Power grid vulnerability analysis
|
|
- Jessie Lamb
- 5 years ago
- Views:
Transcription
1 Power grid vulnerability analysis Daniel Bienstock Columbia University Dimacs 2010 Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
2 Background: a power grid is three systems GENERATION TRANSMISSION DISTRIBUTION Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
3 Challenges to analysis Power grids follow the laws of physics, characterized by nonlinear, nonconvex equations that make fast computation difficult. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
4 Challenges to analysis Power grids follow the laws of physics, characterized by nonlinear, nonconvex equations that make fast computation difficult. Furthermore, direct control is difficult: we cannot dictate how power will flow. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
5 Challenges to analysis Power grids follow the laws of physics, characterized by nonlinear, nonconvex equations that make fast computation difficult. Furthermore, direct control is difficult: we cannot dictate how power will flow. Power grids are subject to noise which is difficult to model accurately. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
6 Challenges to analysis Power grids follow the laws of physics, characterized by nonlinear, nonconvex equations that make fast computation difficult. Furthermore, direct control is difficult: we cannot dictate how power will flow. Power grids are subject to noise which is difficult to model accurately. Power grids can exhibit non-monotone behavior as a result of control or adversarial actions. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
7 Challenges to analysis Power grids follow the laws of physics, characterized by nonlinear, nonconvex equations that make fast computation difficult. Furthermore, direct control is difficult: we cannot dictate how power will flow. Power grids are subject to noise which is difficult to model accurately. Power grids can exhibit non-monotone behavior as a result of control or adversarial actions. Power grids can cascade. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
8 AC power flows polar coordinates Voltage at a node ( bus ) k is of the form U k e jθ k, where j = 1 Power flowing on edge ( line ) {k, m} equals p km + jq km, where p km = U 2 k g km U k U m g km cos θ km U k U m b km sin θ km q km = U 2 k (b km + b sh km ) + U k U m b km cos θ km U k U m g km sin θ km. Here, θ km = θk θ m g km, b km, bkm sh are known parameters (series conductance, series reactance, shunt susceptance) Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
9 Voltage at k = U k e jθ k ; power on line {k, m} = p km + jq km, where p km = U 2 k g km U k U m g km cos θ km U k U m b km sin θ km q km = U 2 k (b km + b sh km ) + U k U m b km cos θ km U k U m g km sin θ km ( θ km. = θk θ m ) P k = Σ {k,m} p km (active power), Q k = Σ {k,m} q km (reactive power) Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
10 Voltage at k = U k e jθ k ; power on line {k, m} = p km + jq km, where p km = U 2 k g km U k U m g km cos θ km U k U m b km sin θ km q km = U 2 k (b km + b sh km ) + U k U m b km cos θ km U k U m g km sin θ km ( θ km. = θk θ m ) P k = Σ {k,m} p km (active power), Q k = Σ {k,m} q km (reactive power) Power flow problem: Choose the vectors p, q, θ, P, Q so as to satisfy all equations above, and Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
11 Voltage at k = U k e jθ k ; power on line {k, m} = p km + jq km, where p km = U 2 k g km U k U m g km cos θ km U k U m b km sin θ km q km = U 2 k (b km + b sh km ) + U k U m b km cos θ km U k U m g km sin θ km ( θ km. = θk θ m ) P k = Σ {k,m} p km (active power), Q k = Σ {k,m} q km (reactive power) Power flow problem: Choose the vectors p, q, θ, P, Q so as to satisfy all equations above, and meet demand requirements and generator constraints Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
12 Voltage at k = U k e jθ k ; power on line {k, m} = p km + jq km, where p km = U 2 k g km U k U m g km cos θ km U k U m b km sin θ km q km = U 2 k (b km + b sh km ) + U k U m b km cos θ km U k U m g km sin θ km ( θ km. = θk θ m ) P k = Σ {k,m} p km (active power), Q k = Σ {k,m} q km (reactive power) Power flow problem: Choose the vectors p, q, θ, P, Q so as to satisfy all equations above, and meet demand requirements and generator constraints and, ideally, meet thermal constraints (flow limits) on the power lines Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
13 Research challenges Do we have fast and reliable algorithm for the power flow problem? Should not require human input in order to terminate. When no acceptable solution exists, should produce a certificate that this is the case. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
14 Research challenges Do we have fast and reliable algorithm for the power flow problem? Should not require human input in order to terminate. When no acceptable solution exists, should produce a certificate that this is the case. What about the cases where multiple solutions exist? Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
15 Research challenges Do we have fast and reliable algorithm for the power flow problem? Should not require human input in order to terminate. When no acceptable solution exists, should produce a certificate that this is the case. What about the cases where multiple solutions exist? After a contingency has take place, or a control has been applied: which solution should be instantiated? Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
16 Research challenges Do we have fast and reliable algorithm for the power flow problem? Should not require human input in order to terminate. When no acceptable solution exists, should produce a certificate that this is the case. What about the cases where multiple solutions exist? After a contingency has take place, or a control has been applied: which solution should be instantiated? What if all solutions are bad? Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
17 Solution methodologies Newton-Raphson (iterative) algorithms to solve system of equations Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
18 Solution methodologies Newton-Raphson (iterative) algorithms to solve system of equations The claim: this always works fast. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
19 Solution methodologies Newton-Raphson (iterative) algorithms to solve system of equations The claim: this always works fast. normal system. At least in the case of a Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
20 Solution methodologies Newton-Raphson (iterative) algorithms to solve system of equations The claim: this always works fast. normal system. At least in the case of a New result: Low et al (2010). Some (many?) optimal power flow problems can be solved using semidefinite programming. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
21 Linearized ( DC ) model: sin(θ i θ j ) (θ i θ j ) for θ i θ j A power flow is a solution f, θ to: ij f ij ij f ji = b i, for all i, where b i > 0 for each generator i, b i < 0 for demand node i, Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
22 Linearized ( DC ) model: sin(θ i θ j ) (θ i θ j ) for θ i θ j A power flow is a solution f, θ to: ij f ij ij f ji = b i, for all i, where b i > 0 for each generator i, b i < 0 for demand node i, x ij f ij θ i + θ j = 0 for all (i, j). ( x ij = reactance ) Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
23 Linearized ( DC ) model: sin(θ i θ j ) (θ i θ j ) for θ i θ j A power flow is a solution f, θ to: ij f ij ij f ji = b i, for all i, where b i > 0 for each generator i, b i < 0 for demand node i, x ij f ij θ i + θ j = 0 for all (i, j). ( x ij = reactance ) Lemma: Given a choice for b with i b i = 0 (a requirement), Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
