Power grid vulnerability analysis

Size: px
Start display at page:

Download "Power grid vulnerability analysis"

Transcription

1 Power grid vulnerability analysis Daniel Bienstock Columbia University Dimacs 2010 Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

2 Background: a power grid is three systems GENERATION TRANSMISSION DISTRIBUTION Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

3 Challenges to analysis Power grids follow the laws of physics, characterized by nonlinear, nonconvex equations that make fast computation difficult. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

4 Challenges to analysis Power grids follow the laws of physics, characterized by nonlinear, nonconvex equations that make fast computation difficult. Furthermore, direct control is difficult: we cannot dictate how power will flow. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

5 Challenges to analysis Power grids follow the laws of physics, characterized by nonlinear, nonconvex equations that make fast computation difficult. Furthermore, direct control is difficult: we cannot dictate how power will flow. Power grids are subject to noise which is difficult to model accurately. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

6 Challenges to analysis Power grids follow the laws of physics, characterized by nonlinear, nonconvex equations that make fast computation difficult. Furthermore, direct control is difficult: we cannot dictate how power will flow. Power grids are subject to noise which is difficult to model accurately. Power grids can exhibit non-monotone behavior as a result of control or adversarial actions. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

7 Challenges to analysis Power grids follow the laws of physics, characterized by nonlinear, nonconvex equations that make fast computation difficult. Furthermore, direct control is difficult: we cannot dictate how power will flow. Power grids are subject to noise which is difficult to model accurately. Power grids can exhibit non-monotone behavior as a result of control or adversarial actions. Power grids can cascade. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

8 AC power flows polar coordinates Voltage at a node ( bus ) k is of the form U k e jθ k, where j = 1 Power flowing on edge ( line ) {k, m} equals p km + jq km, where p km = U 2 k g km U k U m g km cos θ km U k U m b km sin θ km q km = U 2 k (b km + b sh km ) + U k U m b km cos θ km U k U m g km sin θ km. Here, θ km = θk θ m g km, b km, bkm sh are known parameters (series conductance, series reactance, shunt susceptance) Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

9 Voltage at k = U k e jθ k ; power on line {k, m} = p km + jq km, where p km = U 2 k g km U k U m g km cos θ km U k U m b km sin θ km q km = U 2 k (b km + b sh km ) + U k U m b km cos θ km U k U m g km sin θ km ( θ km. = θk θ m ) P k = Σ {k,m} p km (active power), Q k = Σ {k,m} q km (reactive power) Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

10 Voltage at k = U k e jθ k ; power on line {k, m} = p km + jq km, where p km = U 2 k g km U k U m g km cos θ km U k U m b km sin θ km q km = U 2 k (b km + b sh km ) + U k U m b km cos θ km U k U m g km sin θ km ( θ km. = θk θ m ) P k = Σ {k,m} p km (active power), Q k = Σ {k,m} q km (reactive power) Power flow problem: Choose the vectors p, q, θ, P, Q so as to satisfy all equations above, and Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

11 Voltage at k = U k e jθ k ; power on line {k, m} = p km + jq km, where p km = U 2 k g km U k U m g km cos θ km U k U m b km sin θ km q km = U 2 k (b km + b sh km ) + U k U m b km cos θ km U k U m g km sin θ km ( θ km. = θk θ m ) P k = Σ {k,m} p km (active power), Q k = Σ {k,m} q km (reactive power) Power flow problem: Choose the vectors p, q, θ, P, Q so as to satisfy all equations above, and meet demand requirements and generator constraints Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

12 Voltage at k = U k e jθ k ; power on line {k, m} = p km + jq km, where p km = U 2 k g km U k U m g km cos θ km U k U m b km sin θ km q km = U 2 k (b km + b sh km ) + U k U m b km cos θ km U k U m g km sin θ km ( θ km. = θk θ m ) P k = Σ {k,m} p km (active power), Q k = Σ {k,m} q km (reactive power) Power flow problem: Choose the vectors p, q, θ, P, Q so as to satisfy all equations above, and meet demand requirements and generator constraints and, ideally, meet thermal constraints (flow limits) on the power lines Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

13 Research challenges Do we have fast and reliable algorithm for the power flow problem? Should not require human input in order to terminate. When no acceptable solution exists, should produce a certificate that this is the case. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

14 Research challenges Do we have fast and reliable algorithm for the power flow problem? Should not require human input in order to terminate. When no acceptable solution exists, should produce a certificate that this is the case. What about the cases where multiple solutions exist? Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

15 Research challenges Do we have fast and reliable algorithm for the power flow problem? Should not require human input in order to terminate. When no acceptable solution exists, should produce a certificate that this is the case. What about the cases where multiple solutions exist? After a contingency has take place, or a control has been applied: which solution should be instantiated? Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

16 Research challenges Do we have fast and reliable algorithm for the power flow problem? Should not require human input in order to terminate. When no acceptable solution exists, should produce a certificate that this is the case. What about the cases where multiple solutions exist? After a contingency has take place, or a control has been applied: which solution should be instantiated? What if all solutions are bad? Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

17 Solution methodologies Newton-Raphson (iterative) algorithms to solve system of equations Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

18 Solution methodologies Newton-Raphson (iterative) algorithms to solve system of equations The claim: this always works fast. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

19 Solution methodologies Newton-Raphson (iterative) algorithms to solve system of equations The claim: this always works fast. normal system. At least in the case of a Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

20 Solution methodologies Newton-Raphson (iterative) algorithms to solve system of equations The claim: this always works fast. normal system. At least in the case of a New result: Low et al (2010). Some (many?) optimal power flow problems can be solved using semidefinite programming. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

21 Linearized ( DC ) model: sin(θ i θ j ) (θ i θ j ) for θ i θ j A power flow is a solution f, θ to: ij f ij ij f ji = b i, for all i, where b i > 0 for each generator i, b i < 0 for demand node i, Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

22 Linearized ( DC ) model: sin(θ i θ j ) (θ i θ j ) for θ i θ j A power flow is a solution f, θ to: ij f ij ij f ji = b i, for all i, where b i > 0 for each generator i, b i < 0 for demand node i, x ij f ij θ i + θ j = 0 for all (i, j). ( x ij = reactance ) Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

23 Linearized ( DC ) model: sin(θ i θ j ) (θ i θ j ) for θ i θ j A power flow is a solution f, θ to: ij f ij ij f ji = b i, for all i, where b i > 0 for each generator i, b i < 0 for demand node i, x ij f ij θ i + θ j = 0 for all (i, j). ( x ij = reactance ) Lemma: Given a choice for b with i b i = 0 (a requirement), Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

24 Linearized ( DC ) model: sin(θ i θ j ) (θ i θ j ) for θ i θ j A power flow is a solution f, θ to: ij f ij ij f ji = b i, for all i, where b i > 0 for each generator i, b i < 0 for demand node i, x ij f ij θ i + θ j = 0 for all (i, j). ( x ij = reactance ) Lemma: Given a choice for b with i b i = 0 (a requirement), the system has a unique (in f) solution. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

25 A quote from: Final Report on the August 14, 2003 Blackout in the United States and Canada: Causes and Recommendations, U.S.-Canada Power System Outage Task Force, April 5, ( Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

26 A quote from: Final Report on the August 14, 2003 Blackout in the United States and Canada: Causes and Recommendations, U.S.-Canada Power System Outage Task Force, April 5, ( Cause 1 was inadequate system understanding Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

27 A quote from: Final Report on the August 14, 2003 Blackout in the United States and Canada: Causes and Recommendations, U.S.-Canada Power System Outage Task Force, April 5, ( Cause 1 was inadequate system understanding stated 20 times Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

28 A quote from: Final Report on the August 14, 2003 Blackout in the United States and Canada: Causes and Recommendations, U.S.-Canada Power System Outage Task Force, April 5, ( Cause 1 was inadequate system understanding stated 20 times Cause 2 was inadequate situational awareness stated 14 times Cause 3 was inadequate tree trimming stated 4 times Cause 4 was inadequate RC diagnostic support stated 5 times Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

29 Cascades Load (demand) Generator Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

30 Cascades Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

31 Cascades Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

32 Cascades Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

33 Cascades Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

34 Cascades = lost demand Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

35 Cascades Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

36 Cascades Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

37 Formal cascade model (Dobson et al) Initial fault event takes place (an act of God ). Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

