63,162 research outputs found

    Vulnerability Analysis of Modern Electric Grids: A Mathematical Optimization Approach

    Get PDF
    Electrical power must be transmitted through a vast and complicated network of interconnected grids to arrive at one’s fingertips. The US electric grid network and its components are rapidly advancing and adapting to the advent of smart technologies. Production of electricity is transitioning to sustainable processes derived from renewable energy sources like wind and solar power to decrease dependence on nonrenewable fossil fuels. These newly pervasive natures of smart technology and the variable power supply of renewable energy introduce previously unexamined vulnerabilities into the modern electric grid. Disruption of grid operations is not uncommon, and the effects can be economically and societally severe. Thus, a vulnerability analysis can provide decision makers with the ability to characterize points of improvement in the networks they supervise. This thesis performs a vulnerability analysis of electric grid operations including storage. This vulnerability analysis is achieved through a set of numerical experiments on a multi-period optimal power flow model including storage and variable demand. This model resulted in an analysis indicating storage is helpful in increasing resilience in networks with excess generation, no matter how severe the disruption. Networks with constrained generation benefit little, if at all, from storage. This analysis allows us to conclude careful implementation is the best way to improve electric grid security in the face of widespread use of renewable energy and smart technology

    On critical service recovery after massive network failures

    Get PDF
    This paper addresses the problem of efficiently restoring sufficient resources in a communications network to support the demand of mission critical services after a large-scale disruption. We give a formulation of the problem as a mixed integer linear programming and show that it is NP-hard. We propose a polynomial time heuristic, called iterative split and prune (ISP) that decomposes the original problem recursively into smaller problems, until it determines the set of network components to be restored. ISP's decisions are guided by the use of a new notion of demand-based centrality of nodes. We performed extensive simulations by varying the topologies, the demand intensity, the number of critical services, and the disruption model. Compared with several greedy approaches, ISP performs better in terms of total cost of repaired components, and does not result in any demand loss. It performs very close to the optimal when the demand is low with respect to the supply network capacities, thanks to the ability of the algorithm to maximize sharing of repaired resources

    Advanced information processing system: Inter-computer communication services

    Get PDF
    The purpose is to document the functional requirements and detailed specifications for the Inter-Computer Communications Services (ICCS) of the Advanced Information Processing System (AIPS). An introductory section is provided to outline the overall architecture and functional requirements of the AIPS and to present an overview of the ICCS. An overview of the AIPS architecture as well as a brief description of the AIPS software is given. The guarantees of the ICCS are provided, and the ICCS is described as a seven-layered International Standards Organization (ISO) Model. The ICCS functional requirements, functional design, and detailed specifications as well as each layer of the ICCS are also described. A summary of results and suggestions for future work are presented
    • …
    corecore