• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 4
  • Tagged with
  • 8
  • 8
  • 8
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

A Profit-Neutral Double-price-signal Retail Electricity Market Solution for Incentivizing Price-responsive DERs Considering Network Constraints

Cai, Mengmeng 23 June 2020 (has links)
Emerging technologies, including distributed energy resources (DERs), internet-of-things and advanced distribution management systems, are revolutionizing the power industry. They provide benefits like higher operation flexibility and lower bulk grid dependency, and are moving the modern power grid towards a decentralized, interconnected and intelligent direction. Consequently, the emphasis of the system operation management has been shifted from the supply-side to the demand-side. It calls for a reconsideration of the business model for future retail market operators. To address this need, this dissertation proposes an innovative retail market solution tailored to market environments penetrated with price-responsive DERs. The work is presented from aspects of theoretical study, test-bed platform development, and experimental analysis, within which two topics relevant to the retail market operation are investigated in depth. The first topic covers the modeling of key retail market participants. With regard to price-insensitive participants, fixed loads are treated as the representative. Deep learning-based day-ahead load forecasting models are developed in this study, utilizing both recurrent and convolutional neural networks, to predict the part of demands that keep fixed regardless of the market price. With regard to price-sensitive participants, battery storages are selected as the representative. An optimization-based battery arbitrage model is developed in this study to represent their price-responsive behaviors in response to a dynamic price. The second topic further investigates how the retail market model and pricing strategy should be designed to incentivize these market participants. Different from existing works, this study innovatively proposes a profit-neutral double-price-signal retail market model. Such a design differentiates elastic prosumers, who actively offer flexibilities to the system operation, from normal inelastic consumers/generators, based on their sensitivities to the market price. Two price signals, namely retail grid service price and retail energy price, are then introduced to separately quantify values of the flexibility, provided by elastic participants, and the electricity commodity, sold/bought to/from inelastic participants. Within the proposed retail market, a non-profit retail market operator (RMO) manages and settles the market through determining the price signals and supplementary subsidy to minimize the overall system cost. In response to the announced retail grid service price, elastic prosumers adjust their day-ahead operating schedules to maximize their payoffs. Given the interdependency between decisions made by the RMO and elastic participants, a retail pricing scheme, formulated based on a bi-level optimization framework, is proposed. Additional efforts are made on merging and linearizing the original non-convex bi-level problem into a single-level mixed-integer linear programming problem to ensure the computational efficiency of the retail pricing tool. Case studies are conducted on a modified IEEE 34-bus test-bed system, simulating both physical operations of the power grid and financial interactions inside the retail market. Experimental results demonstrate promising properties of the proposed retail market solution: First of all, it is able to provide cost-saving benefits to inelastic customers and create revenues for elastic customers at the same time, justifying the rationalities of these participants to join the market. Second of all, the addition of the grid service subsidy not only strengthens the profitability of the elastic customer, but also ensures that the benefit enjoyed per customer will not be compromised by the competition brought up by a growing number of participants. Furthermore, it is able to properly capture impacts from line losses and voltage constraints on the system efficiency and stability, so as to derive practical pricing solutions that respect the system operating rules. Last but not least, it encourages the technology improvement of elastic assets as elastic assets in better conditions are more profitable and could better save the electricity bills for inelastic customers. Above all, the superiority of the proposed retail market solution is proven. It can serve as a promising start for the retail electricity market reconstruction. / Doctor of Philosophy / The electricity market plays a critical role in ensuring the economic and secure operation of the power system. The progress made by distributed energy resources (DERs) has reshaped the modern power industry bringing a larger proportion of price-responsive behaviors to the demand-side. It challenges the traditional wholesale-only electricity market and calls for an addition of retail markets to better utilize distributed and elastic assets. Therefore, this dissertation targets at offering a reliable and computational affordable retail market solution to bridge this knowledge gap. Different from existing works, this study assumes that the retail market is managed by a profit-neutral retail market operator (RMO), who oversees and facilitates the system operation for maximizing the system efficiency rather than making profits. Market participants are categorized into two groups: inelastic participants and elastic participants, based on their sensitivity to the market price. The motivation behind this design is that instead of treating elastic participants as normal customers, it is more reasonable to treat them as grid service providers who offer operational flexibilities that benefit the system efficiency. Correspondingly, a double-signal pricing scheme is proposed, such that the flexibility, provided by elastic participants, and the electricity commodity, generated/consumed by inelastic participants, are separately valued by two distinct prices, namely retail grid service price and retail energy price. A grid service subsidy is also introduced in the pricing system to provide supplementary incentives to elastic customers. These two price signals in addition to the subsidy are determined by the RMO via solving a bi-level optimization problem given the interdependency between the prices and reaction of elastic participants. Experimental results indicate that the proposed retail market model and pricing scheme are beneficial for both types of market participants, practical for the network-constrained real-world implementation, and supportive for the technology improvement of elastic assets.
2