38 Formal cascade model (Dobson et al) Initial fault event takes place (an act of God ). For r = 1, 2,..., 1. Reconfigure demands and generator output levels. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

39 Islanding supply > demand Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

40 Formal cascade model (Dobson et al) Initial fault event takes place (an act of God ). For r = 1, 2,..., 1. Reconfigure demands and generator output levels. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

41 Formal cascade model (Dobson et al) Initial fault event takes place (an act of God ). For r = 1, 2,..., 1. Reconfigure demands and generator output levels. 2. New power flows are instantiated. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

42 Formal cascade model (Dobson et al) Initial fault event takes place (an act of God ). For r = 1, 2,..., 1. Reconfigure demands and generator output levels. 2. New power flows are instantiated. 3. The next set of faults takes place. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

43 Formal cascade model (Dobson et al) Initial fault event takes place (an act of God ). For r = 1, 2,..., 1. Reconfigure demands and generator output levels. 2. New power flows are instantiated. 3. The next set of faults takes place. (Stochastic or history-dependent criterion) Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

44 Outage mechanism f e = flow on line e u e = flow limit (threshold) on e Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

45 Outage mechanism f e = flow on line e u e = flow limit (threshold) on e Prob( e fails) = F ( f e /u e ), where F (x) 1 as x +. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

46 Outage mechanism f e = flow on line e u e = flow limit (threshold) on e Prob( e fails) = F ( f e /u e ), where F (x) 1 as x +. Set f r e = α e fe r + (1 α e) f e r 1, where 0 α e 1 is given. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

47 Outage mechanism f e = flow on line e u e = flow limit (threshold) on e Prob( e fails) = F ( f e /u e ), where F (x) 1 as x +. Set f r e = α e fe r + (1 α e) f e r 1, where 0 α e 1 is given. f r e = running average of f e. r = round (time). Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

48 Outage mechanism f e = flow on line e u e = flow limit (threshold) on e Prob( e fails) = F ( f e /u e ), where F (x) 1 as x +. Set f r e = α e fe r + (1 α e) f e r 1, where 0 α e 1 is given. f r e = running average of f e. r = round (time). e fails if f e > u e. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

49 Outage mechanism f e = flow on line e u e = flow limit (threshold) on e Prob( e fails) = F ( f e /u e ), where F (x) 1 as x +. Set f r e = α e fe r + (1 α e) f e r 1, where 0 α e 1 is given. f r e = running average of f e. r = round (time). e fails if f e > u e. or: e fails if f e u e Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

50 Outage mechanism f e = flow on line e u e = flow limit (threshold) on e Prob( e fails) = F ( f e /u e ), where F (x) 1 as x +. Set f r e = α e fe r + (1 α e) fe r 1, where 0 α e 1 is given. f r e = two-round average of f e. r = round (time). e fails if f e > u e, Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

51 Outage mechanism f e = flow on line e u e = flow limit (threshold) on e Prob( e fails) = F ( f e /u e ), where F (x) 1 as x +. Set f r e = α e fe r + (1 α e) fe r 1, where 0 α e 1 is given. f r e = two-round average of f e. r = round (time). e fails if f e > u e, (or, e fails if f e u e ) Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

52 Stochastic faults e fails if u e < f r e, Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

53 Stochastic faults e fails if u e < f r e, e does not fail if (1 γ)u e > f e r, (γ = tolerance) Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

54 Stochastic faults e fails if u e < f r e, e does not fail if (1 γ)u e > f e r, (γ = tolerance) if (1 γ)u e f r e u e then e fails with probability 1/2 Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

55 Formal cascade model (Dobson et al) Initial outage event takes place (an act of God ). For r = 1, 2,..., 1. Reconfigure demands and generator output levels. 2. New power flows are instantiated. 3. The next set of outages takes place. (Stochastic or history-dependent criterion) Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

56 Formal cascade model (Dobson et al) Initial outage event takes place (an act of God ). For r = 1, 2,..., 1. Reconfigure demands and generator output levels. 2. New power flows are instantiated. 3. The next set of outages takes place. (Stochastic or history-dependent criterion) If no more faults occur or too much demand has been lost, STOP Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

57 Online control Initial outage event takes place. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

58 Online control Initial outage event takes place. Compute control algorithm. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

59 Online control Initial outage event takes place. Compute control algorithm. For r = 1, 2,..., R 1 1. Reconfigure demands and generator output levels. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

60 Online control Initial outage event takes place. Compute control algorithm. For r = 1, 2,..., R 1 1. Reconfigure demands and generator output levels. 2. New power flows are instantiated. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

61 Online control Initial outage event takes place. Compute control algorithm. For r = 1, 2,..., R 1 1. Reconfigure demands and generator output levels. 2. New power flows are instantiated. 3a. Take measurements and apply control to shed demand. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

62 Online control Initial outage event takes place. Compute control algorithm. For r = 1, 2,..., R 1 1. Reconfigure demands and generator output levels. 2. New power flows are instantiated. 3a. Take measurements and apply control to shed demand. 3b. Reconfigure generator outputs; Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

63 Online control Initial outage event takes place. Compute control algorithm. For r = 1, 2,..., R 1 1. Reconfigure demands and generator output levels. 2. New power flows are instantiated. 3a. Take measurements and apply control to shed demand. 3b. Reconfigure generator outputs; get new power flows. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

64 Online control Initial outage event takes place. Compute control algorithm. For r = 1, 2,..., R 1 1. Reconfigure demands and generator output levels. 2. New power flows are instantiated. 3a. Take measurements and apply control to shed demand. 3b. Reconfigure generator outputs; get new power flows. 4. The next set of outages takes place. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

65 Online control Initial outage event takes place. Compute control algorithm. For r = 1, 2,..., R 1 1. Reconfigure demands and generator output levels. 2. New power flows are instantiated. 3a. Take measurements and apply control to shed demand. 3b. Reconfigure generator outputs; get new power flows. 4. The next set of outages takes place. At round R, reduce demands so as to remove any line overloads. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

66 Deterministic, no history model Optimal control via integer programming formulation Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

67 Deterministic, no history model Optimal control via integer programming formulation? Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

68 Deterministic, no history model Optimal control via integer programming formulation? f r j y r j d r j = flow on arc j at round r = 1, if arc j fails in round r, 0 otherwise = demand at node i in round r and many other variables Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

69 Subject to: max X d R i i D 8 X f r j X f r < j = j δ + (i) j δ : (i) si r i G di r i D 0 otherwise 1 r R (1) f r j = π r j ν r j j A and 1 r R (2) π r j Dp r j, νr j Dn r j, j A and 1 r R (3) p r j + n r j r 1 X = 1 y h j, j A and 1 r R (4) h=1 π r j + ν r j u j π r j + ν r j Dy r j j A and 1 r R (5) u j y r j j A and 1 r R 1 (6) π R j + ν R j u j j A (7) φ r i φ r j x j f r r 1 X j M j y h j j A (8) h=1 0 s r i s i i G, 0 d r i d i i D, (9) p r j, nr ij, yr j = 0 or 1, j A and 1 r R (10) 0 π r j, 0 νr j, j A and 1 r R. (11) Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

70 What s bad about the formulation probably can t solve it for medium to large networks stochastic variant probably needed, harder Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

71 What s bad about the formulation probably can t solve it for medium to large networks stochastic variant probably needed, harder optimal solutions = complex policies Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

72 Adaptive affine controls For each demand v, and round r, control cv r, br v, sr v computed to be Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

73 Adaptive affine controls For each demand v, and round r, control cv r, br v, sr v computed to be Parameterized by integer r > 0. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

74 Adaptive affine controls For each demand v, and round r, control cv r, br v, sr v computed to be Parameterized by integer r > 0. At round r, Let κ = maximum overload of any line within radius r of v Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

75 Adaptive affine controls For each demand v, and round r, control cv r, br v, sr v computed to be Parameterized by integer r > 0. At round r, Let κ = maximum overload of any line within radius r of v If κ > cv r, demand at v reduced (scaled) by a factor max { 1, s r v (cr v κ) + br v}. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