24 Linearized ( DC ) model: sin(θ i θ j ) (θ i θ j ) for θ i θ j A power flow is a solution f, θ to: ij f ij ij f ji = b i, for all i, where b i > 0 for each generator i, b i < 0 for demand node i, x ij f ij θ i + θ j = 0 for all (i, j). ( x ij = reactance ) Lemma: Given a choice for b with i b i = 0 (a requirement), the system has a unique (in f) solution. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
25 A quote from: Final Report on the August 14, 2003 Blackout in the United States and Canada: Causes and Recommendations, U.S.-Canada Power System Outage Task Force, April 5, ( Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
26 A quote from: Final Report on the August 14, 2003 Blackout in the United States and Canada: Causes and Recommendations, U.S.-Canada Power System Outage Task Force, April 5, ( Cause 1 was inadequate system understanding Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
27 A quote from: Final Report on the August 14, 2003 Blackout in the United States and Canada: Causes and Recommendations, U.S.-Canada Power System Outage Task Force, April 5, ( Cause 1 was inadequate system understanding stated 20 times Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
28 A quote from: Final Report on the August 14, 2003 Blackout in the United States and Canada: Causes and Recommendations, U.S.-Canada Power System Outage Task Force, April 5, ( Cause 1 was inadequate system understanding stated 20 times Cause 2 was inadequate situational awareness stated 14 times Cause 3 was inadequate tree trimming stated 4 times Cause 4 was inadequate RC diagnostic support stated 5 times Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
29 Cascades Load (demand) Generator Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
30 Cascades Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
31 Cascades Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
32 Cascades Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
33 Cascades Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
34 Cascades = lost demand Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
35 Cascades Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
36 Cascades Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
37 Formal cascade model (Dobson et al) Initial fault event takes place (an act of God ). Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
38 Formal cascade model (Dobson et al) Initial fault event takes place (an act of God ). For r = 1, 2,..., 1. Reconfigure demands and generator output levels. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
39 Islanding supply > demand Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
40 Formal cascade model (Dobson et al) Initial fault event takes place (an act of God ). For r = 1, 2,..., 1. Reconfigure demands and generator output levels. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
41 Formal cascade model (Dobson et al) Initial fault event takes place (an act of God ). For r = 1, 2,..., 1. Reconfigure demands and generator output levels. 2. New power flows are instantiated. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
42 Formal cascade model (Dobson et al) Initial fault event takes place (an act of God ). For r = 1, 2,..., 1. Reconfigure demands and generator output levels. 2. New power flows are instantiated. 3. The next set of faults takes place. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
43 Formal cascade model (Dobson et al) Initial fault event takes place (an act of God ). For r = 1, 2,..., 1. Reconfigure demands and generator output levels. 2. New power flows are instantiated. 3. The next set of faults takes place. (Stochastic or history-dependent criterion) Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
44 Outage mechanism f e = flow on line e u e = flow limit (threshold) on e Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
45 Outage mechanism f e = flow on line e u e = flow limit (threshold) on e Prob( e fails) = F ( f e /u e ), where F (x) 1 as x +. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
46 Outage mechanism f e = flow on line e u e = flow limit (threshold) on e Prob( e fails) = F ( f e /u e ), where F (x) 1 as x +. Set f r e = α e fe r + (1 α e) f e r 1, where 0 α e 1 is given. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
47 Outage mechanism f e = flow on line e u e = flow limit (threshold) on e Prob( e fails) = F ( f e /u e ), where F (x) 1 as x +. Set f r e = α e fe r + (1 α e) f e r 1, where 0 α e 1 is given. f r e = running average of f e. r = round (time). Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
48 Outage mechanism f e = flow on line e u e = flow limit (threshold) on e Prob( e fails) = F ( f e /u e ), where F (x) 1 as x +. Set f r e = α e fe r + (1 α e) f e r 1, where 0 α e 1 is given. f r e = running average of f e. r = round (time). e fails if f e > u e. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
49 Outage mechanism f e = flow on line e u e = flow limit (threshold) on e Prob( e fails) = F ( f e /u e ), where F (x) 1 as x +. Set f r e = α e fe r + (1 α e) f e r 1, where 0 α e 1 is given. f r e = running average of f e. r = round (time). e fails if f e > u e. or: e fails if f e u e Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
50 Outage mechanism f e = flow on line e u e = flow limit (threshold) on e Prob( e fails) = F ( f e /u e ), where F (x) 1 as x +. Set f r e = α e fe r + (1 α e) fe r 1, where 0 α e 1 is given. f r e = two-round average of f e. r = round (time). e fails if f e > u e, Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
51 Outage mechanism f e = flow on line e u e = flow limit (threshold) on e Prob( e fails) = F ( f e /u e ), where F (x) 1 as x +. Set f r e = α e fe r + (1 α e) fe r 1, where 0 α e 1 is given. f r e = two-round average of f e. r = round (time). e fails if f e > u e, (or, e fails if f e u e ) Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
52 Stochastic faults e fails if u e < f r e, Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
53 Stochastic faults e fails if u e < f r e, e does not fail if (1 γ)u e > f e r, (γ = tolerance) Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
54 Stochastic faults e fails if u e < f r e, e does not fail if (1 γ)u e > f e r, (γ = tolerance) if (1 γ)u e f r e u e then e fails with probability 1/2 Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
55 Formal cascade model (Dobson et al) Initial outage event takes place (an act of God ). For r = 1, 2,..., 1. Reconfigure demands and generator output levels. 2. New power flows are instantiated. 3. The next set of outages takes place. (Stochastic or history-dependent criterion) Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
56 Formal cascade model (Dobson et al) Initial outage event takes place (an act of God ). For r = 1, 2,..., 1. Reconfigure demands and generator output levels. 2. New power flows are instantiated. 3. The next set of outages takes place. (Stochastic or history-dependent criterion) If no more faults occur or too much demand has been lost, STOP Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
57 Online control Initial outage event takes place. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
58 Online control Initial outage event takes place. Compute control algorithm. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
59 Online control Initial outage event takes place. Compute control algorithm. For r = 1, 2,..., R 1 1. Reconfigure demands and generator output levels. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
