossRef]
  19. Li, Q.; Zhang, X.; Guo, J.; Shan, X.; Wang, Z.; Li, Z.; Tse, C.K. Integrating Reinforcement Learning and Optimal Power Dispatch to Enhance Power Grid Resilience. IEEE Trans. Circuits Syst. II Express Briefs 2022, 69, 1402–1406. [Google Scholar] [CrossRef]
  20. Wu, J.; Chen, Z.; Zhang, Y.; Xia, Y.; Chen, X. Sequential Recovery of Complex Networks Suffering from Cascading Failure Blackouts. IEEE Trans. Netw. Sci. Eng. 2020, 7, 2997–3007. [Google Scholar] [CrossRef]
  21. Igder, M.A.; Liang, X. Service Restoration Using Deep Reinforcement Learning and Dynamic Microgrid Formation in Distribution Networks. IEEE Trans. Ind. Appl. 2023, 59, 5453–5472. [Google Scholar] [CrossRef]
  22. Yeh, W.C.; He, M.F.; Huang, C.L.; Tan, S.Y.; Zhang, X.; Huang, Y.; Li, L. New genetic algorithm for economic dispatch of stand-alone three-modular microgrid in DongAo Island. Appl. Energy 2020, 263, 114508. [Google Scholar] [CrossRef]
  23. He, Z.; Sun, P.; Van Mieghem, P. Topological Approach to Measure Network Recoverability. In Proceedings of the 2019 11th International Workshop on Resilient Networks Design and Modeling (RNDM), Nicosia, Cyprus, 14–16 October 2019; pp. 1–7. [Google Scholar] [CrossRef]
  24. Trajanovski, S.; Martín-Hernández, J.; Winterbach, W.; Van Mieghem, P. Robustness envelopes of networks. J. Complex Netw. 2013, 1, 44–62. [Google Scholar] [CrossRef]
  25. Sun, P.; He, Z.; Kooij, R.E.; Van Mieghem, P. Topological approach to measure the recoverability of optical networks. Opt. Switch. Netw. 2021, 41, 100617. [Google Scholar] [CrossRef]
  26. Van Mieghem, P.; Devriendt, K.; Cetinay, H. Pseudoinverse of the Laplacian and best spreader node in a network. Phys. Rev. E 2017, 96, 032311. [Google Scholar] [CrossRef]
  27. Koç, Y.; Verma, T.; Araujo, N.A.M.; Warnier, M. MATCASC: A tool to analyse cascading line outages in power grids. In Proceedings of the 2013 IEEE International Workshop on Inteligent Energy Systems (IWIES), Vienna, Austria, 14 November 2013; pp. 143–148. [Google Scholar] [CrossRef]
  28. Cetinay, H.; Soltan, S.; Kuipers, F.A.; Zussman, G.; Van Mieghem, P. Comparing the effects of failures in power grids under the AC and DC power flow models. IEEE Trans. Netw. Sci. Eng. 2017, 5, 301–312. [Google Scholar] [CrossRef]
  29. Motter, A.E.; Lai, Y.C. Cascade-based attacks on complex networks. Phys. Rev. E 2002, 66, 065102. [Google Scholar] [CrossRef] [PubMed]
  30. Van Mieghem, P.; Stevanović, D.; Kuipers, F.; Li, C.; van de Bovenkamp, R.; Liu, D.; Wang, H. Decreasing the spectral radius of a graph by link removals. Phys. Rev. E 2011, 84, 016101. [Google Scholar] [CrossRef] [PubMed]
  31. Newman, M.E.; Girvan, M. Finding and evaluating community structure in networks. Phys. Rev. E 2004, 69, 026113. [Google Scholar] [CrossRef] [PubMed]
  32. Newman, M.E. A measure of betweenness centrality based on random walks. Soc. Netw. 2005, 27, 39–54. [Google Scholar] [CrossRef]
  33. Newman, M.E. The mathematics of networks. In The New Palgrave Dictionary of Economics; Palgrave Macmillan: London, UK, 2008; Volume 2, pp. 1–12. [Google Scholar] [CrossRef]
  34. Freeman, L.C. Centrality in social networks conceptual clarification. Soc. Netw. 1978, 1, 215–239. [Google Scholar] [CrossRef]
  35. Cetinay, H.; Kuipers, F.A.; Van Mieghem, P. A topological investigation of power flow. IEEE Syst. J. 2016, 12, 2524–2532. [Google Scholar] [CrossRef]
  36. Ellens, W.; Spieksma, F.; Van Mieghem, P.; Jamakovic, A.; Kooij, R. Effective graph resistance. Linear Algebra Its Appl. 2011, 435, 2491–2506. [Google Scholar] [CrossRef]
Figure 1. Illustration of the attack process and the recovery process in a power grid: one realization with a threshold equal to 0.8.
Figure 1. Illustration of the attack process and the recovery process in a power grid: one realization with a threshold equal to 0.8.