76 Adaptive affine controls For each demand v, and round r, control cv r, br v, sr v computed to be Parameterized by integer r > 0. At round r, Let κ = maximum overload of any line within radius r of v If κ > cv r, demand at v reduced (scaled) by a factor max { 1, s r v (cr v κ) + br v}. The goal: pick control to maximize demand being served at the end of round R. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

77 For each demand v, and round r, control c r v, br v, sr v At round r, if κ > cv r, demand at v reduced (scaled) by a factor min { 1, [ s r v (cr v κ) + br v ]+ }. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

78 For each demand v, and round r, control c r v, br v, sr v At round r, if κ > cv r, demand at v reduced (scaled) by a factor min { 1, [ s r v (cr v κ) + br v ]+ }. This talk: r = n (number of nodes) Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

79 For each demand v, and round r, control c r v, br v, sr v At round r, if κ > cv r, demand at v reduced (scaled) by a factor min { 1, [ s r v (cr v κ) + br v ]+ }. This talk: r = n (number of nodes) Special case: (optimal scaling problem) Insist that for each r, (c r v, br v, sr v ) = (cr, b r, s r ) for every v Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

80 For each demand v, and round r, control c r v, br v, sr v At round r, if κ > cv r, demand at v reduced (scaled) by a factor min { 1, [ s r v (cr v κ) + br v ]+ }. This talk: r = n (number of nodes) Special case: (optimal scaling problem) Insist that for each r, (c r v, br v, sr v ) = (cr, b r, s r ) for every v Then, equivalent problem: In round r, let α r (K ) 1 be chosen for each component of the network in round r If node v component K, then its demand is scaled by α r (K ) Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

81 Notation: ˆβ = supply/demand vector at time 0 ˆf = corresponding power flows at time 0 Θ R (t, β) : R + R + = total demand, at the end of round R, using optimal control, if the supply/demand vector is t β Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

82 Notation: ˆβ = supply/demand vector at time 0 ˆf = corresponding power flows at time 0 Θ R (t, β) : R + R + = total demand, at the end of round R, using optimal control, if the supply/demand vector is t β Note: supply/demand = tβ means flow = t ˆf Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

83 Notation: ˆβ = supply/demand vector at time 0 ˆf = corresponding power flows at time 0 Θ R (t, β) : R + R + = total demand, at the end of round R, using optimal control, if the supply/demand vector is t β Note: supply/demand = tβ means flow = t ˆf Theorem: Θ R (t, ˆβ) is nondecreasing piecewise-linear with at most m R /R! + O(m R 1 ) breakpoints. m = no. of arcs Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

84 Notation: ˆβ = supply/demand vector at time 0 ˆf = corresponding power flows at time 0 Θ R (t, β) : R + R + = total demand, at the end of round R, using optimal control, if the supply/demand vector is t β Note: supply/demand = tβ means flow = t ˆf Theorem: Θ R (t, ˆβ) is nondecreasing piecewise-linear with at most m R /R! + O(m R 1 ) breakpoints. m = no. of arcs In round 1, the optimal scale is equal to u j /(t ˆf j ) for some arc j. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

85 Notation: ˆβ = supply/demand vector at time 0 ˆf = corresponding power flows at time 0 Θ R (t, β) : R + R + = total demand, at the end of round R, using optimal control, if the supply/demand vector is t β Note: supply/demand = tβ means flow = t ˆf Theorem: Θ R (t, ˆβ) is nondecreasing piecewise-linear with at most m R /R! + O(m R 1 ) breakpoints. m = no. of arcs In round 1, the optimal scale is equal to u j /(t ˆf j ) for some arc j. So arc j will become critical Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

86 Notation: ˆβ = supply/demand vector at time 0 ˆf = corresponding power flows at time 0 Θ R (t, β) : R + R + = total demand, at the end of round R, using optimal control, if the supply/demand vector is t β Note: supply/demand = tβ means flow = t ˆf Theorem: Θ R (t, ˆβ) is nondecreasing piecewise-linear with at most m R /R! + O(m R 1 ) breakpoints. m = no. of arcs In round 1, the optimal scale is equal to u j /(t ˆf j ) for some arc j. So arc j will become critical And recursively... Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

87 Notation: ˆβ = supply/demand vector at time 0 ˆf = corresponding power flows at time 0 Θ R (t, β) : R + R + = total demand, at the end of round R, using optimal control, if the supply/demand vector is t β Note: supply/demand = tβ means flow = t ˆf Theorem: Θ R (t, ˆβ) is nondecreasing piecewise-linear with at most m R /R! + O(m R 1 ) breakpoints. m = no. of arcs In round 1, the optimal scale is equal to u j /(t ˆf j ) for some arc j. So arc j will become critical And recursively... Robust/stochastic version? Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

88 General case: simulation-based optimization Given a control vector ũ = (cv r, br v, sr v ) (over all v and r), Θ(ũ) = throughput (total demand) satisfied at end of cascade Maximization of Θ(ũ) should be (very?) fast Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

89 General case: simulation-based optimization Given a control vector ũ = (cv r, br v, sr v ) (over all v and r), Θ(ũ) = throughput (total demand) satisfied at end of cascade Maximization of Θ(ũ) should be (very?) fast Optimization should be robust (noisy process) Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

90 General case: simulation-based optimization Given a control vector ũ = (cv r, br v, sr v ) (over all v and r), Θ(ũ) = throughput (total demand) satisfied at end of cascade Maximization of Θ(ũ) should be (very?) fast Optimization should be robust (noisy process) From a strict perspective, Θ(ũ) is not even continuous Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

91 General case: simulation-based optimization Given a control vector ũ = (cv r, br v, sr v ) (over all v and r), Θ(ũ) = throughput (total demand) satisfied at end of cascade Maximization of Θ(ũ) should be (very?) fast Optimization should be robust (noisy process) From a strict perspective, Θ(ũ) is not even continuous Θ(ũ) is obtained through a simulation Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

92 Derivative-free optimization Conn, Scheinberg, Vicente, others Rough description: Sample a number of control vectors ũ Use the sample points to construct a convex approximation to Θ Optimize this approximation; this yields a new sample point Scalability to large dimensionality? Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

93 First order method Given a control vector ũ 1 Estimate the gradient g = Θ(ũ) through finite differences. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

94 First order method Given a control vector ũ 1 Estimate the gradient g = Θ(ũ) through finite differences. Requires O(1) simulations per demand node. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

95 First order method Given a control vector ũ 1 Estimate the gradient g = Θ(ũ) through finite differences. Requires O(1) simulations per demand node. 2 Estimate step size argmax Θ(ũ + σg) Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

96 First order method Given a control vector ũ 1 Estimate the gradient g = Θ(ũ) through finite differences. Requires O(1) simulations per demand node. 2 Estimate step size argmax Θ(ũ + σg) Easily parallelizable Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

97 Line searches 0.91 ls ls ls Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

98 Current parallel implementation: boss-nerd Boss carries out search algorithm Nerds simulate cascades with given control Communication using Unix sockets Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

99 Scaling Example: nodes, lines 5 gradient steps 8-core i7 CPUs (3 machines total) cores wall-clock sec Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

100 Initial experiments with Eastern Interconnect nodes, lines generator nodes, 6261 demand nodes Equivalent DC flow version Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

101 Initial experiments with Eastern Interconnect nodes, lines generator nodes, 6261 demand nodes Equivalent DC flow version Methodology for experiments 1 Generate an interdiction of the grid ( initial event ) 2 Compute control and simulate Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

102 Initial experiments with Eastern Interconnect nodes, lines generator nodes, 6261 demand nodes Equivalent DC flow version Methodology for experiments 1 Generate an interdiction of the grid ( initial event ) 2 Compute control and simulate 3 At least three rounds of cascade after initial event Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

103 Computing a control (1) Solve scaling problem let (c, b, s ) be optimal Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

104 Computing a control (1) Solve scaling problem let (c, b, s ) be optimal (2) Partition demand nodes into small number of segments Σ 1,..., Σ k. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

105 Computing a control (1) Solve scaling problem let (c, b, s ) be optimal (2) Partition demand nodes into small number of segments Σ 1,..., Σ k. Example = demand quantiles. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

106 Computing a control (1) Solve scaling problem let (c, b, s ) be optimal (2) Partition demand nodes into small number of segments Σ 1,..., Σ k. Example = demand quantiles. Perform segmented gradient search starting from (c, b, s ). Look for a control with (cv r, br v, sr v ) = constant for each given r and all v in a common Σ i. Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

