88 research outputs found

    A Spatio-temporal Decomposition Method for the Coordinated Economic Dispatch of Integrated Transmission and Distribution Grids

    Full text link
    With numerous distributed energy resources (DERs) integrated into the distribution networks (DNs), the coordinated economic dispatch (C-ED) is essential for the integrated transmission and distribution grids. For large scale power grids, the centralized C-ED meets high computational burden and information privacy issues. To tackle these issues, this paper proposes a spatio-temporal decomposition algorithm to solve the C-ED in a distributed and parallel manner. In the temporal dimension, the multi-period economic dispatch (ED) of transmission grid (TG) is decomposed to several subproblems by introducing auxiliary variables and overlapping time intervals to deal with the temporal coupling constraints. Besides, an accelerated alternative direction method of multipliers (A-ADMM) based temporal decomposition algorithm with the warm-start strategy, is developed to solve the ED subproblems of TG in parallel. In the spatial dimension, a multi-parametric programming projection based spatial decomposition algorithm is developed to coordinate the ED problems of TG and DNs in a distributed manner. To further improve the convergence performance of the spatial decomposition algorithm, the aggregate equivalence approach is used for determining the feasible range of boundary variables of TG and DNs. Moreover, we prove that the proposed spatio-temporal decomposition method can obtain the optimal solution for bilevel convex optimization problems with continuously differentiable objectives and constraints. Numerical tests are conducted on three systems with different scales, demonstrating the high computational efficiency and scalability of the proposed spatio-temporal decomposition method

    A Framework for Analyzing the Impact of Data Integrity/Quality on Electricity Market Operations

    Get PDF
    This dissertation examines the impact of data integrity/quality in the supervisory control and data acquisition (SCADA) system on real-time locational marginal price (LMP) in electricity market operations. Measurement noise and/or manipulated sensor errors in a SCADA system may mislead system operators about real- time conditions in a power system, which, in turn, may impact the price signals in real-time power markets. This dissertation serves as a first attempt to analytically investigate the impact of bad/malicious data on electric power market operations. In future power system operations, which will probably involve many more sensors, the impact of sensor data integrity/quality on grid operations will become increasingly important. The first part of this dissertation studies from a market participant’s perspective a new class of malicious data attacks on state estimation, which subsequently influences the result of the newly emerging look-ahead dispatch models in the real-time power market. In comparison with prior work of cyber-attack on static dispatch where no inter-temporal ramping constraint is considered, we propose a novel attack strategy, named ramp-induced data (RID) attack, with which the attacker can manipulate the limits of ramp constraints of generators in look-ahead dispatch. It is demonstrated that the proposed attack can lead to financial profits via malicious capacity withholding of selected generators, while being undetected by the existing bad data detection algorithm embedded in today’s state estimation software. In the second part, we investigate from a system operator’s perspective the sensitivity of locational marginal price (LMP) with respect to data corruption-induced state estimation error in real-time power market. Two data corruption scenarios are considered, in which corrupted continuous data (e.g., the power injection/flow and voltage magnitude) falsify power flow estimate whereas corrupted discrete data (e.g., the on/off status of a circuit breaker) do network topology estimate, thus leading to the distortion of LMP. We present an analytical framework to quantify real-time LMP sensitivity subject to continuous and discrete data corruption via state estimation. The proposed framework offers system operators an analytical tool to identify economically sensitive buses and transmission lines to data corruption as well as find sensors that impact LMP changes significantly. This dissertation serves as a first step towards rigorous understanding of the fundamental coupling among cyber, physical and economical layers of operations in future smart grid

    A Hierarchical Modeling for Reactive Power Optimization With Joint Transmission and Distribution Networks by Curve Fitting

    Get PDF

    Electricity Market Designs for Demand Response from Residential Customers

    Get PDF
    The main purpose of this dissertation is to design an appropriate tariff program for residential customers that encourages customers to participate in the system while satisfying market operators and utilities goals. This research investigates three aspects critical for successful programs: tariff designs for DR, impact of renewable on such tariffs, and load elasticity estimates. First, both categories of DR are modeled based on the demand-price elasticity concept and used to design an optimum scheme for achieving the maximum benefit of DR. The objective is to not only reduce costs and improve reliability but also to increase customer acceptance of a DR program by limiting price volatility. A time of use (TOU) program is considered for a PB scheme designed using a monthly peak and off peak tariff. For the IBDR, a novel optimization is proposed that in addition to calculation of an adequate and a reasonable amount of load change for the incentive also finds the best times to request DR. Second, the effect of both DR programs under a high penetration of renewable resources is investigated. LMP variation after renewable expansion is more highly correlated with renewable’s intermittent output than the load profile. As a result, a TOU program is difficult to successfully implement; however, analysis shows IBDR can diminish most of the volatile price changes in WECC. To model risk associated with renewable uncertainty, a robust optimization is designed considering market price and elasticity uncertainty. Third, a comprehensive study to estimate residential load elasticity in an IBDR program. A key component in all demand response programs design is elasticity, which implies customer reaction to LSEs offers. Due to limited information, PB elasticity is used in IBDR as well. Customer elasticity is calculated using data from two nationwide surveys and integrated with a detailed residential load model. In addition, IB elasticity is reported at the individual appliance level, which is more effective than one for the aggregate load of the feeder. Considering the importance of HVAC in the aggregate load signal, its elasticity is studied in greater detail and estimated for different customer groupings

