skip to main content


Title: Security-Constrained Optimal Operation of Energy-Water Nexus based on a Fast Contingency Filtering Method
Water and power systems are increasingly interdependent due to the growing number of electricity-driven water facilities. The security of one system can be affected by a contingency in the other system. This paper investigates a security-constrained operation problem of the energy-water nexus (EWN), which is a computationally challenging optimization problem due to the nonlinearity, nonconvexity, and size. We propose a two-step iterative contingency filtering method based on the feasibility and rating of the contingencies to decrease the size of the problem. The optimal power and water flow are obtained in a normal situation by considering the set of contingencies that can not be controlled with corrective actions. The feasibility check of the contingencies is performed in the second step, followed by a rating of the uncontrollable contingencies. Finally, the critical contingencies are obtained and added to the first step for the next iteration. We also employ convex technologies to reduce the computation burden. The proposed method is validated via two case studies. Results indicate that this approach can efficiently attain optimal values.  more » « less
Award ID(s):
2124849
NSF-PAR ID:
10352797
Author(s) / Creator(s):
;
Date Published:
Journal Name:
IEEE Power Energy Society General Meeting
ISSN:
1944-9925
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. null (Ed.)
    Ensuring reliable operation of large power systems subjected to multiple outages is a challenging task because of the combinatorial nature of the problem. Traditional approaches for security assessment are often limited by their scope and/or speed, resulting in missing of critical contingencies that could lead to cascading failures. This paper proposes a two-component methodology to enhance power system security. The first component combines an efficient algorithm to detect cut-set saturation (called the feasibility test (FT) algorithm) with real-time contingency analysis (RTCA) to create an integrated corrective action (iCA), whose goal is to secure the system against cut-set saturation as well as critical branch overloads. The second component employs the only results of the FT to create a relaxed corrective action (rCA) to secure the system against post-contingency cut-set saturation. The first component is more comprehensive, but the latter is computationally more efficient. The effectiveness of the two components is evaluated based upon the number of cascade triggering contingencies alleviated, and the computation time. The results obtained by analyzing different case-studies on the IEEE 118-bus and 2000-bus synthetic Texas systems indicate that the proposed two-component methodology successfully enhances the scope and speed of power system security assessment during multiple outages. 
    more » « less
  2. Transmission networks and generating units must be reinforced to satisfy the ever-increasing demand for electricity and to keep power system reliability within an acceptable level. According to the standards, the planned power system must be able to supply demand in the case of outage of a single element (N − 1 security criteria), and the possibility of cascading failures must be minimized. In this paper, we propose a risk-based dynamic generation and transmission expansion planning model with respect to the propagating effect of each contingency on the power system. Using the concept of risk, post-contingency load-shedding penalty costs are obtained and added in the objective function to penalize high-risk contingencies more dominantly. The McCormick relaxation is tailored to alter the objective function into a linear format. To keep the practicality of the proposed model, a second-order cone programming model is applied for power flow representation, and the problem is modeled in a dynamic time frame. The proposed model is formulated as a mixed-integer second-order cone programming problem. The numerical studies on the RTS 24-bus test system illustrate the efficacy of the proposed model. 
    more » « less
  3. In many areas of constrained optimization, representing all possible constraints that give rise to an accurate feasible region can be difficult and computationally prohibitive for online use. Satisfying feasibility constraints becomes more challenging in high-dimensional, non-convex regimes which are common in engineering applications. A prominent example that is explored in the manuscript is the security-constrained optimal power flow (SCOPF) problem, which minimizes power generation costs, while enforcing system feasibility under contingency failures in the transmission network. In its full form, this problem has been modeled as a nonlinear two-stage stochastic programming problem. In this work, we propose a hybrid structure that incorporates and takes advantage of both a high-fidelity physical model and fast machine learning surrogates. Neural network (NN) models have been shown to classify highly non-linear functions and can be trained offline but require large training sets. In this work, we present how model-guided sampling can efficiently create datasets that are highly informative to a NN classifier for non-convex functions. We show how the resultant NN surrogates can be integrated into a non-linear program as smooth, continuous functions to simultaneously optimize the objective function and enforce feasibility using existing non-linear solvers. Overall, this allows us to optimize instances of the SCOPF problem with an order of magnitude CPU improvement over existing methods.

     
    more » « less
  4. This paper is concerned about improving the resilience of power grids against extreme events which may lead to the line and generator outages and subsequent voltage stability problems and blackouts. The reported study investigates ways of eliminating or substantially reducing the chances of having such voltage stability problems during expected extreme events, by strategically placing a few distributed generators in the system. The problem is addressed in two stages, where a reasonably inclusive list of credible contingencies are individually considered first. A minimum number of distributed generators are selected and placed in order to maintain voltage stability under each considered contingency. In the second stage, the number of generators is minimized by the strategic selection of locations to reach a solution that ensures voltage stability under all considered contingencies in the system. Effectiveness and computational performance of the developed strategy are illustrated by simulating several outage scenarios using the IEEE 118-bus system. 
    more » « less
  5. With the increasing penetration of cyber systems in the power grid, it is becoming increasingly imperative to deploy adequate security measures all across the grid to secure it against any kind of cyber threat. Since financial resources for investment in security are limited, optimal allocation of these cybersecurity resources in the grid is extremely important. At the same time, optimization of these investments proves to be challenging due to the uncertain behavior of attackers and the dynamically changing threat landscape. Existing solutions for this problem either do not address the dynamic behavior of adversaries or lack in the practical feasibility of the defense models. This paper addresses the problem of optimizing investment strategies in the cybersecurity infrastructure of a smart grid using a game-theoretic approach. The attacker is modeled using various attacker profiles which represent the possible types of adversaries in the context of CPS. Each profile has certain characteristics to bring out the aspect of uncertain behavior of the adversaries. The defender is modeled with various pragmatic characteristics that can be easily translated to the real-world grid scenarios for implementation. These characteristics include the standards laid down by the North American Electric Reliability Corporation (NERC) for Critical Infrastructure Protection (CIP) commonly known as the NERC-CIP standards. The game-theoretic framework allows us to obtain optimal strategies that the defender of the grid can adopt to minimize its losses against the possible attack threats on the grid. The concept is illustrated by a simplistic 3-bus power system model case study which depicts how the solution can be translated to practical implementation in the actual grid. 
    more » « less