107 Computing a control (1) Solve scaling problem let (c, b, s ) be optimal (2) Partition demand nodes into small number of segments Σ 1,..., Σ k. Example = demand quantiles. Perform segmented gradient search starting from (c, b, s ). Look for a control with (cv r, br v, sr v ) = constant for each given r and all v in a common Σ i. (3) Perform full gradient search starting from the output in (2). Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

108 Experiments K random lines taken out highly loaded lines more likely to be taken out; connectivity preserved Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

109 Experiments K random lines taken out highly loaded lines more likely to be taken out; connectivity preserved K yield, (%) yield, wallclock no control control (sec) Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

110 Conjectures It is best to stop the cascade in the first round It is best to apply control in the first round only, and ride out the cascade Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

111 Conjectures It is best to stop the cascade in the first round It is best to apply control in the first round only, and ride out the cascade (Answer: both wrong) Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

112 Details: cascade with 50 (highly loaded) random lines taken out No control yield = 0% Optimal round 1 only constant control yield = 38% Optimal scaling control yield = 45% Plus segmented gradient seach yield = 50% Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

113 Load distribution at time zero (load of arc j = f j u j ) load no. of arcs Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

114 Load distribution at time zero (load of arc j = f j u j ) Optimal round 1 scale = 0.51, load no. of arcs Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

115 Load distribution at time zero (load of arc j = f j u j ) load no. of arcs Optimal round 1 scale = 0.51, so 44 faults Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

116 Out-of-sample testing: use stochastic faults at round r, e fails if u e < f r e, e does not fail if (1 γ)u e > f e r, (γ = tolerance) if (1 γ)u e f r e u e then e fails with probability 1/2 Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

117 Out-of-sample testing: use stochastic faults at round r, e fails if u e < f r e, e does not fail if (1 γ)u e > f e r, (γ = tolerance) if (1 γ)u e f r e u e then e fails with probability 1/2 What is the impact of γ? Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

118 γ = 0.03, 0.10, 0.20, runs percent 10 percent 20 percent COUNT YIELD Daniel Bienstock (Columbia University) Power grid vulnerability analysis Dimacs

Sample average approximation and cascading failures of power grids. Daniel Bienstock, Guy Grebla, Tingjun Chen, Columbia University GraphEx 15

Sample average approximation and cascading failures of power grids. Daniel Bienstock, Guy Grebla, Tingjun Chen, Columbia University GraphEx 15 Sample average approximation and cascading failures of power grids Daniel Bienstock, Guy Grebla, Tingjun Chen, Columbia University GraphEx 15 August 14 2003 Approximately 50 million people affected Other

More information

Optimal adaptive control of cascading power grid failures 1. Version 2010-Dec-20. Daniel Bienstock Columbia University New York

Optimal adaptive control of cascading power grid failures 1. Version 2010-Dec-20. Daniel Bienstock Columbia University New York Optimal adaptive control of cascading power grid failures 1 1 Introduction Version 2010-Dec-20 Daniel Bienstock Columbia University New York Power grids have long been a source of interesting optimization

More information

Power Grid Vulnerability to Geographically Correlated Failures - Analysis and Control Implications

Power Grid Vulnerability to Geographically Correlated Failures - Analysis and Control Implications Power Grid Vulnerability to Geographically Correlated Failures - Analysis and Control Implications Andrey Bernstein 1, Daniel Bienstock 2, David Hay 3, Meric Uzunoglu 4, Gil Zussman 5 1 Computer and Communication

More information

1 Unified Power Flow Controller (UPFC)

1 Unified Power Flow Controller (UPFC) Power flow control with UPFC Rusejla Sadikovic Internal report 1 Unified Power Flow Controller (UPFC) The UPFC can provide simultaneous control of all basic power system parameters ( transmission voltage,

More information

Power Grid Security Analysis : An Optimization Approach

Power Grid Security Analysis : An Optimization Approach Power Grid Security Analysis : An Optimization Approach by Abhinav Verma Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences

More information

Cascading Failures in Power Grids - Analysis and Algorithms

Cascading Failures in Power Grids - Analysis and Algorithms Cascading Failures in Power Grids - Analysis and Algorithms Saleh Soltan 1, Dorian Mazaruic 2, Gil Zussman 1 1 Electrical Engineering, Columbia University 2 INRIA Sophia Antipolis Cascading Failures in

More information

Blackouts in electric power transmission systems

Blackouts in electric power transmission systems University of Sunderland From the SelectedWorks of John P. Karamitsos 27 Blackouts in electric power transmission systems Ioannis Karamitsos Konstadinos Orfanidis Available at: https://works.bepress.com/john_karamitsos/9/

More information

Using mixed-integer programming to solve power grid blackout problems

Using mixed-integer programming to solve power grid blackout problems Using mixed-integer programming to solve power grid blackout problems Daniel Bienstock 1 Dept. of IEOR Columbia University New York, NY 10027 Sara Mattia DIS Università La Sapienza Roma October 2005, revised

More information

Power Grid Vulnerability to Geographically Correlated Failures

Power Grid Vulnerability to Geographically Correlated Failures Columbia University, Electrical Engineering Technical Report #20-05-06, Nov. 20 Power Grid Vulnerability to Geographically Correlated Failures Andrey Bernstein, Daniel Bienstock, David Hay, Meric Uzunoglu,

More information

Cascading Outages in Power Systems. Rui Yao

Cascading Outages in Power Systems. Rui Yao Cascading Outages in Power Systems Rui Yao yaorui.thu@gmail.com Outline Understanding cascading outages Characteristics of cascading outages Mitigation of cascading outages Understanding cascading outages

More information

Power System Security. S. Chakrabarti

Power System Security. S. Chakrabarti Power System Security S. Chakrabarti Outline Introduction Major components of security assessment On-line security assessment Tools for contingency analysis DC power flow Linear sensitivity factors Line

More information

Architectures and Algorithms for Distributed Generation Control of Inertia-Less AC Microgrids

Architectures and Algorithms for Distributed Generation Control of Inertia-Less AC Microgrids Architectures and Algorithms for Distributed Generation Control of Inertia-Less AC Microgrids Alejandro D. Domínguez-García Coordinated Science Laboratory Department of Electrical and Computer Engineering

More information

The N k Problem using AC Power Flows

The N k Problem using AC Power Flows The N k Problem using AC Power Flows Sean Harnett 5-19-2011 Outline Introduction AC power flow model The optimization problem Some results Goal: find a small set of lines whose removal will cause the power

More information

Power Grid State Estimation after a Cyber-Physical Attack under the AC Power Flow Model

Power Grid State Estimation after a Cyber-Physical Attack under the AC Power Flow Model Power Grid State Estimation after a Cyber-Physical Attack under the AC Power Flow Model Saleh Soltan, Gil Zussman Department of Electrical Engineering Columbia University, New York, NY Email: {saleh,gil}@ee.columbia.edu

More information

A POWER FLOW CONTROL STRATEGY FOR FACTS DEVICES

A POWER FLOW CONTROL STRATEGY FOR FACTS DEVICES A POWER FLOW CONTROL STRATEGY FOR FACTS DEVICES RUSEJLA SADIKOVIC, ETH ZÜRICH, SWITZERLAND, sadikovic@eeh.ee.ethz.ch GÖRAN ANDERSSON, ETH ZÜRICH, SWITZERLAND, andersson@eeh.ee.ethz.ch PETR KORBA, ABB,

More information

Disconnecting Networks via Node Deletions

Disconnecting Networks via Node Deletions 1 / 27 Disconnecting Networks via Node Deletions Exact Interdiction Models and Algorithms Siqian Shen 1 J. Cole Smith 2 R. Goli 2 1 IOE, University of Michigan 2 ISE, University of Florida 2012 INFORMS

More information

Application of Monte Carlo Simulation to Multi-Area Reliability Calculations. The NARP Model

Application of Monte Carlo Simulation to Multi-Area Reliability Calculations. The NARP Model Application of Monte Carlo Simulation to Multi-Area Reliability Calculations The NARP Model Any power system reliability model using Monte Carlo simulation consists of at least the following steps: 1.