    Heuristics for Lagrangian Relaxation Formulations for the Unit Commitment Problem

    Get PDF
    The expansion of distributed energy resources (DER), demand response (DR), and virtual bidding in many power systems and energy markets are creating new challenges for unit commitment (UC) and economic dispatch (ED) techniques. Instead of a small number of traditionally large generators, the power system resource mix is moving to one with a high percentage of a large number of small units. These can increase the number of similar or identical units, leading to chattering (switching back and forth among committed units between iterations). This research investigates alternative and scalable ways of increasing the high penetration of these resources. First, the mathematical formulations for UC and ED models are reviewed. Then a new heuristic is proposed that takes advantage of the incremental nature of Lagrangian relaxation (LR). The heuristic linearizes and distributes the network transmission losses to appropriately penalize line flow and mitigate losses. Second, a mixed integer programming (MIP) is used as a benchmark for the proposed LR formulation. The impact of similar and identical units on the solution quality and simulation run time of UC and ED was investigated using the proposed formulation. Third, a system flexibility study is done using DR and a load demand pattern with a high penetration of renewables, creating a high daily ramp rate requirement. This work investigates the impact of available DR on spikes in locational marginal pricing (LMP). Fourth, two studies are done on improving LR computational efficiency. The first proposes a heuristic that focuses on trade-offs between solution quality and simulation run time. The heuristic iterates over lambda and energy marginal price while the convergence issue is handled using Augmented LR (ALR). The second study proposes a heuristic that penalizes transmission lines with binding line limits. The proposed method can reduce power flow in the transmission lines of interest, and considerably reduce the simulation time in optimization problems with a high number of transmission constraints. Finally, the effect of a large number of similar and identical units on simulation run time is considered. The proposed formulation scales linearly with the increase in system size

    An Analytical Methodology To Security Constraints Management In Power System Operation

    Get PDF
    In a deregulated electricity market, Independent System Operators (ISOs) are responsible for dispatching power to the load securely, efficiently, and economically. ISO performs Security Constrained Unit Commitment (SCUC) to guarantee sufficient generation commitment, maximized social welfare and facilitating market-driven economics. A large number of security constraints would render the model impossible to solve under time requirements. Developing a method to identify the minimum set of security constraints without overcommitting is necessary to reduce Mixed Integer Linear Programming (MILP) solution time. To overcome this challenge, we developed a powerful tool called security constraint screening. The proposed approach effectively filters out non-dominating constraints by integrating virtual transactions and capturing changes online in real-time or look-ahead markets. The security-constraint screening takes advantage of both deterministic and statistical methods, which leverages mathematical modeling and historical data. Effectiveness is verified using Midcontinent Independent System Operator (MISO) data. The research also presented a data-driven approach to forecast congestion patterns in real-time utilizing machine learning applications. Studies have been conducted using real-world data. The potential benefit is to provide the day-ahead operators with a tool for supporting decision-making regarding modeling constraints

    Comprehensive Survey and Taxonomies of False Injection Attacks in Smart Grid: Attack Models, Targets, and Impacts

    Full text link
    Smart Grid has rapidly transformed the centrally controlled power system into a massively interconnected cyber-physical system that benefits from the revolutions happening in the communications (e.g. 5G) and the growing proliferation of the Internet of Things devices (such as smart metres and intelligent electronic devices). While the convergence of a significant number of cyber-physical elements has enabled the Smart Grid to be far more efficient and competitive in addressing the growing global energy challenges, it has also introduced a large number of vulnerabilities culminating in violations of data availability, integrity, and confidentiality. Recently, false data injection (FDI) has become one of the most critical cyberattacks, and appears to be a focal point of interest for both research and industry. To this end, this paper presents a comprehensive review in the recent advances of the FDI attacks, with particular emphasis on 1) adversarial models, 2) attack targets, and 3) impacts in the Smart Grid infrastructure. This review paper aims to provide a thorough understanding of the incumbent threats affecting the entire spectrum of the Smart Grid. Related literature are analysed and compared in terms of their theoretical and practical implications to the Smart Grid cybersecurity. In conclusion, a range of technical limitations of existing false data attack research is identified, and a number of future research directions is recommended.Comment: Double-column of 24 pages, prepared based on IEEE Transaction articl
    • …
    corecore