3,076 research outputs found

    Application of quadratically-constrained model predictive control in power systems

    Get PDF
    Simulations for the quadratically-constrained model predictive control (qc-MPC) with power system linear models are studied in this work. In qc-MPC, the optimization is imposed with two additional constraints to achieve the closed-loop system stability and the recursive-feasibility simultaneously. Instead of engaging the traditional terminal constraint for MPC, both constraints in qc-MPC are imposed on the first control vector of the MPC control sequence. As a result, qc-MPC has the potential for further extension to the control of network centric power systems. The algorithm of qc-MPC has been developed in a previous paper. Here, simulation studies with small-signal linear models of three typical power systems are presented to demonstrate its efficacy. We also develop a computational strategy for the decentralized static state-feedback control using the same quadratic dissipativity constraint as of the qc-MPC. Only state constraints are considered in the state feedback design. A comparison is then provided in the simulation study of qc-MPC relatively to the constrained-state feedback control.This publication is made possible by the Singapore National Research Foundation under its Campus for Research Excellence And Technological Enterprise (CREATE) programmeThis is the author accepted manuscript. The final version is available from IEEE via http://dx.doi.org/10.1109/ICARCV.2014.706430

    Risk-Averse Model Predictive Operation Control of Islanded Microgrids

    Full text link
    In this paper we present a risk-averse model predictive control (MPC) scheme for the operation of islanded microgrids with very high share of renewable energy sources. The proposed scheme mitigates the effect of errors in the determination of the probability distribution of renewable infeed and load. This allows to use less complex and less accurate forecasting methods and to formulate low-dimensional scenario-based optimisation problems which are suitable for control applications. Additionally, the designer may trade performance for safety by interpolating between the conventional stochastic and worst-case MPC formulations. The presented risk-averse MPC problem is formulated as a mixed-integer quadratically-constrained quadratic problem and its favourable characteristics are demonstrated in a case study. This includes a sensitivity analysis that illustrates the robustness to load and renewable power prediction errors

    Stabilising Model Predictive Control for Discrete-time Fractional-order Systems

    Full text link
    In this paper we propose a model predictive control scheme for constrained fractional-order discrete-time systems. We prove that all constraints are satisfied at all time instants and we prescribe conditions for the origin to be an asymptotically stable equilibrium point of the controlled system. We employ a finite-dimensional approximation of the original infinite-dimensional dynamics for which the approximation error can become arbitrarily small. We use the approximate dynamics to design a tube-based model predictive controller which steers the system state to a neighbourhood of the origin of controlled size. We finally derive stability conditions for the MPC-controlled system which are computationally tractable and account for the infinite dimensional nature of the fractional-order system and the state and input constraints. The proposed control methodology guarantees asymptotic stability of the discrete-time fractional order system, satisfaction of the prescribed constraints and recursive feasibility

    A virtual actuator approach for the secure control of networked LPV systems under pulse-width modulated DoS attacks

    Get PDF
    In this paper, we formulate and analyze the problem of secure control in the context of networked linear parameter varying (LPV) systems. We consider an energy-constrained, pulse-width modulated (PWM) jammer, which corrupts the control communication channel by performing a denial-of-service (DoS) attack. In particular, the malicious attacker is able to erase the data sent to one or more actuators. In order to achieve secure control, we propose a virtual actuator technique under the assumption that the behavior of the attacker has been identified. The main advantage brought by this technique is that the existing components in the control system can be maintained without need of retuning them, since the virtual actuator will perform a reconfiguration of the plant, hiding the attack from the controller point of view. Using Lyapunov-based results that take into account the possible behavior of the attacker, design conditions for calculating the virtual actuators gains are obtained. A numerical example is used to illustrate the proposed secure control strategy.Peer ReviewedPostprint (author's final draft

    Conic Optimization Theory: Convexification Techniques and Numerical Algorithms

    Full text link
    Optimization is at the core of control theory and appears in several areas of this field, such as optimal control, distributed control, system identification, robust control, state estimation, model predictive control and dynamic programming. The recent advances in various topics of modern optimization have also been revamping the area of machine learning. Motivated by the crucial role of optimization theory in the design, analysis, control and operation of real-world systems, this tutorial paper offers a detailed overview of some major advances in this area, namely conic optimization and its emerging applications. First, we discuss the importance of conic optimization in different areas. Then, we explain seminal results on the design of hierarchies of convex relaxations for a wide range of nonconvex problems. Finally, we study different numerical algorithms for large-scale conic optimization problems.Comment: 18 page
    • …
    corecore