More information

An MINLP approach to forming secure islands in electricity networks

An MINLP approach to forming secure islands in electricity networks An MINLP approach to forming secure islands in electricity networks Waqquas Bukhsh, Jacek Gondzio, Andreas Grothey, Ken McKinnon, Paul Trodden School of Mathematics University of Edinburgh GOR 2012, 4-7

More information

Reliability of Bulk Power Systems (cont d)

Reliability of Bulk Power Systems (cont d) Reliability of Bulk Power Systems (cont d) Important requirements of a reliable electric power service Voltage and frequency must be held within close tolerances Synchronous generators must be kept running

More information

IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 29, NO. 4, JULY Stochastic Analysis of Cascading-Failure Dynamics in Power Grids

IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 29, NO. 4, JULY Stochastic Analysis of Cascading-Failure Dynamics in Power Grids IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 29, NO. 4, JULY 2014 1767 Stochastic Analysis of Cascading-Failure Dynamics in Power Grids Mahshid Rahnamay-Naeini, Student Member, IEEE, Zhuoyao Wang, Nasir Ghani,

More information

Power Grid Vulnerability to Geographically Correlated Failures Analysis and Control Implications

Power Grid Vulnerability to Geographically Correlated Failures Analysis and Control Implications Columbia University, Electrical Engineering Technical Report #20-05-06, Nov. 20 Power Grid Vulnerability to Geographically Correlated Failures Analysis and Control Implications arxiv:206.099v [cs.sy] 6

More information

Proper Security Criteria Determination in a Power System with High Penetration of Renewable Resources

Proper Security Criteria Determination in a Power System with High Penetration of Renewable Resources Proper Security Criteria Determination in a Power System with High Penetration of Renewable Resources Mojgan Hedayati, Kory Hedman, and Junshan Zhang School of Electrical, Computer, and Energy Engineering

More information

Computational Approaches for Optimal Load Shedding Control of DC Networks under Cascading Failure

Computational Approaches for Optimal Load Shedding Control of DC Networks under Cascading Failure This version: September 28, 2017 Computational Approaches for Optimal Load Shedding Control of DC Networks under Cascading Failure Qin Ba Ketan Savla Abstract We consider discrete-time dynamics, for cascading

More information

Optimization Methods for Power Grid Reliability

Optimization Methods for Power Grid Reliability Optimization Methods for Power Grid Reliability Sean Harnett Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences COLUMBIA

More information

STATE ESTIMATION IN DISTRIBUTION SYSTEMS

STATE ESTIMATION IN DISTRIBUTION SYSTEMS SAE ESIMAION IN DISRIBUION SYSEMS 2015 CIGRE Grid of the Future Symposium Chicago (IL), October 13, 2015 L. Garcia-Garcia, D. Apostolopoulou Laura.GarciaGarcia@ComEd.com Dimitra.Apostolopoulou@ComEd.com

More information

CHAPTER 5 STEADY-STATE ANALYSIS OF THREE-PHASE SELF-EXCITED INDUCTION GENERATORS

CHAPTER 5 STEADY-STATE ANALYSIS OF THREE-PHASE SELF-EXCITED INDUCTION GENERATORS 6 CHAPTER 5 STEADY-STATE ANALYSIS OF THREE-PHASE SELF-EXCITED INDUCTION GENERATORS 5.. INTRODUCTION The steady-state analysis of six-phase SEIG has been discussed in the previous chapters. In this chapter,

More information

Minimization of Energy Loss using Integrated Evolutionary Approaches

Minimization of Energy Loss using Integrated Evolutionary Approaches Minimization of Energy Loss using Integrated Evolutionary Approaches Attia A. El-Fergany, Member, IEEE, Mahdi El-Arini, Senior Member, IEEE Paper Number: 1569614661 Presentation's Outline Aim of this work,

More information

Topology-Driven Performance Analysis of Power Grids

Topology-Driven Performance Analysis of Power Grids Topology-Driven Performance Analysis of Power Grids Hale Çetinay, Yakup Koç, Fernando A. Kuipers, Piet Van Mieghem Abstract Direct connections between nodes usually result in efficient transmission in

More information

ECE 422/522 Power System Operations & Planning/Power Systems Analysis II : 7 - Transient Stability

ECE 422/522 Power System Operations & Planning/Power Systems Analysis II : 7 - Transient Stability ECE 4/5 Power System Operations & Planning/Power Systems Analysis II : 7 - Transient Stability Spring 014 Instructor: Kai Sun 1 Transient Stability The ability of the power system to maintain synchronism

More information

Cyber Attacks, Detection and Protection in Smart Grid State Estimation

Cyber Attacks, Detection and Protection in Smart Grid State Estimation 1 Cyber Attacks, Detection and Protection in Smart Grid State Estimation Yi Zhou, Student Member, IEEE Zhixin Miao, Senior Member, IEEE Abstract This paper reviews the types of cyber attacks in state estimation

More information

Analyzing and Quantifying the Effect of k-line Failures in Power Grids

Analyzing and Quantifying the Effect of k-line Failures in Power Grids TO APPEAR IN IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS 1 Analyzing and Quantifying the Effect of k-line Failures in Power Grids Saleh Soltan, Alexander Loh, Gil Zussman Department of Electrical Engineering

More information

Geographically Correlated Failures in Power Networks Survivability Analysis

Geographically Correlated Failures in Power Networks Survivability Analysis Geographically Correlated Failures in Power Networks Survivability Analysis Andrey Bernstein, Daniel Bienstock, David Hay, Meric Uzunoglu, and Gil Zussman School of Computer and Communication Sciences,

More information

Software for Integer and Nonlinear Optimization

Software for Integer and Nonlinear Optimization Software for Integer and Nonlinear Optimization Sven Leyffer, leyffer@mcs.anl.gov Mathematics & Computer Science Division Argonne National Laboratory Roger Fletcher & Jeff Linderoth Advanced Methods and

More information

Role of Synchronized Measurements In Operation of Smart Grids

Role of Synchronized Measurements In Operation of Smart Grids Role of Synchronized Measurements In Operation of Smart Grids Ali Abur Electrical and Computer Engineering Department Northeastern University Boston, Massachusetts Boston University CISE Seminar November

More information

New Formulations of the Optimal Power Flow Problem

New Formulations of the Optimal Power Flow Problem New Formulations of the Optimal Power Flow Problem Prof. Daniel Kirschen The University of Manchester 2010 D. Kirschen and The University of Manchester 1 2010 D. Kirschen and The University of Manchester

More information

Dynamic Voltage Stability Enhancement of a Microgrid with Static and Dynamic Loads Using Microgrid Voltage Stabilizer

Dynamic Voltage Stability Enhancement of a Microgrid with Static and Dynamic Loads Using Microgrid Voltage Stabilizer Dynamic Voltage Stability Enhancement of a Microgrid with Static and Dynamic Loads Using Microgrid Voltage Stabilizer Kenan Hatipoglu 1, Ismail Fidan 2, Ghadir Radman 3 1 Electrical and Computer Engineering

More information

Controlling variability in power systems

Controlling variability in power systems Daniel APAM Nov 17 2017 A simple example: 100 100 A simple example: 100 100 Only one solution: 200 100 200 100 100 100 A simple example: 100 100 Only one solution: 200 100 200 100 100 100 But what if the

More information

Cascading Failures in Power Grids Analysis and Algorithms

Cascading Failures in Power Grids Analysis and Algorithms Columbia University, Electrical Engineering Technical Report #14-1-, January 14 Cascading Failures in Power Grids Analysis and Algorithms Saleh Soltan Electrical Engineering Columbia University New York,

More information

ECE 476. Exam #2. Tuesday, November 15, Minutes

ECE 476. Exam #2. Tuesday, November 15, Minutes Name: Answers ECE 476 Exam #2 Tuesday, November 15, 2016 75 Minutes Closed book, closed notes One new note sheet allowed, one old note sheet allowed 1. / 20 2. / 20 3. / 20 4. / 20 5. / 20 Total / 100

More information

Analysis of Failures in Power Grids

Analysis of Failures in Power Grids TO APPEAR IN IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 15 1 Analysis of Failures in Power Grids Saleh Soltan, Student Member, IEEE, Dorian Mazauric, and Gil Zussman, Senior Member, IEEE Abstract

