46 research outputs found

    Risk-sensitive security-constrained economic dispatch via critical region exploration

    Get PDF
    A security-constrained economic dispatch (SCED) problem is regularly solved by system operators in electric power networks to make day-ahead and real-time dispatch decisions. Preventive SCED is conservative and requires dispatch decisions that are secure against any single component failure. Corrective (recourse) actions can significantly reduce operational costs. Even with linear power flow models, corrective SCED poses significant computational challenges owing to an increase in the dimensionality arising from additional recourse decisions and the number of contingencies to guard against. This thesis analyzes the benefits of allowing recourse actions for simple networks and tackles the computational challenges of solving the problem at scale through a decomposition of the problem via a critical region exploration technique that exploits the problem structure using properties of multi-parametric linear programming. This thesis concludes with numerical results on various IEEE test networks

    Risk-sensitive security-constrained economic dispatch via critical region exploration

    No full text
    A security-constrained economic dispatch (SCED) problem is regularly solved by system operators in electric power networks to make day-ahead and real-time dispatch decisions. Preventive SCED is conservative and requires dispatch decisions that are secure against any single component failure. Corrective (recourse) actions can significantly reduce operational costs. Even with linear power flow models, corrective SCED poses significant computational challenges owing to an increase in the dimensionality arising from additional recourse decisions and the number of contingencies to guard against. This thesis analyzes the benefits of allowing recourse actions for simple networks and tackles the computational challenges of solving the problem at scale through a decomposition of the problem via a critical region exploration technique that exploits the problem structure using properties of multi-parametric linear programming. This thesis concludes with numerical results on various IEEE test networks.U of I OnlyAuthor requested U of Illinois access only (OA after 2yrs) in Vireo ETD syste

    Improved Differential Evolution Algorithm and Its Applications to Orbit Design

    No full text

    ARMOUR – A Rice miRNA: mRNA Interaction Resource

    No full text
    ARMOUR was developed as ARice miRNA:mRNA interaction resource. This informative and interactive database includes the experimentally validated expression profiles of miRNAs under different developmental and abiotic stress conditions across seven Indian rice cultivars. This comprehensive database covers 689 known and 1664 predicted novel miRNAs and their expression profiles in more than 38 different tissues or conditions along with their predicted/known target transcripts. The understanding of miRNA:mRNA interactome in regulation of functional cellular machinery is supported by the sequence information of the mature and hairpin structures. ARMOUR provides flexibility to users in querying the database using multiple ways like known gene identifiers, gene ontology identifiers, KEGG identifiers and also allows on the fly fold change analysis and sequence search query with inbuilt BLAST algorithm. ARMOUR database provides a cohesive platform for novel and mature miRNAs and their expression in different experimental conditions and allows searching for their interacting mRNA targets, GO annotation and their involvement in various biological pathways. The ARMOUR database includes a provision for adding more experimental data from users, with an aim to develop it as a platform for sharing and comparing experimental data contributed by research groups working on rice
    corecore