60 Online control Initial outage event takes place. Compute control algorithm. For r = 1, 2,..., R 1 1. Reconfigure demands and generator output levels. 2. New power flows are instantiated. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
61 Online control Initial outage event takes place. Compute control algorithm. For r = 1, 2,..., R 1 1. Reconfigure demands and generator output levels. 2. New power flows are instantiated. 3a. Take measurements and apply control to shed demand. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
62 Online control Initial outage event takes place. Compute control algorithm. For r = 1, 2,..., R 1 1. Reconfigure demands and generator output levels. 2. New power flows are instantiated. 3a. Take measurements and apply control to shed demand. 3b. Reconfigure generator outputs; Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
63 Online control Initial outage event takes place. Compute control algorithm. For r = 1, 2,..., R 1 1. Reconfigure demands and generator output levels. 2. New power flows are instantiated. 3a. Take measurements and apply control to shed demand. 3b. Reconfigure generator outputs; get new power flows. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
64 Online control Initial outage event takes place. Compute control algorithm. For r = 1, 2,..., R 1 1. Reconfigure demands and generator output levels. 2. New power flows are instantiated. 3a. Take measurements and apply control to shed demand. 3b. Reconfigure generator outputs; get new power flows. 4. The next set of outages takes place. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
65 Online control Initial outage event takes place. Compute control algorithm. For r = 1, 2,..., R 1 1. Reconfigure demands and generator output levels. 2. New power flows are instantiated. 3a. Take measurements and apply control to shed demand. 3b. Reconfigure generator outputs; get new power flows. 4. The next set of outages takes place. At round R, reduce demands so as to remove any line overloads. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
66 Deterministic, no history model Optimal control via integer programming formulation Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
67 Deterministic, no history model Optimal control via integer programming formulation? Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
68 Deterministic, no history model Optimal control via integer programming formulation? f r j y r j d r j = flow on arc j at round r = 1, if arc j fails in round r, 0 otherwise = demand at node i in round r and many other variables Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
69 Subject to: max X d R i i D 8 X f r j X f r < j = j δ + (i) j δ : (i) si r i G di r i D 0 otherwise 1 r R (1) f r j = π r j ν r j j A and 1 r R (2) π r j Dp r j, νr j Dn r j, j A and 1 r R (3) p r j + n r j r 1 X = 1 y h j, j A and 1 r R (4) h=1 π r j + ν r j u j π r j + ν r j Dy r j j A and 1 r R (5) u j y r j j A and 1 r R 1 (6) π R j + ν R j u j j A (7) φ r i φ r j x j f r r 1 X j M j y h j j A (8) h=1 0 s r i s i i G, 0 d r i d i i D, (9) p r j, nr ij, yr j = 0 or 1, j A and 1 r R (10) 0 π r j, 0 νr j, j A and 1 r R. (11) Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
70 What s bad about the formulation probably can t solve it for medium to large networks stochastic variant probably needed, harder Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
71 What s bad about the formulation probably can t solve it for medium to large networks stochastic variant probably needed, harder optimal solutions = complex policies Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
72 Adaptive affine controls For each demand v, and round r, control cv r, br v, sr v computed to be Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
73 Adaptive affine controls For each demand v, and round r, control cv r, br v, sr v computed to be Parameterized by integer r > 0. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
74 Adaptive affine controls For each demand v, and round r, control cv r, br v, sr v computed to be Parameterized by integer r > 0. At round r, Let κ = maximum overload of any line within radius r of v Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
75 Adaptive affine controls For each demand v, and round r, control cv r, br v, sr v computed to be Parameterized by integer r > 0. At round r, Let κ = maximum overload of any line within radius r of v If κ > cv r, demand at v reduced (scaled) by a factor max { 1, s r v (cr v κ) + br v}. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
76 Adaptive affine controls For each demand v, and round r, control cv r, br v, sr v computed to be Parameterized by integer r > 0. At round r, Let κ = maximum overload of any line within radius r of v If κ > cv r, demand at v reduced (scaled) by a factor max { 1, s r v (cr v κ) + br v}. The goal: pick control to maximize demand being served at the end of round R. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
77 For each demand v, and round r, control c r v, br v, sr v At round r, if κ > cv r, demand at v reduced (scaled) by a factor min { 1, [ s r v (cr v κ) + br v ]+ }. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
78 For each demand v, and round r, control c r v, br v, sr v At round r, if κ > cv r, demand at v reduced (scaled) by a factor min { 1, [ s r v (cr v κ) + br v ]+ }. This talk: r = n (number of nodes) Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
79 For each demand v, and round r, control c r v, br v, sr v At round r, if κ > cv r, demand at v reduced (scaled) by a factor min { 1, [ s r v (cr v κ) + br v ]+ }. This talk: r = n (number of nodes) Special case: (optimal scaling problem) Insist that for each r, (c r v, br v, sr v ) = (cr, b r, s r ) for every v Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
80 For each demand v, and round r, control c r v, br v, sr v At round r, if κ > cv r, demand at v reduced (scaled) by a factor min { 1, [ s r v (cr v κ) + br v ]+ }. This talk: r = n (number of nodes) Special case: (optimal scaling problem) Insist that for each r, (c r v, br v, sr v ) = (cr, b r, s r ) for every v Then, equivalent problem: In round r, let α r (K ) 1 be chosen for each component of the network in round r If node v component K, then its demand is scaled by α r (K ) Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
81 Notation: ˆβ = supply/demand vector at time 0 ˆf = corresponding power flows at time 0 Θ R (t, β) : R + R + = total demand, at the end of round R, using optimal control, if the supply/demand vector is t β Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
82 Notation: ˆβ = supply/demand vector at time 0 ˆf = corresponding power flows at time 0 Θ R (t, β) : R + R + = total demand, at the end of round R, using optimal control, if the supply/demand vector is t β Note: supply/demand = tβ means flow = t ˆf Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
83 Notation: ˆβ = supply/demand vector at time 0 ˆf = corresponding power flows at time 0 Θ R (t, β) : R + R + = total demand, at the end of round R, using optimal control, if the supply/demand vector is t β Note: supply/demand = tβ means flow = t ˆf Theorem: Θ R (t, ˆβ) is nondecreasing piecewise-linear with at most m R /R! + O(m R 1 ) breakpoints. m = no. of arcs Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
84 Notation: ˆβ = supply/demand vector at time 0 ˆf = corresponding power flows at time 0 Θ R (t, β) : R + R + = total demand, at the end of round R, using optimal control, if the supply/demand vector is t β Note: supply/demand = tβ means flow = t ˆf Theorem: Θ R (t, ˆβ) is nondecreasing piecewise-linear with at most m R /R! + O(m R 1 ) breakpoints. m = no. of arcs In round 1, the optimal scale is equal to u j /(t ˆf j ) for some arc j. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