Entropy 25 01455 g001
Figure 2. The flowcharts of the attack process and the recovery process: (a) the attack process; (b) the recovery process.
Figure 2. The flowcharts of the attack process and the recovery process: (a) the attack process; (b) the recovery process.
Entropy 25 01455 g002
Figure 3. The flow chart of recovery strategies based on topological network metrics.
Figure 3. The flow chart of recovery strategies based on topological network metrics.
Entropy 25 01455 g003
Figure 4. The flowcharts of the greedy and two-step greedy strategies: (a) greedy recovery strategy; (b) two-step greedy recovery strategy.
Figure 4. The flowcharts of the greedy and two-step greedy strategies: (a) greedy recovery strategy; (b) two-step greedy recovery strategy.
Entropy 25 01455 g004
Figure 5. An example of R values during one random attack realization and of different recovery processes, with a threshold equal to 0.5 and a tolerance level equal to 2, for the IEEE 39 bus system. The results of the random recovery strategy are the average values of 100 realizations.
Figure 5. An example of R values during one random attack realization and of different recovery processes, with a threshold equal to 0.5 and a tolerance level equal to 2, for the IEEE 39 bus system. The results of the random recovery strategy are the average values of 100 realizations.
Entropy 25 01455 g005
Figure 6. Three power grids. The red nodes represent loads and the blue nodes represent generators: (a) IEEE 30; (b) IEEE 39; (c) IEEE 118.
Figure 6. Three power grids. The red nodes represent loads and the blue nodes represent generators: (a) IEEE 30; (b) IEEE 39; (c) IEEE 118.
Entropy 25 01455 g006
Figure 7. Bar graph of the different recovery strategies’ recoverability energy ratios, with thresholds equal to 0.8 and 0.5 for three bus systems with different tolerance levels. The number of realizations was 1000: (a) IEEE 30 threshold = 0.8; (b) IEEE 30 threshold = 0.5; (c) IEEE 39 threshold = 0.8; (d) IEEE 39 threshold = 0.5; (e) IEEE 118 threshold = 0.8; (f) IEEE 118 threshold = 0.5.
Figure 7. Bar graph of the different recovery strategies’ recoverability energy ratios, with thresholds equal to 0.8 and 0.5 for three bus systems with different tolerance levels. The number of realizations was 1000: (a) IEEE 30 threshold = 0.8; (b) IEEE 30 threshold = 0.5; (c) IEEE 39 threshold = 0.8; (d) IEEE 39 threshold = 0.5; (e) IEEE 118 threshold = 0.8; (f) IEEE 118 threshold = 0.5.
Entropy 25 01455 g007aEntropy 25 01455 g007b
Table 1. Properties of three power grids.
Table 1. Properties of three power grids.
NameNL d av
IEEE 3030412.73
IEEE 3939462.36
IEEE 1181181793.03
Table 2. The abbreviations of the strategies used in figures and tables in the paper.
Table 2. The abbreviations of the strategies used in figures and tables in the paper.
AbbreviationFull Name
TwoGreedyTwo-step greedy recovery strategy
GreedyGreedy recovery strategy
BetBetweenness recovery strategy
FlowBetFlow betweenness recovery strategy
EleWeiCloseElectrical weighted closeness recovery strategy
WeiEigenWeighted eigenvector recovery strategy
CloseCloseness recovery strategy
EleCloseElectrical closeness recovery strategy
RandRandom recovery strategy
DegreeDegree recovery strategy
ZetaZeta vector recovery strategy
WeiZetaWeighted zeta vector recovery strategy
DegreeDegree recovery strategy
EigenEigenvector recovery strategy
Table 3. The mean value and standard deviation values of the different recovery strategies for the IEEE 30 bus system, with the tolerance level α equal to 1, while we set the threshold values as 0.8 and 0.5.
Table 3. The mean value and standard deviation values of the different recovery strategies for the IEEE 30 bus system, with the tolerance level α equal to 1, while we set the threshold values as 0.8 and 0.5.