More information

Module 6 : Preventive, Emergency and Restorative Control. Lecture 27 : Normal and Alert State in a Power System. Objectives

Module 6 : Preventive, Emergency and Restorative Control. Lecture 27 : Normal and Alert State in a Power System. Objectives Module 6 : Preventive, Emergency and Restorative Control Lecture 27 : Normal and Alert State in a Power System Objectives In this lecture you will learn the following Different states in a power system

More information

Quantifying Cyber Security for Networked Control Systems

Quantifying Cyber Security for Networked Control Systems Quantifying Cyber Security for Networked Control Systems Henrik Sandberg ACCESS Linnaeus Centre, KTH Royal Institute of Technology Joint work with: André Teixeira, György Dán, Karl H. Johansson (KTH) Kin

More information

DUE to their complexity and magnitude, modern infrastructure

DUE to their complexity and magnitude, modern infrastructure ACCEPTED TO IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING 1 REACT to Cyber Attacks on Power Grids Saleh Soltan, Member, IEEE, Mihalis Yannakakis, and Gil Zussman, Senior Member, IEEE Abstract Motivated

More information

B.E. / B.Tech. Degree Examination, April / May 2010 Sixth Semester. Electrical and Electronics Engineering. EE 1352 Power System Analysis

B.E. / B.Tech. Degree Examination, April / May 2010 Sixth Semester. Electrical and Electronics Engineering. EE 1352 Power System Analysis B.E. / B.Tech. Degree Examination, April / May 2010 Sixth Semester Electrical and Electronics Engineering EE 1352 Power System Analysis (Regulation 2008) Time: Three hours Answer all questions Part A (10

More information

URTDSM Initiative in India and Controlled Islanding using PMU Measurements

URTDSM Initiative in India and Controlled Islanding using PMU Measurements URTDSM Initiative in India and Controlled Islanding using PMU Measurements Akhil Raj Gopal Gajjar Meenal Chougule Narayanan Rajagopal Prashant Navalkar Rajeev Gajbhiye S. A. Soman PowerAnser Labs, IIT

More information

Robustness Analysis of Power Grid under False Data Attacks Against AC State Estimation

Robustness Analysis of Power Grid under False Data Attacks Against AC State Estimation Robustness Analysis of Power Grid under False Data Attacks Against AC State Estimation Presenter: Ming Jin INFORMS 2017 Ming Jin, Prof Javad Lavaei, and Prof Karl Johansson 1 Power system resilience against

More information

Generalized Injection Shift Factors and Application to Estimation of Power Flow Transients

Generalized Injection Shift Factors and Application to Estimation of Power Flow Transients Generalized Injection Shift Factors and Application to Estimation of Power Flow Transients Yu Christine Chen, Alejandro D. Domínguez-García, and Peter W. Sauer Department of Electrical and Computer Engineering

More information

CHAPTER 2 CAPACITANCE REQUIREMENTS OF SIX-PHASE SELF-EXCITED INDUCTION GENERATORS

CHAPTER 2 CAPACITANCE REQUIREMENTS OF SIX-PHASE SELF-EXCITED INDUCTION GENERATORS 9 CHAPTER 2 CAPACITANCE REQUIREMENTS OF SIX-PHASE SELF-EXCITED INDUCTION GENERATORS 2.. INTRODUCTION Rapidly depleting rate of conventional energy sources, has led the scientists to explore the possibility

More information

Optimal Capacitor placement in Distribution Systems with Distributed Generators for Voltage Profile improvement by Particle Swarm Optimization

Optimal Capacitor placement in Distribution Systems with Distributed Generators for Voltage Profile improvement by Particle Swarm Optimization Optimal Capacitor placement in Distribution Systems with Distributed Generators for Voltage Profile improvement by Particle Swarm Optimization G. Balakrishna 1, Dr. Ch. Sai Babu 2 1 Associate Professor,

More information

Sensitivity-Based Line Outage Angle Factors

Sensitivity-Based Line Outage Angle Factors Sensitivity-Based Line Outage Angle Factors Kai E. Van Horn, Alejandro D. Domínguez-García, and Peter W. Sauer Department of Electrical and Computer Engineering University of Illinois at Urbana-Champaign

More information

Daniel Bienstock and Abhinav Verma Columbia University New York. May 2008

Daniel Bienstock and Abhinav Verma Columbia University New York. May 2008 The N k Problem in Power Grids: New Models, Formulations and Computation 1 Daniel Bienstock and Abhinav Verma Columbia University New York May 2008 Abstract Given a power grid modeled by a network together

More information

SINGLE OBJECTIVE RISK- BASED TRANSMISSION EXPANSION

SINGLE OBJECTIVE RISK- BASED TRANSMISSION EXPANSION Vol.2, Issue.1, Jan-Feb 2012 pp-424-430 ISSN: 2249-6645 SINGLE OBJECTIVE RISK- BASED TRANSMISSION EXPANSION V.Sumadeepthi 1, K.Sarada 2 1 (Student, Department of Electrical and Electronics Engineering,

More information

The Impact of Distributed Generation on Power Transmission Grid Dynamics

The Impact of Distributed Generation on Power Transmission Grid Dynamics The Impact of Distributed Generation on Power Transmission Grid Dynamics D. E. Newman B. A. Carreras M. Kirchner I. Dobson Physics Dept. University of Alaska Fairbanks AK 99775 Depart. Fisica Universidad

More information

New criteria for Voltage Stability evaluation in interconnected power system

New criteria for Voltage Stability evaluation in interconnected power system New criteria for Stability evaluation in interconnected power system Lavanya Neerugattu Dr.G.S Raju MTech Student, Dept.Of EEE Former Director IT, BHU Email: nlr37@gmail.com Visiting Professor VNR Vignana

More information

Valid Inequalities for Optimal Transmission Switching

Valid Inequalities for Optimal Transmission Switching Valid Inequalities for Optimal Transmission Switching Hyemin Jeon Jeff Linderoth Jim Luedtke Dept. of ISyE UW-Madison Burak Kocuk Santanu Dey Andy Sun Dept. of ISyE Georgia Tech 19th Combinatorial Optimization

More information

Critical Points and Transitions in an Electric Power Transmission Model for Cascading Failure Blackouts

Critical Points and Transitions in an Electric Power Transmission Model for Cascading Failure Blackouts The submitted manuscript has been authored by a contractor of the U.S. Government under Contract No. DE-AC05-00OR22725. Accordingly, the U.S. Government retains a nonexclusive royalty-free license to publish

More information

ON THE PARAMETRIC LCP: A HISTORICAL PERSPECTIVE

ON THE PARAMETRIC LCP: A HISTORICAL PERSPECTIVE ON THE PARAMETRIC LCP: A HISTORICAL PERSPECTIVE Richard W. Cottle Department of Management Science and Engineering Stanford University ICCP 2014 Humboldt University Berlin August, 2014 1 / 55 The year

More information

SCHOOL OF ELECTRICAL, MECHANICAL AND MECHATRONIC SYSTEMS. Transient Stability LECTURE NOTES SPRING SEMESTER, 2008

SCHOOL OF ELECTRICAL, MECHANICAL AND MECHATRONIC SYSTEMS. Transient Stability LECTURE NOTES SPRING SEMESTER, 2008 SCHOOL OF ELECTRICAL, MECHANICAL AND MECHATRONIC SYSTEMS LECTURE NOTES Transient Stability SPRING SEMESTER, 008 October 7, 008 Transient Stability Transient stability refers to the ability of a synchronous

More information

False Data Injection Attacks Against Nonlinear State Estimation in Smart Power Grids

False Data Injection Attacks Against Nonlinear State Estimation in Smart Power Grids 1 False Data Injection Attacks Against Nonlinear State Estimation in Smart Power rids Md. Ashfaqur Rahman and Hamed Mohsenian-Rad Department of Electrical and Computer Engineering, Texas Tech University,

More information

Complexity analysis of second-order algorithms based on line search for smooth nonconvex optimization

Complexity analysis of second-order algorithms based on line search for smooth nonconvex optimization Complexity analysis of second-order algorithms based on line search for smooth nonconvex optimization Clément Royer - University of Wisconsin-Madison Joint work with Stephen J. Wright MOPTA, Bethlehem,