85 Notation: ˆβ = supply/demand vector at time 0 ˆf = corresponding power flows at time 0 Θ R (t, β) : R + R + = total demand, at the end of round R, using optimal control, if the supply/demand vector is t β Note: supply/demand = tβ means flow = t ˆf Theorem: Θ R (t, ˆβ) is nondecreasing piecewise-linear with at most m R /R! + O(m R 1 ) breakpoints. m = no. of arcs In round 1, the optimal scale is equal to u j /(t ˆf j ) for some arc j. So arc j will become critical Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
86 Notation: ˆβ = supply/demand vector at time 0 ˆf = corresponding power flows at time 0 Θ R (t, β) : R + R + = total demand, at the end of round R, using optimal control, if the supply/demand vector is t β Note: supply/demand = tβ means flow = t ˆf Theorem: Θ R (t, ˆβ) is nondecreasing piecewise-linear with at most m R /R! + O(m R 1 ) breakpoints. m = no. of arcs In round 1, the optimal scale is equal to u j /(t ˆf j ) for some arc j. So arc j will become critical And recursively... Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
87 Notation: ˆβ = supply/demand vector at time 0 ˆf = corresponding power flows at time 0 Θ R (t, β) : R + R + = total demand, at the end of round R, using optimal control, if the supply/demand vector is t β Note: supply/demand = tβ means flow = t ˆf Theorem: Θ R (t, ˆβ) is nondecreasing piecewise-linear with at most m R /R! + O(m R 1 ) breakpoints. m = no. of arcs In round 1, the optimal scale is equal to u j /(t ˆf j ) for some arc j. So arc j will become critical And recursively... Robust/stochastic version? Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
88 General case: simulation-based optimization Given a control vector ũ = (cv r, br v, sr v ) (over all v and r), Θ(ũ) = throughput (total demand) satisfied at end of cascade Maximization of Θ(ũ) should be (very?) fast Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
89 General case: simulation-based optimization Given a control vector ũ = (cv r, br v, sr v ) (over all v and r), Θ(ũ) = throughput (total demand) satisfied at end of cascade Maximization of Θ(ũ) should be (very?) fast Optimization should be robust (noisy process) Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
90 General case: simulation-based optimization Given a control vector ũ = (cv r, br v, sr v ) (over all v and r), Θ(ũ) = throughput (total demand) satisfied at end of cascade Maximization of Θ(ũ) should be (very?) fast Optimization should be robust (noisy process) From a strict perspective, Θ(ũ) is not even continuous Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
91 General case: simulation-based optimization Given a control vector ũ = (cv r, br v, sr v ) (over all v and r), Θ(ũ) = throughput (total demand) satisfied at end of cascade Maximization of Θ(ũ) should be (very?) fast Optimization should be robust (noisy process) From a strict perspective, Θ(ũ) is not even continuous Θ(ũ) is obtained through a simulation Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
92 Derivative-free optimization Conn, Scheinberg, Vicente, others Rough description: Sample a number of control vectors ũ Use the sample points to construct a convex approximation to Θ Optimize this approximation; this yields a new sample point Scalability to large dimensionality? Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
93 First order method Given a control vector ũ 1 Estimate the gradient g = Θ(ũ) through finite differences. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
94 First order method Given a control vector ũ 1 Estimate the gradient g = Θ(ũ) through finite differences. Requires O(1) simulations per demand node. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
95 First order method Given a control vector ũ 1 Estimate the gradient g = Θ(ũ) through finite differences. Requires O(1) simulations per demand node. 2 Estimate step size argmax Θ(ũ + σg) Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
96 First order method Given a control vector ũ 1 Estimate the gradient g = Θ(ũ) through finite differences. Requires O(1) simulations per demand node. 2 Estimate step size argmax Θ(ũ + σg) Easily parallelizable Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
97 Line searches 0.91 ls ls ls Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
98 Current parallel implementation: boss-nerd Boss carries out search algorithm Nerds simulate cascades with given control Communication using Unix sockets Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
99 Scaling Example: nodes, lines 5 gradient steps 8-core i7 CPUs (3 machines total) cores wall-clock sec Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
100 Initial experiments with Eastern Interconnect nodes, lines generator nodes, 6261 demand nodes Equivalent DC flow version Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
101 Initial experiments with Eastern Interconnect nodes, lines generator nodes, 6261 demand nodes Equivalent DC flow version Methodology for experiments 1 Generate an interdiction of the grid ( initial event ) 2 Compute control and simulate Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
102 Initial experiments with Eastern Interconnect nodes, lines generator nodes, 6261 demand nodes Equivalent DC flow version Methodology for experiments 1 Generate an interdiction of the grid ( initial event ) 2 Compute control and simulate 3 At least three rounds of cascade after initial event Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
103 Computing a control (1) Solve scaling problem let (c, b, s ) be optimal Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
104 Computing a control (1) Solve scaling problem let (c, b, s ) be optimal (2) Partition demand nodes into small number of segments Σ 1,..., Σ k. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
105 Computing a control (1) Solve scaling problem let (c, b, s ) be optimal (2) Partition demand nodes into small number of segments Σ 1,..., Σ k. Example = demand quantiles. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
106 Computing a control (1) Solve scaling problem let (c, b, s ) be optimal (2) Partition demand nodes into small number of segments Σ 1,..., Σ k. Example = demand quantiles. Perform segmented gradient search starting from (c, b, s ). Look for a control with (cv r, br v, sr v ) = constant for each given r and all v in a common Σ i. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
107 Computing a control (1) Solve scaling problem let (c, b, s ) be optimal (2) Partition demand nodes into small number of segments Σ 1,..., Σ k. Example = demand quantiles. Perform segmented gradient search starting from (c, b, s ). Look for a control with (cv r, br v, sr v ) = constant for each given r and all v in a common Σ i. (3) Perform full gradient search starting from the output in (2). Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
108 Experiments K random lines taken out highly loaded lines more likely to be taken out; connectivity preserved Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
109 Experiments K random lines taken out highly loaded lines more likely to be taken out; connectivity preserved K yield, (%) yield, wallclock no control control (sec) Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
110 Conjectures It is best to stop the cascade in the first round It is best to apply control in the first round only, and ride out the cascade Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
111 Conjectures It is best to stop the cascade in the first round It is best to apply control in the first round only, and ride out the cascade (Answer: both wrong) Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
