3,076 research outputs found
Application of quadratically-constrained model predictive control in power systems
Simulations for the quadratically-constrained model
predictive control (qc-MPC) with power system linear models are
studied in this work. In qc-MPC, the optimization is imposed
with two additional constraints to achieve the closed-loop system
stability and the recursive-feasibility simultaneously. Instead of
engaging the traditional terminal constraint for MPC, both
constraints in qc-MPC are imposed on the first control vector
of the MPC control sequence. As a result, qc-MPC has the
potential for further extension to the control of network centric
power systems. The algorithm of qc-MPC has been developed
in a previous paper. Here, simulation studies with small-signal
linear models of three typical power systems are presented
to demonstrate its efficacy. We also develop a computational
strategy for the decentralized static state-feedback control using
the same quadratic dissipativity constraint as of the qc-MPC.
Only state constraints are considered in the state feedback design.
A comparison is then provided in the simulation study of qc-MPC
relatively to the constrained-state feedback control.This publication is made possible by the Singapore National Research
Foundation under its Campus for Research Excellence And Technological
Enterprise (CREATE) programmeThis is the author accepted manuscript. The final version is available from IEEE via http://dx.doi.org/10.1109/ICARCV.2014.706430
Risk-Averse Model Predictive Operation Control of Islanded Microgrids
In this paper we present a risk-averse model predictive control (MPC) scheme
for the operation of islanded microgrids with very high share of renewable
energy sources. The proposed scheme mitigates the effect of errors in the
determination of the probability distribution of renewable infeed and load.
This allows to use less complex and less accurate forecasting methods and to
formulate low-dimensional scenario-based optimisation problems which are
suitable for control applications. Additionally, the designer may trade
performance for safety by interpolating between the conventional stochastic and
worst-case MPC formulations. The presented risk-averse MPC problem is
formulated as a mixed-integer quadratically-constrained quadratic problem and
its favourable characteristics are demonstrated in a case study. This includes
a sensitivity analysis that illustrates the robustness to load and renewable
power prediction errors
Stabilising Model Predictive Control for Discrete-time Fractional-order Systems
In this paper we propose a model predictive control scheme for constrained
fractional-order discrete-time systems. We prove that all constraints are
satisfied at all time instants and we prescribe conditions for the origin to be
an asymptotically stable equilibrium point of the controlled system. We employ
a finite-dimensional approximation of the original infinite-dimensional
dynamics for which the approximation error can become arbitrarily small. We use
the approximate dynamics to design a tube-based model predictive controller
which steers the system state to a neighbourhood of the origin of controlled
size. We finally derive stability conditions for the MPC-controlled system
which are computationally tractable and account for the infinite dimensional
nature of the fractional-order system and the state and input constraints. The
proposed control methodology guarantees asymptotic stability of the
discrete-time fractional order system, satisfaction of the prescribed
constraints and recursive feasibility
A virtual actuator approach for the secure control of networked LPV systems under pulse-width modulated DoS attacks
In this paper, we formulate and analyze the problem of secure control in the context of networked linear parameter varying (LPV) systems. We consider an energy-constrained, pulse-width modulated (PWM) jammer, which corrupts the control communication channel by performing a denial-of-service (DoS) attack. In particular, the malicious attacker is able to erase the data sent to one or more actuators. In order to achieve secure control, we propose a virtual actuator technique under the assumption that the behavior of the attacker has been identified. The main advantage brought by this technique is that the existing components in the control system can be maintained without need of retuning them, since the virtual actuator will perform a reconfiguration of the plant, hiding the attack from the controller point of view. Using Lyapunov-based results that take into account the possible behavior of the attacker, design conditions for calculating the virtual actuators gains are obtained. A numerical example is used to illustrate the proposed secure control strategy.Peer ReviewedPostprint (author's final draft
Conic Optimization Theory: Convexification Techniques and Numerical Algorithms
Optimization is at the core of control theory and appears in several areas of
this field, such as optimal control, distributed control, system
identification, robust control, state estimation, model predictive control and
dynamic programming. The recent advances in various topics of modern
optimization have also been revamping the area of machine learning. Motivated
by the crucial role of optimization theory in the design, analysis, control and
operation of real-world systems, this tutorial paper offers a detailed overview
of some major advances in this area, namely conic optimization and its emerging
applications. First, we discuss the importance of conic optimization in
different areas. Then, we explain seminal results on the design of hierarchies
of convex relaxations for a wide range of nonconvex problems. Finally, we study
different numerical algorithms for large-scale conic optimization problems.Comment: 18 page
- …