More information

arxiv: v1 [cs.sy] 15 Mar 2017

arxiv: v1 [cs.sy] 15 Mar 2017 Modeling and Identification of Worst-Case Cascading Failures in Power Systems arxiv:73232v [cssy] Mar 27 Chao Zhai, Hehong Zhang, Gaoxi Xiao and Tso-Chien Pan * March 6, 27 Abstract Cascading failures

More information

POWER flow studies are the cornerstone of power system

POWER flow studies are the cornerstone of power system University of Wisconsin-Madison Department of Electrical and Computer Engineering. Technical Report ECE-2-. A Sufficient Condition for Power Flow Insolvability with Applications to Voltage Stability Margins

More information

Research on the Effect of Substation Main Wiring on the Power System Reliability Yuxin Zhao 1, a, Tao Liu 2,b and Yanxin Shi 3,c

Research on the Effect of Substation Main Wiring on the Power System Reliability Yuxin Zhao 1, a, Tao Liu 2,b and Yanxin Shi 3,c International Power, Electronics and aterials Engineering Conference (IPEEC 2015) esearch on the Effect of ubstation ain Wiring on the Power ystem eliability Yuxin Zhao 1, a, Tao Liu 2,b and Yanxin hi

More information

Various Techniques for Nonlinear Energy-Related Optimizations. Javad Lavaei. Department of Electrical Engineering Columbia University

Various Techniques for Nonlinear Energy-Related Optimizations. Javad Lavaei. Department of Electrical Engineering Columbia University Various Techniques for Nonlinear Energy-Related Optimizations Javad Lavaei Department of Electrical Engineering Columbia University Acknowledgements Caltech: Steven Low, Somayeh Sojoudi Columbia University:

More information

A strongly polynomial algorithm for linear systems having a binary solution

A strongly polynomial algorithm for linear systems having a binary solution A strongly polynomial algorithm for linear systems having a binary solution Sergei Chubanov Institute of Information Systems at the University of Siegen, Germany e-mail: sergei.chubanov@uni-siegen.de 7th

More information

Comparison of Power Flow Algorithms for inclusion in On-line Power Systems Operation Tools

Comparison of Power Flow Algorithms for inclusion in On-line Power Systems Operation Tools University of New Orleans ScholarWorks@UNO University of New Orleans Theses and Dissertations Dissertations and Theses 12-17-2010 Comparison of Power Flow Algorithms for inclusion in On-line Power Systems

More information

KINGS COLLEGE OF ENGINEERING Punalkulam

KINGS COLLEGE OF ENGINEERING Punalkulam KINGS COLLEGE OF ENGINEERING Punalkulam 613 303 DEPARTMENT OF ELECTRICAL AND ELECTRONICS ENGINEERING POWER SYSTEM ANALYSIS QUESTION BANK UNIT I THE POWER SYSTEM AN OVERVIEW AND MODELLING PART A (TWO MARK

More information

Preliminaries Overview OPF and Extensions. Convex Optimization. Lecture 8 - Applications in Smart Grids. Instructor: Yuanzhang Xiao

Preliminaries Overview OPF and Extensions. Convex Optimization. Lecture 8 - Applications in Smart Grids. Instructor: Yuanzhang Xiao Convex Optimization Lecture 8 - Applications in Smart Grids Instructor: Yuanzhang Xiao University of Hawaii at Manoa Fall 2017 1 / 32 Today s Lecture 1 Generalized Inequalities and Semidefinite Programming

More information

COMPARISON OF STATISTICAL ALGORITHMS FOR POWER SYSTEM LINE OUTAGE DETECTION

COMPARISON OF STATISTICAL ALGORITHMS FOR POWER SYSTEM LINE OUTAGE DETECTION COMPARISON OF STATISTICAL ALGORITHMS FOR POWER SYSTEM LINE OUTAGE DETECTION Georgios Rovatsos*, Xichen Jiang*, Alejandro D. Domínguez-García, and Venugopal V. Veeravalli Department of Electrical and Computer

More information

CHAPTER 2 LOAD FLOW ANALYSIS FOR RADIAL DISTRIBUTION SYSTEM

CHAPTER 2 LOAD FLOW ANALYSIS FOR RADIAL DISTRIBUTION SYSTEM 16 CHAPTER 2 LOAD FLOW ANALYSIS FOR RADIAL DISTRIBUTION SYSTEM 2.1 INTRODUCTION Load flow analysis of power system network is used to determine the steady state solution for a given set of bus loading

More information

IPAM Summer School Optimization methods for machine learning. Jorge Nocedal

IPAM Summer School Optimization methods for machine learning. Jorge Nocedal IPAM Summer School 2012 Tutorial on Optimization methods for machine learning Jorge Nocedal Northwestern University Overview 1. We discuss some characteristics of optimization problems arising in deep

More information

Nonlinear Security Constrained Optimal Power Flow for Combined AC and HVDC Grids

Nonlinear Security Constrained Optimal Power Flow for Combined AC and HVDC Grids power systems eehlaboratory Vasileios Saplamidis Nonlinear Security Constrained Optimal Power Flow for Combined AC and HVDC Grids Master Thesis PSL 1417 EEH Power Systems Laboratory ETH Zurich Supervisor:

More information

Chapter 2. Planning Criteria. Turaj Amraee. Fall 2012 K.N.Toosi University of Technology

Chapter 2. Planning Criteria. Turaj Amraee. Fall 2012 K.N.Toosi University of Technology Chapter 2 Planning Criteria By Turaj Amraee Fall 2012 K.N.Toosi University of Technology Outline 1- Introduction 2- System Adequacy and Security 3- Planning Purposes 4- Planning Standards 5- Reliability

More information

Power Grid Partitioning: Static and Dynamic Approaches

Power Grid Partitioning: Static and Dynamic Approaches Power Grid Partitioning: Static and Dynamic Approaches Miao Zhang, Zhixin Miao, Lingling Fan Department of Electrical Engineering University of South Florida Tampa FL 3320 miaozhang@mail.usf.edu zmiao,

More information

Congestion Alleviation using Reactive Power Compensation in Radial Distribution Systems

Congestion Alleviation using Reactive Power Compensation in Radial Distribution Systems IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 11, Issue 6 Ver. III (Nov. Dec. 2016), PP 39-45 www.iosrjournals.org Congestion Alleviation

More information

Randomized Sorting Algorithms Quick sort can be converted to a randomized algorithm by picking the pivot element randomly. In this case we can show th

Randomized Sorting Algorithms Quick sort can be converted to a randomized algorithm by picking the pivot element randomly. In this case we can show th CSE 3500 Algorithms and Complexity Fall 2016 Lecture 10: September 29, 2016 Quick sort: Average Run Time In the last lecture we started analyzing the expected run time of quick sort. Let X = k 1, k 2,...,

More information

Performance analysis and comparison of load flow methods in a practical distribution system

Performance analysis and comparison of load flow methods in a practical distribution system Performance analysis and comparison of load flow methods in a practical distribution system B.Muruganantham Dept. of Electrical and Electronics Engineering Pondicherry Engineering College Puducherry -

More information

UNIT-I ECONOMIC OPERATION OF POWER SYSTEM-1

UNIT-I ECONOMIC OPERATION OF POWER SYSTEM-1 UNIT-I ECONOMIC OPERATION OF POWER SYSTEM-1 1.1 HEAT RATE CURVE: The heat rate characteristics obtained from the plot of the net heat rate in Btu/Wh or cal/wh versus power output in W is shown in fig.1

More information

1 Strict local optimality in unconstrained optimization

1 Strict local optimality in unconstrained optimization ORF 53 Lecture 14 Spring 016, Princeton University Instructor: A.A. Ahmadi Scribe: G. Hall Thursday, April 14, 016 When in doubt on the accuracy of these notes, please cross check with the instructor s

More information

Power System Analysis Prof. A. K. Sinha Department of Electrical Engineering Indian Institute of Technology, Kharagpur

Power System Analysis Prof. A. K. Sinha Department of Electrical Engineering Indian Institute of Technology, Kharagpur Power System Analysis Prof. A. K. Sinha Department of Electrical Engineering Indian Institute of Technology, Kharagpur Lecture - 9 Transmission Line Steady State Operation Welcome to lesson 9, in Power

More information

Lecture 23 Branch-and-Bound Algorithm. November 3, 2009

Lecture 23 Branch-and-Bound Algorithm. November 3, 2009 Branch-and-Bound Algorithm November 3, 2009 Outline Lecture 23 Modeling aspect: Either-Or requirement Special ILPs: Totally unimodular matrices Branch-and-Bound Algorithm Underlying idea Terminology Formal

More information

Stochastic Decision Diagrams

Stochastic Decision Diagrams Stochastic Decision Diagrams John Hooker CORS/INFORMS Montréal June 2015 Objective Relaxed decision diagrams provide an generalpurpose method for discrete optimization. When the problem has a dynamic programming

More information

UNIVERSIDAD DE CASTILLA-LA MANCHA

UNIVERSIDAD DE CASTILLA-LA MANCHA UNIVERSIDAD DE CASTILLA-LA MANCHA DEPARTAMENTO DE INGENIERÍA ELÉCTRICA, ELECTRÓNICA, AUTOMÁTICA Y COMUNICACIONES OPTIMAL POWER FLOW WITH STABILITY CONSTRAINTS TESIS DOCTORAL AUTOR: RAFAEL ZÁRATE MIÑANO

More information

An Equivalent Circuit Formulation of the Power Flow Problem with Current and Voltage State Variables

An Equivalent Circuit Formulation of the Power Flow Problem with Current and Voltage State Variables An Equivalent Circuit Formulation of the Power Flow Problem with Current and Voltage State Variables David M. Bromberg, Marko Jereminov, Xin Li, Gabriela Hug, Larry Pileggi Dept. of Electrical and Computer

More information

Branch Outage Simulation for Contingency Studies

Branch Outage Simulation for Contingency Studies Branch Outage Simulation for Contingency Studies Dr.Aydogan OZDEMIR, Visiting Associate Professor Department of Electrical Engineering, exas A&M University, College Station X 77843 el : (979) 862 88 97,

More information

Development of an algorithm for solving mixed integer and nonconvex problems arising in electrical supply networks

Development of an algorithm for solving mixed integer and nonconvex problems arising in electrical supply networks Development of an algorithm for solving mixed integer and nonconvex problems arising in electrical supply networks E. Wanufelle 1 S. Leyffer 2 A. Sartenaer 1 Ph. Toint 1 1 FUNDP, University of Namur 2

More information

POWER system operations increasingly rely on the AC

POWER system operations increasingly rely on the AC i Convex Relaxations and Approximations of Chance-Constrained AC-OF roblems Lejla Halilbašić, Student Member, IEEE, ierre inson, Senior Member, IEEE, and Spyros Chatzivasileiadis, Senior Member, IEEE arxiv:1804.05754v3

More information

Natural Evolution Strategies for Direct Search

Natural Evolution Strategies for Direct Search Tobias Glasmachers Natural Evolution Strategies for Direct Search 1 Natural Evolution Strategies for Direct Search PGMO-COPI 2014 Recent Advances on Continuous Randomized black-box optimization Thursday

More information

MS&E338 Reinforcement Learning Lecture 1 - April 2, Introduction

MS&E338 Reinforcement Learning Lecture 1 - April 2, Introduction MS&E338 Reinforcement Learning Lecture 1 - April 2, 2018 Introduction Lecturer: Ben Van Roy Scribe: Gabriel Maher 1 Reinforcement Learning Introduction In reinforcement learning (RL) we consider an agent

More information

Ph 219b/CS 219b. Exercises Due: Wednesday 4 December 2013

Ph 219b/CS 219b. Exercises Due: Wednesday 4 December 2013 1 Ph 219b/CS 219b Exercises Due: Wednesday 4 December 2013 4.1 The peak in the Fourier transform In the period finding algorithm we prepared the periodic state A 1 1 x 0 + jr, (1) A j=0 where A is the

More information

Convex Relaxations of AC Optimal Power Flow under Uncertainty

Convex Relaxations of AC Optimal Power Flow under Uncertainty Convex Relaxations of AC Optimal Power Flow under Uncertainty Andreas Venzke, PhD student Center for Electric Power and Energy Technical University of Denmark (DTU) PhD advisors: Spyros Chatzivasileiadis

More information

3.10 Lagrangian relaxation

3.10 Lagrangian relaxation 3.10 Lagrangian relaxation Consider a generic ILP problem min {c t x : Ax b, Dx d, x Z n } with integer coefficients. Suppose Dx d are the complicating constraints. Often the linear relaxation and the

More information

Applied Optimization: Formulation and Algorithms for Engineering Systems Slides

Applied Optimization: Formulation and Algorithms for Engineering Systems Slides Applied Optimization: Formulation and Algorithms for Engineering Systems Slides Ross Baldick Department of Electrical and Computer Engineering The University of Texas at Austin Austin, TX 78712 Copyright

More information

APPLICATIONS OF SENSITIVITY ANALYSIS IN PLANNING AND OPERATION OF MODERN POWER SYSTEMS. Mohammed Ben-Idris

APPLICATIONS OF SENSITIVITY ANALYSIS IN PLANNING AND OPERATION OF MODERN POWER SYSTEMS. Mohammed Ben-Idris APPLICATIONS OF SENSITIVITY ANALYSIS IN PLANNING AND OPERATION OF MODERN POWER SYSTEMS By Mohammed Ben-Idris A DISSERTATION Submitted to Michigan State University in partial fulfillment of the requirements

More information

Evaluating the Impact of Modeling Assumptions for Cascading Failure Simulation

Evaluating the Impact of Modeling Assumptions for Cascading Failure Simulation 1 Evaluating the Impact of Modeling Assumptions for Cascading Failure Simulation Ronan Fitzmaurice, Member, IEEE, Eduardo Cotilla-Sanchez, Graduate Student Member, IEEE, and Paul Hines, Member, IEEE Abstract

More information

ECEN 615 Methods of Electric Power Systems Analysis Lecture 18: Least Squares, State Estimation

ECEN 615 Methods of Electric Power Systems Analysis Lecture 18: Least Squares, State Estimation ECEN 615 Methods of Electric Power Systems Analysis Lecture 18: Least Squares, State Estimation Prof. om Overbye Dept. of Electrical and Computer Engineering exas A&M University overbye@tamu.edu Announcements

More information

An Improved Method for Determining Voltage Collapse Proximity of Radial Distribution Networks

An Improved Method for Determining Voltage Collapse Proximity of Radial Distribution Networks An Improved Method for Determining Voltage Collapse Proximity of Radial Distribution Networks A. AUGUGLIARO, L. DUSONCHET, S. FAVUA, S. MANGIONE Dept. of Electrical, Electronic and Telecommunication Engineering

More information

LINE FLOW ANALYSIS OF IEEE BUS SYSTEM WITH THE LOAD SENSITIVITY FACTOR

LINE FLOW ANALYSIS OF IEEE BUS SYSTEM WITH THE LOAD SENSITIVITY FACTOR LINE FLOW ANALYSIS OF IEEE BUS SYSTEM WITH THE LOAD SENSITIVITY FACTOR Puneet Sharma 1, Jyotsna Mehra 2, Virendra Kumar 3 1,2,3 M.Tech Research scholar, Galgotias University, Greater Noida, India Abstract

More information

Network Flows. 6. Lagrangian Relaxation. Programming. Fall 2010 Instructor: Dr. Masoud Yaghini

Network Flows. 6. Lagrangian Relaxation. Programming. Fall 2010 Instructor: Dr. Masoud Yaghini In the name of God Network Flows 6. Lagrangian Relaxation 6.3 Lagrangian Relaxation and Integer Programming Fall 2010 Instructor: Dr. Masoud Yaghini Integer Programming Outline Branch-and-Bound Technique

More information

Managing Uncertainty and Security in Power System Operations: Chance-Constrained Optimal Power Flow

Managing Uncertainty and Security in Power System Operations: Chance-Constrained Optimal Power Flow Managing Uncertainty and Security in Power System Operations: Chance-Constrained Optimal Power Flow Line Roald, November 4 th 2016 Line Roald 09.11.2016 1 Outline Introduction Chance-Constrained Optimal

More information