112 Details: cascade with 50 (highly loaded) random lines taken out No control yield = 0% Optimal round 1 only constant control yield = 38% Optimal scaling control yield = 45% Plus segmented gradient seach yield = 50% Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
113 Load distribution at time zero (load of arc j = f j u j ) load no. of arcs Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
114 Load distribution at time zero (load of arc j = f j u j ) Optimal round 1 scale = 0.51, load no. of arcs Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
115 Load distribution at time zero (load of arc j = f j u j ) load no. of arcs Optimal round 1 scale = 0.51, so 44 faults Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
116 Out-of-sample testing: use stochastic faults at round r, e fails if u e < f r e, e does not fail if (1 γ)u e > f e r, (γ = tolerance) if (1 γ)u e f r e u e then e fails with probability 1/2 Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
117 Out-of-sample testing: use stochastic faults at round r, e fails if u e < f r e, e does not fail if (1 γ)u e > f e r, (γ = tolerance) if (1 γ)u e f r e u e then e fails with probability 1/2 What is the impact of γ? Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
118 γ = 0.03, 0.10, 0.20, runs percent 10 percent 20 percent COUNT YIELD Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs
Sample average approximation and cascading failures of power grids. Daniel Bienstock, Guy Grebla, Tingjun Chen, Columbia University GraphEx 15
Sample average approximation and cascading failures of power grids Daniel Bienstock, Guy Grebla, Tingjun Chen, Columbia University GraphEx 15 August 14 2003 Approximately 50 million people affected Other
More informationOptimal adaptive control of cascading power grid failures 1. Version 2010-Dec-20. Daniel Bienstock Columbia University New York
Optimal adaptive control of cascading power grid failures 1 1 Introduction Version 2010-Dec-20 Daniel Bienstock Columbia University New York Power grids have long been a source of interesting optimization
More informationPower Grid Vulnerability to Geographically Correlated Failures - Analysis and Control Implications
Power Grid Vulnerability to Geographically Correlated Failures - Analysis and Control Implications Andrey Bernstein 1, Daniel Bienstock 2, David Hay 3, Meric Uzunoglu 4, Gil Zussman 5 1 Computer and Communication
More information1 Unified Power Flow Controller (UPFC)
Power flow control with UPFC Rusejla Sadikovic Internal report 1 Unified Power Flow Controller (UPFC) The UPFC can provide simultaneous control of all basic power system parameters ( transmission voltage,
More informationPower Grid Security Analysis : An Optimization Approach
Power Grid Security Analysis : An Optimization Approach by Abhinav Verma Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences
More informationCascading Failures in Power Grids - Analysis and Algorithms
Cascading Failures in Power Grids - Analysis and Algorithms Saleh Soltan 1, Dorian Mazaruic 2, Gil Zussman 1 1 Electrical Engineering, Columbia University 2 INRIA Sophia Antipolis Cascading Failures in
More informationBlackouts in electric power transmission systems
University of Sunderland From the SelectedWorks of John P. Karamitsos 27 Blackouts in electric power transmission systems Ioannis Karamitsos Konstadinos Orfanidis Available at: https://works.bepress.com/john_karamitsos/9/
More informationUsing mixed-integer programming to solve power grid blackout problems
Using mixed-integer programming to solve power grid blackout problems Daniel Bienstock 1 Dept. of IEOR Columbia University New York, NY 10027 Sara Mattia DIS Università La Sapienza Roma October 2005, revised
More informationPower Grid Vulnerability to Geographically Correlated Failures
Columbia University, Electrical Engineering Technical Report #20-05-06, Nov. 20 Power Grid Vulnerability to Geographically Correlated Failures Andrey Bernstein, Daniel Bienstock, David Hay, Meric Uzunoglu,
More informationCascading Outages in Power Systems. Rui Yao
Cascading Outages in Power Systems Rui Yao yaorui.thu@gmail.com Outline Understanding cascading outages Characteristics of cascading outages Mitigation of cascading outages Understanding cascading outages
More informationPower System Security. S. Chakrabarti
Power System Security S. Chakrabarti Outline Introduction Major components of security assessment On-line security assessment Tools for contingency analysis DC power flow Linear sensitivity factors Line
More informationArchitectures and Algorithms for Distributed Generation Control of Inertia-Less AC Microgrids
Architectures and Algorithms for Distributed Generation Control of Inertia-Less AC Microgrids Alejandro D. Domínguez-García Coordinated Science Laboratory Department of Electrical and Computer Engineering
More informationThe N k Problem using AC Power Flows
The N k Problem using AC Power Flows Sean Harnett 5-19-2011 Outline Introduction AC power flow model The optimization problem Some results Goal: find a small set of lines whose removal will cause the power
More informationPower Grid State Estimation after a Cyber-Physical Attack under the AC Power Flow Model
Power Grid State Estimation after a Cyber-Physical Attack under the AC Power Flow Model Saleh Soltan, Gil Zussman Department of Electrical Engineering Columbia University, New York, NY Email: {saleh,gil}@ee.columbia.edu
More informationA POWER FLOW CONTROL STRATEGY FOR FACTS DEVICES
A POWER FLOW CONTROL STRATEGY FOR FACTS DEVICES RUSEJLA SADIKOVIC, ETH ZÜRICH, SWITZERLAND, sadikovic@eeh.ee.ethz.ch GÖRAN ANDERSSON, ETH ZÜRICH, SWITZERLAND, andersson@eeh.ee.ethz.ch PETR KORBA, ABB,
More informationDisconnecting Networks via Node Deletions
1 / 27 Disconnecting Networks via Node Deletions Exact Interdiction Models and Algorithms Siqian Shen 1 J. Cole Smith 2 R. Goli 2 1 IOE, University of Michigan 2 ISE, University of Florida 2012 INFORMS
More informationApplication of Monte Carlo Simulation to Multi-Area Reliability Calculations. The NARP Model
Application of Monte Carlo Simulation to Multi-Area Reliability Calculations The NARP Model Any power system reliability model using Monte Carlo simulation consists of at least the following steps: 1.
More informationAn MINLP approach to forming secure islands in electricity networks
An MINLP approach to forming secure islands in electricity networks Waqquas Bukhsh, Jacek Gondzio, Andreas Grothey, Ken McKinnon, Paul Trodden School of Mathematics University of Edinburgh GOR 2012, 4-7
More informationReliability of Bulk Power Systems (cont d)
Reliability of Bulk Power Systems (cont d) Important requirements of a reliable electric power service Voltage and frequency must be held within close tolerances Synchronous generators must be kept running
More informationIEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 29, NO. 4, JULY Stochastic Analysis of Cascading-Failure Dynamics in Power Grids
IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 29, NO. 4, JULY 2014 1767 Stochastic Analysis of Cascading-Failure Dynamics in Power Grids Mahshid Rahnamay-Naeini, Student Member, IEEE, Zhuoyao Wang, Nasir Ghani,
More informationPower Grid Vulnerability to Geographically Correlated Failures Analysis and Control Implications
Columbia University, Electrical Engineering Technical Report #20-05-06, Nov. 20 Power Grid Vulnerability to Geographically Correlated Failures Analysis and Control Implications arxiv:206.099v [cs.sy] 6
More informationProper Security Criteria Determination in a Power System with High Penetration of Renewable Resources
Proper Security Criteria Determination in a Power System with High Penetration of Renewable Resources Mojgan Hedayati, Kory Hedman, and Junshan Zhang School of Electrical, Computer, and Energy Engineering
More informationComputational Approaches for Optimal Load Shedding Control of DC Networks under Cascading Failure
This version: September 28, 2017 Computational Approaches for Optimal Load Shedding Control of DC Networks under Cascading Failure Qin Ba Ketan Savla Abstract We consider discrete-time dynamics, for cascading
More informationOptimization Methods for Power Grid Reliability
Optimization Methods for Power Grid Reliability Sean Harnett Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences COLUMBIA
More informationSTATE ESTIMATION IN DISTRIBUTION SYSTEMS
SAE ESIMAION IN DISRIBUION SYSEMS 2015 CIGRE Grid of the Future Symposium Chicago (IL), October 13, 2015 L. Garcia-Garcia, D. Apostolopoulou Laura.GarciaGarcia@ComEd.com Dimitra.Apostolopoulou@ComEd.com
More informationCHAPTER 5 STEADY-STATE ANALYSIS OF THREE-PHASE SELF-EXCITED INDUCTION GENERATORS
6 CHAPTER 5 STEADY-STATE ANALYSIS OF THREE-PHASE SELF-EXCITED INDUCTION GENERATORS 5.. INTRODUCTION The steady-state analysis of six-phase SEIG has been discussed in the previous chapters. In this chapter,
More informationMinimization of Energy Loss using Integrated Evolutionary Approaches
Minimization of Energy Loss using Integrated Evolutionary Approaches Attia A. El-Fergany, Member, IEEE, Mahdi El-Arini, Senior Member, IEEE Paper Number: 1569614661 Presentation's Outline Aim of this work,
More informationTopology-Driven Performance Analysis of Power Grids
Topology-Driven Performance Analysis of Power Grids Hale Çetinay, Yakup Koç, Fernando A. Kuipers, Piet Van Mieghem Abstract Direct connections between nodes usually result in efficient transmission in
More informationECE 422/522 Power System Operations & Planning/Power Systems Analysis II : 7 - Transient Stability
ECE 4/5 Power System Operations & Planning/Power Systems Analysis II : 7 - Transient Stability Spring 014 Instructor: Kai Sun 1 Transient Stability The ability of the power system to maintain synchronism
More informationCyber Attacks, Detection and Protection in Smart Grid State Estimation
1 Cyber Attacks, Detection and Protection in Smart Grid State Estimation Yi Zhou, Student Member, IEEE Zhixin Miao, Senior Member, IEEE Abstract This paper reviews the types of cyber attacks in state estimation
More informationAnalyzing and Quantifying the Effect of k-line Failures in Power Grids
TO APPEAR IN IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS 1 Analyzing and Quantifying the Effect of k-line Failures in Power Grids Saleh Soltan, Alexander Loh, Gil Zussman Department of Electrical Engineering
More informationGeographically Correlated Failures in Power Networks Survivability Analysis
Geographically Correlated Failures in Power Networks Survivability Analysis Andrey Bernstein, Daniel Bienstock, David Hay, Meric Uzunoglu, and Gil Zussman School of Computer and Communication Sciences,
More informationSoftware for Integer and Nonlinear Optimization
Software for Integer and Nonlinear Optimization Sven Leyffer, leyffer@mcs.anl.gov Mathematics & Computer Science Division Argonne National Laboratory Roger Fletcher & Jeff Linderoth Advanced Methods and
More informationRole of Synchronized Measurements In Operation of Smart Grids
Role of Synchronized Measurements In Operation of Smart Grids Ali Abur Electrical and Computer Engineering Department Northeastern University Boston, Massachusetts Boston University CISE Seminar November
More informationNew Formulations of the Optimal Power Flow Problem
New Formulations of the Optimal Power Flow Problem Prof. Daniel Kirschen The University of Manchester 2010 D. Kirschen and The University of Manchester 1 2010 D. Kirschen and The University of Manchester
More informationDynamic Voltage Stability Enhancement of a Microgrid with Static and Dynamic Loads Using Microgrid Voltage Stabilizer
Dynamic Voltage Stability Enhancement of a Microgrid with Static and Dynamic Loads Using Microgrid Voltage Stabilizer Kenan Hatipoglu 1, Ismail Fidan 2, Ghadir Radman 3 1 Electrical and Computer Engineering
More informationControlling variability in power systems
Daniel APAM Nov 17 2017 A simple example: 100 100 A simple example: 100 100 Only one solution: 200 100 200 100 100 100 A simple example: 100 100 Only one solution: 200 100 200 100 100 100 But what if the
More informationCascading Failures in Power Grids Analysis and Algorithms
Columbia University, Electrical Engineering Technical Report #14-1-, January 14 Cascading Failures in Power Grids Analysis and Algorithms Saleh Soltan Electrical Engineering Columbia University New York,
More informationECE 476. Exam #2. Tuesday, November 15, Minutes
Name: Answers ECE 476 Exam #2 Tuesday, November 15, 2016 75 Minutes Closed book, closed notes One new note sheet allowed, one old note sheet allowed 1. / 20 2. / 20 3. / 20 4. / 20 5. / 20 Total / 100
More informationAnalysis of Failures in Power Grids
TO APPEAR IN IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 15 1 Analysis of Failures in Power Grids Saleh Soltan, Student Member, IEEE, Dorian Mazauric, and Gil Zussman, Senior Member, IEEE Abstract
More informationModule 6 : Preventive, Emergency and Restorative Control. Lecture 27 : Normal and Alert State in a Power System. Objectives
Module 6 : Preventive, Emergency and Restorative Control Lecture 27 : Normal and Alert State in a Power System Objectives In this lecture you will learn the following Different states in a power system
More informationQuantifying Cyber Security for Networked Control Systems
Quantifying Cyber Security for Networked Control Systems Henrik Sandberg ACCESS Linnaeus Centre, KTH Royal Institute of Technology Joint work with: André Teixeira, György Dán, Karl H. Johansson (KTH) Kin
More informationDUE to their complexity and magnitude, modern infrastructure
ACCEPTED TO IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING 1 REACT to Cyber Attacks on Power Grids Saleh Soltan, Member, IEEE, Mihalis Yannakakis, and Gil Zussman, Senior Member, IEEE Abstract Motivated
More informationB.E. / B.Tech. Degree Examination, April / May 2010 Sixth Semester. Electrical and Electronics Engineering. EE 1352 Power System Analysis
B.E. / B.Tech. Degree Examination, April / May 2010 Sixth Semester Electrical and Electronics Engineering EE 1352 Power System Analysis (Regulation 2008) Time: Three hours Answer all questions Part A (10
More informationURTDSM Initiative in India and Controlled Islanding using PMU Measurements
URTDSM Initiative in India and Controlled Islanding using PMU Measurements Akhil Raj Gopal Gajjar Meenal Chougule Narayanan Rajagopal Prashant Navalkar Rajeev Gajbhiye S. A. Soman PowerAnser Labs, IIT
More informationRobustness Analysis of Power Grid under False Data Attacks Against AC State Estimation
Robustness Analysis of Power Grid under False Data Attacks Against AC State Estimation Presenter: Ming Jin INFORMS 2017 Ming Jin, Prof Javad Lavaei, and Prof Karl Johansson 1 Power system resilience against
More informationGeneralized Injection Shift Factors and Application to Estimation of Power Flow Transients
Generalized Injection Shift Factors and Application to Estimation of Power Flow Transients Yu Christine Chen, Alejandro D. Domínguez-García, and Peter W. Sauer Department of Electrical and Computer Engineering
More informationCHAPTER 2 CAPACITANCE REQUIREMENTS OF SIX-PHASE SELF-EXCITED INDUCTION GENERATORS
9 CHAPTER 2 CAPACITANCE REQUIREMENTS OF SIX-PHASE SELF-EXCITED INDUCTION GENERATORS 2.. INTRODUCTION Rapidly depleting rate of conventional energy sources, has led the scientists to explore the possibility
More informationOptimal Capacitor placement in Distribution Systems with Distributed Generators for Voltage Profile improvement by Particle Swarm Optimization
Optimal Capacitor placement in Distribution Systems with Distributed Generators for Voltage Profile improvement by Particle Swarm Optimization G. Balakrishna 1, Dr. Ch. Sai Babu 2 1 Associate Professor,
More informationSensitivity-Based Line Outage Angle Factors
Sensitivity-Based Line Outage Angle Factors Kai E. Van Horn, Alejandro D. Domínguez-García, and Peter W. Sauer Department of Electrical and Computer Engineering University of Illinois at Urbana-Champaign
More informationDaniel Bienstock and Abhinav Verma Columbia University New York. May 2008
The N k Problem in Power Grids: New Models, Formulations and Computation 1 Daniel Bienstock and Abhinav Verma Columbia University New York May 2008 Abstract Given a power grid modeled by a network together
More informationSINGLE OBJECTIVE RISK- BASED TRANSMISSION EXPANSION
Vol.2, Issue.1, Jan-Feb 2012 pp-424-430 ISSN: 2249-6645 SINGLE OBJECTIVE RISK- BASED TRANSMISSION EXPANSION V.Sumadeepthi 1, K.Sarada 2 1 (Student, Department of Electrical and Electronics Engineering,
More informationThe Impact of Distributed Generation on Power Transmission Grid Dynamics
The Impact of Distributed Generation on Power Transmission Grid Dynamics D. E. Newman B. A. Carreras M. Kirchner I. Dobson Physics Dept. University of Alaska Fairbanks AK 99775 Depart. Fisica Universidad
More informationNew criteria for Voltage Stability evaluation in interconnected power system
New criteria for Stability evaluation in interconnected power system Lavanya Neerugattu Dr.G.S Raju MTech Student, Dept.Of EEE Former Director IT, BHU Email: nlr37@gmail.com Visiting Professor VNR Vignana
More informationValid Inequalities for Optimal Transmission Switching
Valid Inequalities for Optimal Transmission Switching Hyemin Jeon Jeff Linderoth Jim Luedtke Dept. of ISyE UW-Madison Burak Kocuk Santanu Dey Andy Sun Dept. of ISyE Georgia Tech 19th Combinatorial Optimization
More informationCritical Points and Transitions in an Electric Power Transmission Model for Cascading Failure Blackouts
The submitted manuscript has been authored by a contractor of the U.S. Government under Contract No. DE-AC05-00OR22725. Accordingly, the U.S. Government retains a nonexclusive royalty-free license to publish
More informationON THE PARAMETRIC LCP: A HISTORICAL PERSPECTIVE
ON THE PARAMETRIC LCP: A HISTORICAL PERSPECTIVE Richard W. Cottle Department of Management Science and Engineering Stanford University ICCP 2014 Humboldt University Berlin August, 2014 1 / 55 The year
More informationSCHOOL OF ELECTRICAL, MECHANICAL AND MECHATRONIC SYSTEMS. Transient Stability LECTURE NOTES SPRING SEMESTER, 2008
SCHOOL OF ELECTRICAL, MECHANICAL AND MECHATRONIC SYSTEMS LECTURE NOTES Transient Stability SPRING SEMESTER, 008 October 7, 008 Transient Stability Transient stability refers to the ability of a synchronous
More informationFalse Data Injection Attacks Against Nonlinear State Estimation in Smart Power Grids
1 False Data Injection Attacks Against Nonlinear State Estimation in Smart Power rids Md. Ashfaqur Rahman and Hamed Mohsenian-Rad Department of Electrical and Computer Engineering, Texas Tech University,
More informationComplexity analysis of second-order algorithms based on line search for smooth nonconvex optimization
Complexity analysis of second-order algorithms based on line search for smooth nonconvex optimization Clément Royer - University of Wisconsin-Madison Joint work with Stephen J. Wright MOPTA, Bethlehem,
More informationarxiv: v1 [cs.sy] 15 Mar 2017
Modeling and Identification of Worst-Case Cascading Failures in Power Systems arxiv:73232v [cssy] Mar 27 Chao Zhai, Hehong Zhang, Gaoxi Xiao and Tso-Chien Pan * March 6, 27 Abstract Cascading failures
More informationPOWER flow studies are the cornerstone of power system
University of Wisconsin-Madison Department of Electrical and Computer Engineering. Technical Report ECE-2-. A Sufficient Condition for Power Flow Insolvability with Applications to Voltage Stability Margins
More informationResearch on the Effect of Substation Main Wiring on the Power System Reliability Yuxin Zhao 1, a, Tao Liu 2,b and Yanxin Shi 3,c
International Power, Electronics and aterials Engineering Conference (IPEEC 2015) esearch on the Effect of ubstation ain Wiring on the Power ystem eliability Yuxin Zhao 1, a, Tao Liu 2,b and Yanxin hi
More informationVarious Techniques for Nonlinear Energy-Related Optimizations. Javad Lavaei. Department of Electrical Engineering Columbia University
Various Techniques for Nonlinear Energy-Related Optimizations Javad Lavaei Department of Electrical Engineering Columbia University Acknowledgements Caltech: Steven Low, Somayeh Sojoudi Columbia University:
More informationA strongly polynomial algorithm for linear systems having a binary solution
A strongly polynomial algorithm for linear systems having a binary solution Sergei Chubanov Institute of Information Systems at the University of Siegen, Germany e-mail: sergei.chubanov@uni-siegen.de 7th
More informationComparison of Power Flow Algorithms for inclusion in On-line Power Systems Operation Tools
University of New Orleans ScholarWorks@UNO University of New Orleans Theses and Dissertations Dissertations and Theses 12-17-2010 Comparison of Power Flow Algorithms for inclusion in On-line Power Systems
More informationKINGS COLLEGE OF ENGINEERING Punalkulam
KINGS COLLEGE OF ENGINEERING Punalkulam 613 303 DEPARTMENT OF ELECTRICAL AND ELECTRONICS ENGINEERING POWER SYSTEM ANALYSIS QUESTION BANK UNIT I THE POWER SYSTEM AN OVERVIEW AND MODELLING PART A (TWO MARK
More informationPreliminaries Overview OPF and Extensions. Convex Optimization. Lecture 8 - Applications in Smart Grids. Instructor: Yuanzhang Xiao
Convex Optimization Lecture 8 - Applications in Smart Grids Instructor: Yuanzhang Xiao University of Hawaii at Manoa Fall 2017 1 / 32 Today s Lecture 1 Generalized Inequalities and Semidefinite Programming
More informationCOMPARISON OF STATISTICAL ALGORITHMS FOR POWER SYSTEM LINE OUTAGE DETECTION
COMPARISON OF STATISTICAL ALGORITHMS FOR POWER SYSTEM LINE OUTAGE DETECTION Georgios Rovatsos*, Xichen Jiang*, Alejandro D. Domínguez-García, and Venugopal V. Veeravalli Department of Electrical and Computer
More informationCHAPTER 2 LOAD FLOW ANALYSIS FOR RADIAL DISTRIBUTION SYSTEM
16 CHAPTER 2 LOAD FLOW ANALYSIS FOR RADIAL DISTRIBUTION SYSTEM 2.1 INTRODUCTION Load flow analysis of power system network is used to determine the steady state solution for a given set of bus loading
More informationIPAM Summer School Optimization methods for machine learning. Jorge Nocedal
IPAM Summer School 2012 Tutorial on Optimization methods for machine learning Jorge Nocedal Northwestern University Overview 1. We discuss some characteristics of optimization problems arising in deep
More informationNonlinear Security Constrained Optimal Power Flow for Combined AC and HVDC Grids
power systems eehlaboratory Vasileios Saplamidis Nonlinear Security Constrained Optimal Power Flow for Combined AC and HVDC Grids Master Thesis PSL 1417 EEH Power Systems Laboratory ETH Zurich Supervisor:
More informationChapter 2. Planning Criteria. Turaj Amraee. Fall 2012 K.N.Toosi University of Technology
Chapter 2 Planning Criteria By Turaj Amraee Fall 2012 K.N.Toosi University of Technology Outline 1- Introduction 2- System Adequacy and Security 3- Planning Purposes 4- Planning Standards 5- Reliability
More informationPower Grid Partitioning: Static and Dynamic Approaches
Power Grid Partitioning: Static and Dynamic Approaches Miao Zhang, Zhixin Miao, Lingling Fan Department of Electrical Engineering University of South Florida Tampa FL 3320 miaozhang@mail.usf.edu zmiao,
More informationCongestion Alleviation using Reactive Power Compensation in Radial Distribution Systems
IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 11, Issue 6 Ver. III (Nov. Dec. 2016), PP 39-45 www.iosrjournals.org Congestion Alleviation
More informationRandomized Sorting Algorithms Quick sort can be converted to a randomized algorithm by picking the pivot element randomly. In this case we can show th
CSE 3500 Algorithms and Complexity Fall 2016 Lecture 10: September 29, 2016 Quick sort: Average Run Time In the last lecture we started analyzing the expected run time of quick sort. Let X = k 1, k 2,...,
More informationPerformance analysis and comparison of load flow methods in a practical distribution system
Performance analysis and comparison of load flow methods in a practical distribution system B.Muruganantham Dept. of Electrical and Electronics Engineering Pondicherry Engineering College Puducherry -
More informationUNIT-I ECONOMIC OPERATION OF POWER SYSTEM-1
UNIT-I ECONOMIC OPERATION OF POWER SYSTEM-1 1.1 HEAT RATE CURVE: The heat rate characteristics obtained from the plot of the net heat rate in Btu/Wh or cal/wh versus power output in W is shown in fig.1
More information1 Strict local optimality in unconstrained optimization
ORF 53 Lecture 14 Spring 016, Princeton University Instructor: A.A. Ahmadi Scribe: G. Hall Thursday, April 14, 016 When in doubt on the accuracy of these notes, please cross check with the instructor s
More informationPower System Analysis Prof. A. K. Sinha Department of Electrical Engineering Indian Institute of Technology, Kharagpur
Power System Analysis Prof. A. K. Sinha Department of Electrical Engineering Indian Institute of Technology, Kharagpur Lecture - 9 Transmission Line Steady State Operation Welcome to lesson 9, in Power
More informationLecture 23 Branch-and-Bound Algorithm. November 3, 2009
Branch-and-Bound Algorithm November 3, 2009 Outline Lecture 23 Modeling aspect: Either-Or requirement Special ILPs: Totally unimodular matrices Branch-and-Bound Algorithm Underlying idea Terminology Formal
More informationStochastic Decision Diagrams
Stochastic Decision Diagrams John Hooker CORS/INFORMS Montréal June 2015 Objective Relaxed decision diagrams provide an generalpurpose method for discrete optimization. When the problem has a dynamic programming
More informationUNIVERSIDAD DE CASTILLA-LA MANCHA
UNIVERSIDAD DE CASTILLA-LA MANCHA DEPARTAMENTO DE INGENIERÍA ELÉCTRICA, ELECTRÓNICA, AUTOMÁTICA Y COMUNICACIONES OPTIMAL POWER FLOW WITH STABILITY CONSTRAINTS TESIS DOCTORAL AUTOR: RAFAEL ZÁRATE MIÑANO
More informationAn Equivalent Circuit Formulation of the Power Flow Problem with Current and Voltage State Variables
An Equivalent Circuit Formulation of the Power Flow Problem with Current and Voltage State Variables David M. Bromberg, Marko Jereminov, Xin Li, Gabriela Hug, Larry Pileggi Dept. of Electrical and Computer
More informationBranch Outage Simulation for Contingency Studies
Branch Outage Simulation for Contingency Studies Dr.Aydogan OZDEMIR, Visiting Associate Professor Department of Electrical Engineering, exas A&M University, College Station X 77843 el : (979) 862 88 97,
More informationDevelopment of an algorithm for solving mixed integer and nonconvex problems arising in electrical supply networks
Development of an algorithm for solving mixed integer and nonconvex problems arising in electrical supply networks E. Wanufelle 1 S. Leyffer 2 A. Sartenaer 1 Ph. Toint 1 1 FUNDP, University of Namur 2
More informationPOWER system operations increasingly rely on the AC
i Convex Relaxations and Approximations of Chance-Constrained AC-OF roblems Lejla Halilbašić, Student Member, IEEE, ierre inson, Senior Member, IEEE, and Spyros Chatzivasileiadis, Senior Member, IEEE arxiv:1804.05754v3
More informationNatural Evolution Strategies for Direct Search
Tobias Glasmachers Natural Evolution Strategies for Direct Search 1 Natural Evolution Strategies for Direct Search PGMO-COPI 2014 Recent Advances on Continuous Randomized black-box optimization Thursday
More informationMS&E338 Reinforcement Learning Lecture 1 - April 2, Introduction
MS&E338 Reinforcement Learning Lecture 1 - April 2, 2018 Introduction Lecturer: Ben Van Roy Scribe: Gabriel Maher 1 Reinforcement Learning Introduction In reinforcement learning (RL) we consider an agent
More informationPh 219b/CS 219b. Exercises Due: Wednesday 4 December 2013
1 Ph 219b/CS 219b Exercises Due: Wednesday 4 December 2013 4.1 The peak in the Fourier transform In the period finding algorithm we prepared the periodic state A 1 1 x 0 + jr, (1) A j=0 where A is the
More informationConvex Relaxations of AC Optimal Power Flow under Uncertainty
Convex Relaxations of AC Optimal Power Flow under Uncertainty Andreas Venzke, PhD student Center for Electric Power and Energy Technical University of Denmark (DTU) PhD advisors: Spyros Chatzivasileiadis
More information3.10 Lagrangian relaxation
3.10 Lagrangian relaxation Consider a generic ILP problem min {c t x : Ax b, Dx d, x Z n } with integer coefficients. Suppose Dx d are the complicating constraints. Often the linear relaxation and the
More informationApplied Optimization: Formulation and Algorithms for Engineering Systems Slides
Applied Optimization: Formulation and Algorithms for Engineering Systems Slides Ross Baldick Department of Electrical and Computer Engineering The University of Texas at Austin Austin, TX 78712 Copyright
More informationAPPLICATIONS OF SENSITIVITY ANALYSIS IN PLANNING AND OPERATION OF MODERN POWER SYSTEMS. Mohammed Ben-Idris
APPLICATIONS OF SENSITIVITY ANALYSIS IN PLANNING AND OPERATION OF MODERN POWER SYSTEMS By Mohammed Ben-Idris A DISSERTATION Submitted to Michigan State University in partial fulfillment of the requirements
More informationEvaluating the Impact of Modeling Assumptions for Cascading Failure Simulation
1 Evaluating the Impact of Modeling Assumptions for Cascading Failure Simulation Ronan Fitzmaurice, Member, IEEE, Eduardo Cotilla-Sanchez, Graduate Student Member, IEEE, and Paul Hines, Member, IEEE Abstract
More informationECEN 615 Methods of Electric Power Systems Analysis Lecture 18: Least Squares, State Estimation
ECEN 615 Methods of Electric Power Systems Analysis Lecture 18: Least Squares, State Estimation Prof. om Overbye Dept. of Electrical and Computer Engineering exas A&M University overbye@tamu.edu Announcements
More informationAn Improved Method for Determining Voltage Collapse Proximity of Radial Distribution Networks
An Improved Method for Determining Voltage Collapse Proximity of Radial Distribution Networks A. AUGUGLIARO, L. DUSONCHET, S. FAVUA, S. MANGIONE Dept. of Electrical, Electronic and Telecommunication Engineering
More informationLINE FLOW ANALYSIS OF IEEE BUS SYSTEM WITH THE LOAD SENSITIVITY FACTOR
LINE FLOW ANALYSIS OF IEEE BUS SYSTEM WITH THE LOAD SENSITIVITY FACTOR Puneet Sharma 1, Jyotsna Mehra 2, Virendra Kumar 3 1,2,3 M.Tech Research scholar, Galgotias University, Greater Noida, India Abstract
More informationNetwork Flows. 6. Lagrangian Relaxation. Programming. Fall 2010 Instructor: Dr. Masoud Yaghini
In the name of God Network Flows 6. Lagrangian Relaxation 6.3 Lagrangian Relaxation and Integer Programming Fall 2010 Instructor: Dr. Masoud Yaghini Integer Programming Outline Branch-and-Bound Technique
More informationManaging Uncertainty and Security in Power System Operations: Chance-Constrained Optimal Power Flow
Managing Uncertainty and Security in Power System Operations: Chance-Constrained Optimal Power Flow Line Roald, November 4 th 2016 Line Roald 09.11.2016 1 Outline Introduction Chance-Constrained Optimal
More information