Designing Urban Road Congestion Charging Systems : Models and Heuristic Solution Approaches

Ekström, Joakim January 2008 (has links)
The question of how to design a congestion pricing scheme is difficult to answer and involves a number of complex decisions. This thesis is devoted to the quantitative parts of designing a congestion pricing scheme with link tolls in an urban car traffic network. The problem involves finding the number of tolled links, the link toll locations and their corresponding toll level. The road users are modeled in a static framework, with elastic travel demand. Assuming the toll locations to be fixed, we recognize a level setting problem as to find toll levels which maximize the social surplus. A heuristic procedure based on sensitivity analysis is developed to solve this optimization problem. In the numerical examples the heuristic is shown to converge towards the optimum for cases when all links are tollable, and when only some links are tollable. We formulate a combined toll location and level setting problem as to find both toll locations and toll levels which maximize the net social surplus, which is the social surplus minus the cost of collecting the tolls. The collection cost is assumed to be given for each possible toll location, and to be independent of toll level and traffic flow. We develop a new heuristic method which is based on repeated solutions of an approximation to the combined toll location and level setting problem. Also, a known heuristic method for locating a fixed number of toll facilities is extended, to find the optimal number of facilities to locate. Both heuristics are evaluated on two small networks, where our approximation procedure shows the best results. Our approximation procedure is also employed on the Sioux Falls network. The result is compared with different judgmental closed cordon structures, and the solution suggested by our method clearly improves the net social surplus more than any of the judgmental cordons.
3

Designing Urban Road Congestion Charging Systems : Models and Heuristic Solution Approaches

Ekström, Joakim January 2008 (has links)
<p>The question of how to design a congestion pricing scheme is difficult to answer and involves a number of complex decisions. This thesis is devoted to the quantitative parts of designing a congestion pricing scheme with link tolls in an urban car traffic network. The problem involves finding the number of tolled links, the link toll locations and their corresponding toll level. The road users are modeled in a static framework, with elastic travel demand.</p><p>Assuming the toll locations to be fixed, we recognize a level setting problem as to find toll levels which maximize the social surplus. A heuristic procedure based on sensitivity analysis is developed to solve this optimization problem. In the numerical examples the heuristic is shown to converge towards the optimum for cases when all links are tollable, and when only some links are tollable.</p><p>We formulate a combined toll location and level setting problem as to find both toll locations and toll levels which maximize the net social surplus, which is the social surplus minus the cost of collecting the tolls. The collection cost is assumed to be given for each possible toll location, and to be independent of toll level and traffic flow. We develop a new heuristic method which is based on repeated solutions of an approximation to the combined toll location and level setting problem. Also, a known heuristic method for locating a fixed number of toll facilities is extended, to find the optimal number of facilities to locate. Both heuristics are evaluated on two small networks, where our approximation procedure shows the best results.</p><p>Our approximation procedure is also employed on the Sioux Falls network. The result is compared with different judgmental closed cordon structures, and the solution suggested by our method clearly improves the net social surplus more than any of the judgmental cordons.</p>
4

Vulnerability Analysis of False Data Injection Attacks on Supervisory Control and Data Acquisition and Phasor Measurement Units