RankThreshold = 0.8Threshold = 0.5
StrategyMeanStdStrategyMeanStd
1TwoGreedy1.02920.0241TwoGreedy1.17100.0656
2Greedy1.02850.0240Greedy1.15950.0654
3Eigen0.98770.0400Zeta0.98540.0679
4EleWeiClose0.98520.0420Eigen0.98370.0714
5Close0.98230.0427WeiZeta0.97960.0676
6Rand0.98080.0265Rand0.97330.0526
7EleClose0.98070.0429EleWeiClose0.96870.0762
8Degree0.98040.0423Close0.96290.0722
9Zeta0.98030.0358EleClose0.95760.0713
10WeiEigen0.97720.0440Degree0.95710.0727
11WeiZeta0.97720.0354WeiEigen0.95090.0761
12Bet0.97650.0404Bet0.94420.0667
13FlowBet0.97090.0447FlowBet0.91260.0693
Table 4. The mean value and standard deviation values of the different recovery strategies’ recoverability energy ratios for the IEEE 39 bus system, with the tolerance level α equal to 1, while we set the threshold values as 0.8 and 0.5.
Table 4. The mean value and standard deviation values of the different recovery strategies’ recoverability energy ratios for the IEEE 39 bus system, with the tolerance level α equal to 1, while we set the threshold values as 0.8 and 0.5.
RankThreshold = 0.8Threshold = 0.5
StrategyMeanStdStrategyMeanStd
1TwoGreedy1.02990.0221TwoGreedy1.16650.0605
2Greedy1.02920.0219Greedy1.15430.0585
3Zeta1.00650.0240Zeta1.07090.0571
4WeiZeta1.00000.0260WeiZeta1.05820.0594
5Rand0.98580.0217Rand0.97410.0474
6WeiEigen0.98000.0347WeiEigen0.94300.0618
7Bet0.97940.0333Bet0.93840.0673
8EleWeiClose0.97300.0347EleWeiClose0.89450.0625
9Eigen0.97030.0351Eigen0.88710.0653
10Degree0.97010.0363Degree0.88480.0706
11FlowBet0.96970.0331FlowBet0.88270.0618
12Close0.96750.0358Close0.88090.0629
13EleClose0.96460.0348EleClose0.86390.0621
Table 5. The mean value and standard deviation values of the different recovery strategies’ recoverability energy ratios for the IEEE 118 bus system, with the tolerance level α equal to 1, while we set the threshold values as 0.8 and 0.5.
Table 5. The mean value and standard deviation values of the different recovery strategies’ recoverability energy ratios for the IEEE 118 bus system, with the tolerance level α equal to 1, while we set the threshold values as 0.8 and 0.5.
RankThreshold = 0.8Threshold = 0.5
StrategyMeanStdStrategyMeanStd
1TwoGreedy1.04580.0270TwoGreedy1.26110.0715
2Greedy1.04410.0266Greedy1.22940.0717
3Bet0.99590.0409Bet1.08550.0683
4FlowBet0.98240.0685WeiEigen1.02250.0782
5EleWeiClose0.97590.0639EleWeiClose1.02060.0732
6WeiEigen0.97260.0648Close1.00510.0734
7Zeta0.97050.0388FlowBet0.99890.0988
8Close0.97030.0677Zeta0.99610.0735
9Rand0.96660.0400Eigen0.99090.0701
10EleClose0.96490.0799Rand0.98190.0545
11WeiZeta0.96110.0435Degree0.96460.0846
12Degree0.95990.0774WeiZeta0.96240.0715
13Eigen0.95230.0731EleClose0.95890.0855
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, F.; Cetinay, H.; He, Z.; Liu, L.; Van Mieghem, P.; Kooij, R.E. Recovering Power Grids Using Strategies Based on Network Metrics and Greedy Algorithms. Entropy 2023, 25, 1455. https://doi.org/10.3390/e25101455

AMA Style

Wang F, Cetinay H, He Z, Liu L, Van Mieghem P, Kooij RE. Recovering Power Grids Using Strategies Based on Network Metrics and Greedy Algorithms. Entropy. 2023; 25(10):1455. https://doi.org/10.3390/e25101455

Chicago/Turabian Style

Wang, Fenghua, Hale Cetinay, Zhidong He, Le Liu, Piet Van Mieghem, and Robert E. Kooij. 2023. "Recovering Power Grids Using Strategies Based on Network Metrics and Greedy Algorithms" Entropy 25, no. 10: 1455. https://doi.org/10.3390/e25101455

APA Style

Wang, F., Cetinay, H., He, Z., Liu, L., Van Mieghem, P., & Kooij, R. E. (2023). Recovering Power Grids Using Strategies Based on Network Metrics and Greedy Algorithms. Entropy, 25(10), 1455. https://doi.org/10.3390/e25101455

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop