39,041 research outputs found

    Anticipating and Coordinating Voltage Control for Interconnected Power Systems

    Get PDF
    This paper deals with the application of an anticipating and coordinating feedback control scheme in order to mitigate the long-term voltage instability of multi-area power systems. Each local area is uniquely controlled by a control agent (CA) selecting control values based on model predictive control (MPC) and is possibly operated by an independent transmission system operator (TSO). Each MPC-based CA only knows a detailed local hybrid system model of its own area, employing reduced-order quasi steady-state (QSS) hybrid models of its neighboring areas and even simpler PV models for remote areas, to anticipate (and then optimize) the future behavior of its own area. Moreover, the neighboring CAs agree on communicating their planned future control input sequence in order to coordinate their own control actions. The feasibility of the proposed method for real-time applications is explained, and some practical implementation issues are also discussed. The performance of the method, using time-domain simulation of the Nordic32 test system, is compared with the uncoordinated decentralized MPC (no information exchange among CAs), demonstrating the improved behavior achieved by combining anticipation and coordination. The robustness of the control scheme against modeling uncertainties is also illustrated

    Power system security enhancement by HVDC links using a closed-loop emergency control

    Get PDF
    In recent years, guaranteeing that large-scale interconnected systems operate safely, stably and economically has become a major and emergency issue. A number of high profile blackouts caused by cascading outages have focused attention on this issue. Embedded HVDC (High Voltage Direct Current) links within a larger AC power system are known to act as a “firewall” against cascading disturbances and therefore, can effectively contribute in preventing blackouts. A good example is the 2003 blackout in USA and Canada, where the Québec grid was not affected due to its HVDC interconnection. In the literature, many works have studied the impact of HVDC on the power system stability, but very few examples exist in the area of its impact on the system security. This paper presents a control strategy for HVDC systems to increase their contribution to system security. A real-time closed-loop control scheme is used to modulate the DC power of HVDC links to alleviate AC system overloads and improve system security. Simulations carried out on a simplified model of the Hydro-Québec network show that the proposed method works well and can greatly improve system security during emergency situations.Peer reviewedFinal Accepted Versio

    Interorganizational Information Exchange and Efficiency: Organizational Performance in Emergency Environments

    Get PDF
    Achieving efficiency in coordinated action in rapidly changing environments has challenged both researchers and practitioners. Emergency events require both rapid response and effective coordination among participating organizations. We created a simulated operations environment using agent-based modeling to test the efficiency of six different organizational designs that varied the exercise of authority, degree of uncertainty, and access to information. Efficiency is measured in terms of response time, identifying time as the most valuable resource in emergency response. Our findings show that, contrary to dominant organizational patterns of hierarchical authority that limit communication among members via strict reporting rules, any communication among members increases the efficiency of organizations operating in uncertain environments. We further found that a smaller component of highly interconnected, self adapting agents emerges over time to support the organization\'s adaptation in changing conditions. In uncertain environments, heterogeneous agents prove more efficient in sharing information that guides coordination than homogeneous agents.Agent-Based Simulation, Emergency Management, Network Evolution, Performance

    Coordinating Local Adaptive Strategies through a Network-Based Approach

    Get PDF
    As the impacts of climate change become increasingly destructive and pervasive, climate adaptation has received greater political and academic attention. The traditional top-down model for mitigating climate change, however, is ill-suited to implementing effective adaptation strategies. Yet, local communities most impacted by climate change seldom have the tools and resources to develop effective adaptive strategies on their own. This note argues that a bottom-up, network-based approach could be a promising paradigm towards implementing effective adaptive strategies and empowering affected communities

    Federated Robust Embedded Systems: Concepts and Challenges

    Get PDF
    The development within the area of embedded systems (ESs) is moving rapidly, not least due to falling costs of computation and communication equipment. It is believed that increased communication opportunities will lead to the future ESs no longer being parts of isolated products, but rather parts of larger communities or federations of ESs, within which information is exchanged for the benefit of all participants. This vision is asserted by a number of interrelated research topics, such as the internet of things, cyber-physical systems, systems of systems, and multi-agent systems. In this work, the focus is primarily on ESs, with their specific real-time and safety requirements. While the vision of interconnected ESs is quite promising, it also brings great challenges to the development of future systems in an efficient, safe, and reliable way. In this work, a pre-study has been carried out in order to gain a better understanding about common concepts and challenges that naturally arise in federations of ESs. The work was organized around a series of workshops, with contributions from both academic participants and industrial partners with a strong experience in ES development. During the workshops, a portfolio of possible ES federation scenarios was collected, and a number of application examples were discussed more thoroughly on different abstraction levels, starting from screening the nature of interactions on the federation level and proceeding down to the implementation details within each ES. These discussions led to a better understanding of what can be expected in the future federated ESs. In this report, the discussed applications are summarized, together with their characteristics, challenges, and necessary solution elements, providing a ground for the future research within the area of communicating ESs

    SoS in Disasters: Why following the manual can be a mistake

    Get PDF
    According to both the US Geological Survey and the World Bank, 280billiondollarscouldhavebeensavedif280 billion dollars could have been saved if 40 billion dollars had been invested in disaster prevention. Natural and human-made disasters that have occurred over the last few years show that there is a gap in disaster prevention caused by the interconnected nature of risks, which cannot be foreseen with current risk management methods. In this paper we point out how disaster management could benefit from a SoS approach in emergency response and preparedness strategies. Using recent disasters as case studies, we identify some keys to success in managing a SoS in preparation, during and in the aftermath of a disaster. In particular, we discuss the idea of the interconnectedness of risks in independent and interdependent systems and the application of Boardman and Sauser’s concept of “creative disobedience”, which are fundamental for goal achievement of systems belonging to a SoS

    Concepts for design of an energy management system incorporating dispersed storage and generation

    Get PDF
    New forms of generation based on renewable resources must be managed as part of existing power systems in order to be utilized with maximum effectiveness. Many of these generators are by their very nature dispersed or small, so that they will be connected to the distribution part of the power system. This situation poses new questions of control and protection, and the intermittent nature of some of the energy sources poses problems of scheduling and dispatch. Under the assumption that the general objectives of energy management will remain unchanged, the impact of dispersed storage and generation on some of the specific functions of power system control and its hardware are discussed

    Approaches to the Security Analysis of Power Systems: Defence Strategies Against Malicious Threats

    Get PDF
    This report is intended to provide a conceptual framework for assessing the security risk to power systems assets and operations related to malicious attacks. The problem is analysed with reference to all the actors involved and the possible targets. The specific nature of the malicious attacks is discussed and representations in terms of strategic interaction are proposed. Models based on Game Theory and Multi Agent Systems techniques specifically developed for the representation of malicious attacks against power systems are presented and illustrated with reference to applications to small-scale test systems.JRC.G.6-Sensors, radar technologies and cybersecurit

    The Role of the Internet of Things in Network Resilience

    Get PDF
    Disasters lead to devastating structural damage not only to buildings and transport infrastructure, but also to other critical infrastructure, such as the power grid and communication backbones. Following such an event, the availability of minimal communication services is however crucial to allow efficient and coordinated disaster response, to enable timely public information, or to provide individuals in need with a default mechanism to post emergency messages. The Internet of Things consists in the massive deployment of heterogeneous devices, most of which battery-powered, and interconnected via wireless network interfaces. Typical IoT communication architectures enables such IoT devices to not only connect to the communication backbone (i.e. the Internet) using an infrastructure-based wireless network paradigm, but also to communicate with one another autonomously, without the help of any infrastructure, using a spontaneous wireless network paradigm. In this paper, we argue that the vast deployment of IoT-enabled devices could bring benefits in terms of data network resilience in face of disaster. Leveraging their spontaneous wireless networking capabilities, IoT devices could enable minimal communication services (e.g. emergency micro-message delivery) while the conventional communication infrastructure is out of service. We identify the main challenges that must be addressed in order to realize this potential in practice. These challenges concern various technical aspects, including physical connectivity requirements, network protocol stack enhancements, data traffic prioritization schemes, as well as social and political aspects

    Vulnerability reduction of infrastructure reconstruction projects

    Get PDF
    Various infrastructure segments of numerous countries have been repeatedly subjected to natural and man-made disasters. The potential reason of damaging infrastructure facilities and their services is resultant disaster risks due to natural or man-made hazards connect with vulnerable infrastructure facilities and vulnerable communities. The simplest way to prevent or mitigate disaster losses is addressing vulnerabilities. The main study based on which this paper was compiled aimed at exploring and investigating the vulnerabilities of infrastructures and communities benefited from infrastructures and possible solutions to overcome them. This paper presents the literature review conducted on vulnerabilities of infrastructures and empirical evidence collated on best possible DRR strategies to overcome such vulnerabilities of infrastructures. The main study was conducted using case study strategy and the expert interviews. This paper is entirely based on the data collated from the expert interviews conducted in Sri Lanka and United Kingdom. The expert interviews discovered various DRR strategies to overcome the vulnerabilities of the infrastructure project
    corecore