January 2017 (has links)
abstract: The electric power system is monitored via an extensive network of sensors in tandem with data processing algorithms, i.e., an intelligent cyber layer, that enables continual observation and control of the physical system to ensure reliable operations. This data collection and processing system is vulnerable to cyber-attacks that impact the system operation status and lead to serious physical consequences, including systematic problems and failures. This dissertation studies the physical consequences of unobservable false data injection (FDI) attacks wherein the attacker maliciously changes supervisory control and data acquisition (SCADA) or phasor measurement unit (PMU) measurements, on the electric power system. In this context, the dissertation is divided into three parts, in which the first two parts focus on FDI attacks on SCADA and the last part focuses on FDI attacks on PMUs. The first part studies the physical consequences of FDI attacks on SCADA measurements designed with limited system information. The attacker is assumed to have perfect knowledge inside a sub-network of the entire system. Two classes of attacks with different assumptions on the attacker's knowledge outside of the sub-network are introduced. In particular, for the second class of attacks, the attacker is assumed to have no information outside of the attack sub-network, but can perform multiple linear regression to learn the relationship between the external network and the attack sub-network with historical data. To determine the worst possible consequences of both classes of attacks, a bi-level optimization problem wherein the first level models the attacker's goal and the second level models the system response is introduced. The second part of the dissertation concentrates on analyzing the vulnerability of systems to FDI attacks from the perspective of the system. To this end, an off-line vulnerability analysis framework is proposed to identify the subsets of the test system that are more prone to FDI attacks. The third part studies the vulnerability of PMUs to FDI attacks. Two classes of more sophisticated FDI attacks that capture the temporal correlation of PMU data are introduced. Such attacks are designed with a convex optimization problem and can always bypass both the bad data detector and the low-rank decomposition (LD) detector. / Dissertation/Thesis / Doctoral Dissertation Electrical Engineering 2017
5

Optimizing a biomass supply system: consideration of pellet quality and transportation under extreme events

Aladwan, Badr S 06 August 2021 (has links)
This dissertation studies a framework in support biomass wood pellet supply chain. The worldwide wood pellet market is growing at a phenomenal rate. However, the economic sustainment of this business depends on how well the producers manage the uncertainty associated with biomass yield and quality. In the first part of the dissertation, we propose a two-stage stochastic programming model that optimizes different critical decisions (e.g., harvesting, storage, transportation, quality inspection, and production decisions) of a biomass-to-pellet supply system under biomass yield and quality uncertainty to economically produce pellets while accounting for the different pellet standards set forward by the U.S. and European markets. The study develops a hybrid algorithm that combines Sample Average Approximation with an enhanced Progressive Hedging algorithm. We propose two parallelization schemes to efficiently speed up the convergence of the overall algorithm. We use Mississippi as a testing ground to visualize and validate the algorithms performance. Experimental results indicate that the biomass-to-pellet supply system is sensitive to the biomass quality parameters (e.g., ash and moisture contents). In the second part of the dissertation, we propose a bi-level mixed-integer linear programming model that captures important features such as the hurricane’s degree, quality of damaged timbers, price-related issues, optimizes different critical decisions (e.g., purchasing, storage, and transportation decisions) of a post-hurricane damaged timber management problem. Lack of efficient tools to manage the wood market interactions in the post-hurricane situation increases timber salvage loss drastically. The overall goal is to provide an efficient decision-making tool for planning and recovering damaged timber to maximize its monetary value and mitigate its negative ecological impacts. Due to the complexity associated with solving the proposed model, we developed two exact solution methods, namely, the enhanced Benders decomposition and the Benders-based branch-and-cut algorithms, to efficiently solve the model in a reasonable time-frame. We use 15 coastal counties in southeast Mississippi to visualize and validate the algorithms' performance. Key managerial insights are drawn on the sensitivity of a number of critical parameters, such as selling/purchasing prices offered by the landowners/mills, quality-level, and deterioration rate of the damaged timbers on their economic recovery following a natural catastrophe.
6

A Coordinated Voltage Management Method Utilizing Battery Energy Storage Systems and Smart PV Inverters in Distribution Networks with High PV and Wind Penetrations

Alrashidi, Musaed Owehan 16 August 2021 (has links)
Electrical distribution networks face many operational challenges as various renewable distributed generation (DG), such as solar photovoltaic (PV) systems and wind, become part of their structure. Unlike conventional distribution systems, where the only unpredictable aspect is the load level, the intermittent nature of DG poses additional uncertainty levels for distribution system operators (DSO). The voltage quality problem considers the most restrictive issue that hinders high DG integration into distribution grids. Voltage deviates from the nominal grid voltage limits due to the excess power from the DG. DSOs are accustomed to improving the voltage profile by optimal adjustments of the on-load tap changers, voltage regulator taps and capacitor banks. Nevertheless, due to the frequent variability of the output energy from DG, these devices may fail in doing the needful. Battery energy storage systems (BESS) and smart PV inverter functionalities are regarded as promising solutions to promote the seamless integration of renewable resources into distribution networks. BESS are utilized to store the surplus energy during the high penetration of renewable DG that causes high voltage levels and discharge the stored energy when the distribution grid is heavily loaded, which leads to the low voltage levels. Smart PV inverters regulate the network voltage by controlling the reactive power injection or absorption at the inverter end. This dissertation proposes a management strategy that coordinates BESS and smart PV inverter reactive power capability to improve voltage quality in the distribution systems with high PV and wind penetrations. The proposed management method is based on a bi-level optimization algorithm consisting of upper and lower optimization levels. The proposed method determines the optimal location, capacity, numbers and BESS charging and discharging rates to support the distribution system voltage and to ensure optimal deployment of BESS. Case studies are conducted to evaluate the proposed voltage control method. The large size PV system and wind turbine impacts are studied and simulated on the modified IEEE-34 bus test feeder. In addition, the proposed method is applied to the modified IEEE low voltage test feeder to investigate the effectiveness of installing residential rooftop PV systems on the distribution system's voltage. Experimental results show promising outcomes of the proposed method in controlling the distribution networks' voltage. In addition, a day-ahead forecast of PV power output is developed in this dissertation to assist the DSOs to accurately predict the future amounts of PV energy available and reinforcing the decision-making process of batteries operation. Hybrid forecasting models are proposed based on machine learning algorithms, which utilize support vector regression and backpropagation neural network, optimized with three metaheuristic optimization algorithms, namely Social Spider Optimization (SSO), Particle Swarm Optimization (PSO) and Cuckoo Search Optimization (CSO). These algorithms are used to improve the predictive efficacy of the selected algorithms, where the optimal selection of their hyperparameters and architectures plays a significant role in yielding precise forecasting outcomes. / Doctor of Philosophy / The need for more renewable energy has grown significantly, and many countries are embracing these technologies. However, the integration of distributed generation (DG), such as PV systems and wind turbines, poses several operational problems to the distribution system. The voltage problem represents the most significant issue that needs to be addressed. The traditional voltage control equipment may not cope with the rapid fluctuation and may impact their service life. The continuous developments in the battery energy storage systems (BESS) and the smart PV inverter technologies result in increasing the hosting capacity of DG. BESS can store the excess power from the distributed generators and supply this energy to the grid for different operational objectives. On the other hand, the advanced PV inverter's reactive power capability can be exploited from which the grid can attain many benefits. This dissertation aims at providing a reliable control method to the voltage profile in distribution networks embedded with high PV and wind energy by optimal coordination between the operation of the BESS and the smart PV inverter. In addition, the solar forecasting can mitigate the uncertainty associated with PV system generation. In this dissertation, the PV power forecasting application is applied in the distribution system to control the voltage. Through utilizing PV power forecasting, the decision-making for battery operation can be upheld and reinforced. The BESS can store the surplus energy from the PV system as needed and supply it back in low PV power incidents. Experimental results indicate that proper coordination between the BESS and smart PV inverter is beneficial for distribution system operation that can seamlessly integrate PV and wind energy.
7

A Multi-Agent Defense Methodology with Machine Learning against Cyberattacks on Distribution Systems

Appiah-Kubi, Jennifer 17 August 2022 (has links)
The introduction of communication technology into the electric power grid has made the grid more reliable. Power system operators gain visibility over the power system and are able to resolve operational issues remotely via Supervisory Control And Data Acquisition (SCADA) technology. This reduces outage periods. Nonetheless, the remote-control capability has rendered the power grid vulnerable to cyberattacks. In December 2015, over 200,000 people in Ukraine became victims of the first publicly reported cyberattack on the power grid. Consequently, cyber-physical security research for the power system as a critical infrastructure is in critical need. Research on cybersecurity for power grids has produced a diverse literature; the multi-faceted nature of the grid makes it vulnerable to different types of cyberattacks, such as direct power grid, supply chain and ransom attacks. The attacks may also target different levels of grid operation, such as the transmission system, distribution system, microgrids, and generation. As these levels are characterized by varying operational constraints, the literature may be categorized not only according to the type of attack it targets, but also according to the level of power system operation under consideration. It is noteworthy that cybersecurity research for the transmission system dominates the literature, although the distribution system is noted to have a larger attack surface. For the distribution system, a notable attack type is the so-called direct switching attack, in which an attacker aims to disrupt power supply by compromising switching devices that connect equipment such as generators, and power grid lines. To maximize the damage, this attack tends to be coordinated as the attacker optimally selects the nodes and switches to attack. This decision-making process is often a bi- or tri-level optimization problem which models the interaction between the attacker and the power system defender. It is necessary to detect attacks and establish coordination/correlation among them. Determining coordination is a necessary step to predict the targets of an attack before attack completion, and aids in the mitigation strategy that ensues. While the literature has addressed the direct switching attack on the distribution system in different ways, there are also shortcomings. These include: (i) techniques to establish coordination among attacks are centralized, making them prone to single-point failures; (ii) techniques to establish coordination among attacks leverage only power system models, ignoring the influence of communication network vulnerabilities and load criticality in the decisions of the attacker; (iii) attacker-defender optimization models assume specific knowledge of the attacker resources and constraints by the defender, a strong unrealistic assumption that reduces their usability; (iv) and, mitigation strategies tend to be static and one-sided, being implemented only at the physical level, or at the communication network level. In light of this, this dissertation culminates in major contributions concerning real-time decentralized correlation of detected direct switching attacks and hybrid mitigation for electric power distribution systems. Concerning this, four novel contributions are presented: (i) a framework for decentralized correlation of attacks and mitigation; (ii) an attacker-defender optimization model that accounts for power system laws, load criticality, and cyber vulnerabilities in the decision-making process of the attacker; (iii) a real-time learning-based mechanism for determining correlation among detected attacks and predicting attack targets, and which does not assume knowledge of the attacker's resources and constraints by the power system defender; (iv) a hybrid mitigation strategy optimized in real-time based on information learned from detected attacks, and which combines both physical level and communication network level mitigation. Since the execution of intrusion detection systems and mechanisms such as the ones proposed in this dissertation may deter attackers from directly attacking the power grid, attackers may perform a supply chain cyberattack to yield the same results. Although, supply chain cyberattacks have been acknowledged as potentially far-reaching, and compliance directives put forward for this, the detection of supply chain cyberattacks is in a nascent stage. Consequently, this dissertation also proposes a novel method for detecting supply chain cyberattacks. To the best of the knowledge of the author, this work is the first preliminary work on supply chain cyberattack detection. / Doctor of Philosophy / The electric power grid is the network that transports electricity from generation to consumers, such as homes and factories. The power grid today is highly remote-monitored and controlled. Should there be a fault on the grid, the human operator, often remotely located, may only need to resolve it by sending a control signal to telemetry points, called nodes, via a communication network. This significantly reduces outage periods and improves the reliability of the grid. Nonetheless, the high level connectivity also exposes the grid to cyberattacks. The cyber connectivity between the power grid and the human operator, like all communication networks, is vulnerable to cyberattacks that may allow attackers to gain control of the power grid. If and when successful, wide-spread and extended outages, equipment damage, etc. may ensue. Indeed, in December 2015, over 200,000 people in Ukraine became victims to the first publicly reported cyberattack on a power grid. As a critical infrastructure, cybersecurity for the power grid is, therefore, in critical need. Research on cybersecurity for power grids has produced a diverse literature; the multi-faceted nature of the grid makes it vulnerable to different types of cyberattacks, such as direct power grid, supply chain and ransom attacks. Notable is the so-called direct switching attack, in which an attacker aims to compromise the power grid communication network in order to toggle switches that connect equipment such as generators, and power grid lines. The aim is to disrupt electricity service. To maximize the damage, this attack tends to be coordinated; the attacker optimally selects several grid elements to attack. Thus, it is necessary to both detect attacks and establish coordination among them. Determining coordination is a necessary step to predict the targets of an attack before attack completion. This aids the power grid owner to intercept and mitigate attacks. While the literature has addressed the direct switching attack in different ways, there are also shortcomings. Three outstanding ones are: (i) techniques to determine coordination among attacks and predict attack targets are centralized, making them prone to single-point failures; (ii) techniques to establish coordination among attacks leverage only power system physical laws, ignoring the influence of communication network vulnerabilities in the decisions of the attacker; (iii) and, studies on the interaction between the attacker and the defender (i.e., power grid owner) assume specific knowledge of the attacker resources and constraints by the defender, a strong unrealistic assumption that reduces their usability. This research project addresses several of the shortcomings in the literature, particularly the aforementioned. The work focuses on the electric distribution system, which is the power grid that connects directly to consumers. Indeed, this choice is ideal, as the distribution system has a larger attack surface than other parts of the grid and is characterized by computing devices with more constrained computational capability. Thus, adaptability to simple computing devices is a priority. The contributions of this dissertation provide leverage to the power grid owner to intercept and mitigate attacks in a resilient manner. The original contributions of the work are: (i) a novel realistic model that shows the decision making process of the attacker and their interactions with the defender; (ii) a novel decentralized mechanism for predicting the targets of coordinated cyberattacks on the electric distribution grid in real-time and which is guided by the attack model, (iii) and a novel hybrid optimized mitigation strategy that provides security to the power grid at both the communication network level and the physical power grid level. Since the power grid is constructed with smart equipment from various vendors, attackers may launch effective attacks by compromising the devices deployed in the power grid through a compromised supply chain. By nature, such an attack is evasive to traditional intrusion detection systems and algorithms such as the aforementioned. Therefore, this work also provides a new method to defend the grid against supply chain attacks, resulting in a mechanism for its detection in a critical power system communication device.
8

GAME-THEORETIC MODELING OF MULTI-AGENT SYSTEMS: APPLICATIONS IN SYSTEMS ENGINEERING AND ACQUISITION PROCESSES

Salar Safarkhani (9165011) 24 July 2020 (has links)
<div><div><div><p>The process of acquiring the large-scale complex systems is usually characterized with cost and schedule overruns. To investigate the causes of this problem, we may view the acquisition of a complex system in several different time scales. At finer time scales, one may study different stages of the acquisition process from the intricate details of the entire systems engineering process to communication between design teams to how individual designers solve problems. At the largest time scale one may consider the acquisition process as series of actions which are, request for bids, bidding and auctioning, contracting, and finally building and deploying the system, without resolving the fine details that occur within each step. In this work, we study the acquisition processes in multiple scales. First, we develop a game-theoretic model for engineering of the systems in the building and deploying stage. We model the interactions among the systems and subsystem engineers as a principal-agent problem. We develop a one-shot shallow systems engineering process and obtain the optimum transfer functions that best incentivize the subsystem engineers to maximize the expected system-level utility. The core of the principal-agent model is the quality function which maps the effort of the agent to the performance (quality) of the system. Therefore, we build the stochastic quality function by modeling the design process as a sequential decision-making problem. Second, we develop and evaluate a model of the acquisition process that accounts for the strategic behavior of different parties. We cast our model in terms of government-funded projects and assume the following steps. First, the government publishes a request for bids. Then, private firms offer their proposals in a bidding process and the winner bidder enters in a con- tract with the government. The contract describes the system requirements and the corresponding monetary transfers for meeting them. The winner firm devotes effort to deliver a system that fulfills the requirements. This can be assumed as a game that the government plays with the bidder firms. We study how different parameters in the acquisition procedure affect the bidders’ behaviors and therefore, the utility of the government. Using reinforcement learning, we seek to learn the optimal policies of involved actors in this game. In particular, we study how the requirements, contract types such as cost-plus and incentive-based contracts, number of bidders, problem complexity, etc., affect the acquisition procedure. Furthermore, we study the bidding strategy of the private firms and how the contract types affect their strategic behavior.</p></div></div></div>

Page generated in 0.1346 seconds