ali pinar seminar: a combinatorial approach to vulnerability analysis of the power grid

Upload: ucsbiee

Post on 01-Jun-2018

220 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/9/2019 Ali Pinar Seminar: A Combinatorial Approach to Vulnerability Analysis of the Power Grid

    1/37

    Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin

    Corporation, for the U.S. epartment of !nergy"s National Nuclear Security #dministration under contract !-#C$%-&%#L'($$$. S#N N). *$++-

    A Combinatorial Approach toVulnerability Analysis of the

    Power GridAli PinarSandia National Laboratories

    UCSB Institute for ner!y

  • 8/9/2019 Ali Pinar Seminar: A Combinatorial Approach to Vulnerability Analysis of the Power Grid

    2/37

    Essentially, all models are wrong, but some

    are useful. George E.

    P. Box

    UCSB Institute for ner!y

    Graph models areuseful.

    #$#%$&'#( &

  • 8/9/2019 Ali Pinar Seminar: A Combinatorial Approach to Vulnerability Analysis of the Power Grid

    3/37

    Power blac)outs are a !lobal problem

    Au!ust &''* blac)out a+ected (' million

    people in New ,or)- Pennsyl.ania- /hio-0ichi!an- Vermont- 0assachusetts-Connecticut- New 1ersey- /ntario2

    3he time to reco.er from the blac)outwas as lon! as % days at an estimatedcost of 4%5#' B

    Similar occurrences elsewhere6 India7&'#&8- Bra9il and Para!uay 7&'':8-;rance5Swit9erland5Italy 7&''*8

    UCSB Institute for ner!y#$#%$&'#( *

  • 8/9/2019 Ali Pinar Seminar: A Combinatorial Approach to Vulnerability Analysis of the Power Grid

    4/37

    3he !riduires the system to beresilient to only one failure-because hi!her standards arenot enforceable2

    Uncertainty inherent in manyrenewable resources and theincreasin! load on the system forceus to operate closer to thefeasibility boundary2

    Goal6

    detect .ulnerabilities of thepower networ)

    Include contin!ency analysisas a constraint in systemsplannin!

    Northeast blackout started with three

    broken lines.

  • 8/9/2019 Ali Pinar Seminar: A Combinatorial Approach to Vulnerability Analysis of the Power Grid

    5/37

    ? y s t s pro em sohard@

    Combinatorial compleity

    Defender-attacker-defendergames lead to problems where

    an optimization problems is a

    constraint for another.

    Uncertainty

    Power system operations

    inherently involve uncertainties,which are increasing with

    renewable penetration.

    Compleity of power flow

    Flow of power can be modeled

    by differential algebraicequations, which are difficult to

    solve by themselves !ven

    steady state is described by

    nonlinear equations.

    Need for eact solutions

    !ven the basic appro"imation

    lead to #P-hard problems, and

    heuristics lead to compromise

    from security.

  • 8/9/2019 Ali Pinar Seminar: A Combinatorial Approach to Vulnerability Analysis of the Power Grid

    6/37

    ?hat can we sol.e@0a=imum5ow and minimum cut

    Gi.en a !raph with capacities on ed!es- a source s- anda terminal t- push as much ow as possible from s to t2

    Cut is a bipartitionin! of the .ertices into S and 3- sothat s in S and t in 32

    Capacity of a cut is the cumulati.e capacity of ed!esbetween S and 32

    0in5cut is a cut with minimum capacity2

    Volume of ma=5ow capacity of a min5cut2

    ts (/0

    */1

    */*

    1/1

    %/2%/%

    +/(

    Capacity30

    Capacity3+$

    #$#%$&'#( UCSB Institute for ner!y

  • 8/9/2019 Ali Pinar Seminar: A Combinatorial Approach to Vulnerability Analysis of the Power Grid

    7/37

    (

    k 3+, ma-flow3 0k 3$, ma-flow3 ++

    k 3*, ma-flow3 (

    ?hat else can we sol.e@Networ) inhibition problem

    Cut min2 number of lines- )- so that ma= ow is below a

    speciDed bound2 Shown to be NP5complete 7Phillips #::#82

    3he classical min5cut problem is a special .ersion of networ)inhibition- where ma=5ow is set to 9ero2

    Can be formulated as 0ILP with EVEFEE binary .ariables2

    k 31, ma-flow3+

    UCSB Institute for ner!y

    -*

    -*-+

    -1

    -1

    2

    (

    %

    2*

    *

    1

    *

    +$

    #$#%$&'#(

  • 8/9/2019 Ali Pinar Seminar: A Combinatorial Approach to Vulnerability Analysis of the Power Grid

    8/37

    How useful is this model@

    The Good

    ?e can sol.enetwor) interdictionproblems2

    The Bad

    ;low of power is di+erent- and thusthe results are not applicable2

    The Beautiful

    Understandin! the combinatorial structure

    can !uide heuristic techni>ues that modelthe power ow more accurately2

    ;urther analysis will show that the !apbetween the two models is smaller than it

    loo)s2

  • 8/9/2019 Ali Pinar Seminar: A Combinatorial Approach to Vulnerability Analysis of the Power Grid

    9/37

    Power ow is !uided by potentialdi+erence between nodes

    SimpliDed model

    ;i= .olta!es at # wor) only on acti.e power

    e>uations2 Ais the node5arc incidence matri= that describes !rid

    topolo!y2 p is the state of the system2

    Sin(A

    ) is a dia!onal matri= whose entries are the an!ulardi+erence2

    #cti4e power

    5eacti4e power$6 4oltage

    6 phase angle

    76 susceptance

    2

    i

    j

    2Vl VVu

    BijViVjsin(i j )

    (Vi

    ,i

    )

    (Vj

    ,j

    )

    BijViVjcos(i j )

    F(A,,p) =ABsin(A)p= 0

  • 8/9/2019 Ali Pinar Seminar: A Combinatorial Approach to Vulnerability Analysis of the Power Grid

    10/37

    Pictorial representation of a blac)out

    )perating point corresponding to current load

    and generation

    +

    *

    7oundary of feasibility region shifts

    as we add/remo4e lines

    8nfeasibility of power flow e9uations lead to a blackout.

    Cascading is initiated by a significant disturbance to the system.

    )ur focus is detecting initiating e4ents and analy:ing the network

    for 4ulnerabilities.

    UCSB Institute for ner!y#$#%$&'#(

    #'

  • 8/9/2019 Ali Pinar Seminar: A Combinatorial Approach to Vulnerability Analysis of the Power Grid

    11/37

    Contin!ency analysis as a bi5le.eloptimi9ation problem

    Add inte!er 7binary8 line parameters- - to identify bro)en lines

    0easure the blac)out se.erity as the distance to feasibility boundary 3he load sheddin! problem

    Bile.el50INLP problem

    cut minimumnumber of lines so that

    shortestdistance to feasibility 7i2e2 se.erity8 is at least as lar!e as aspeciDed tar!et

    0an!asarian ;romowit9 constraint >ualiDcation conditions are satisDed fora sli!htly modiDed system2

    *

    +

    :

    7oundary of feasibility region shiftsas we add/remo4e lines

    )perating point corresponding to

    current load and generation

    UCSB Institute for ner!y#$#%$&'#( ##

  • 8/9/2019 Ali Pinar Seminar: A Combinatorial Approach to Vulnerability Analysis of the Power Grid

    12/37

    3his approach leads to a 0i=edInte!er Nonlinear Pro!ram 70INLP8

    se4erity abo4e threshold

    satisfy the ;;< optimalityconditions

    feasible power flow

    feasible load shedding

    minimi:e number oflines cut

    UCSB Institute for ner!y#$#%$&'#( #&

    min,!,,1 ,2 ,3 ,4,5,6 | |s.t. F(A"(1 ),,p+!) = 0

    /2 A"(1 ) /2e!g #0 pg +!g pg

    pl pl +!l 0e0

    gl

    +

    4 32 1

    = 0

    F

    + A"(1 )(6 5) = 0

    1!l = 0; 2(pl +!l ) = 04!g = 0; 3(pg +!g) = 0;5(/2+ A"(1 )) = 0;6(/2A"(1 )) = 0;1,...,6 0 {0,1}

  • 8/9/2019 Ali Pinar Seminar: A Combinatorial Approach to Vulnerability Analysis of the Power Grid

    13/37

    Jela=ation wor)s on smallproblems

    28

    2 1

    4 3

    5 7 6

    8

    27

    25

    26

    29 30

    2422 21

    10

    20119

    23

    19

    18

    1312

    16 17

    14

    15

    8!!! 1$-7us System

    ;our candidate lines identiDed2

    3wo are su"cient to cause ablac)out2

    ;ailure of these lines can causea blac)out with K%* 0? loss outof a total load of #(( 0?82

    Solutions found usin! SN/P32

    onde, et al. Se4ere Multiple Contingency Screening in !lectric ower Systems,

    8!!!

  • 8/9/2019 Ali Pinar Seminar: A Combinatorial Approach to Vulnerability Analysis of the Power Grid

    14/37

    *2*(

    1$

    '

    &

    +$

    +

    *1

    %

    (

    0

    ++

    2

    +*+1

    +% +(

    +2+0

    +' +&

    *$

    *+

    **

    *1

    *%

    *0

    *'

    *&1+

    1*

    ++(++%

    ++1

    11

    1%

    1(12

    10

    1'

    1&

    %$ %+%*

    %1

    %%

    %(

    %2

    %0

    %'

    %&

    ($

    (+

    (*

    (1

    (%((

    (2

    (0('

    (&

    2%

    2*

    21

    2+

    2$20

    22

    2(

    2'2&

    0$

    01

    0*0+

    0%0(

    02

    00

    0'0&

    '$

    '+

    '*

    '1

    '%

    '(

    '2

    '0

    ''

    '&

    &$

    &+

    &*

    &1&%&(

    &2&0 &' &&

    +$$

    +$++$* +$1

    +$%

    +$(+$2

    +$0+$'

    +$&

    ++$

    +++ ++*

    ++'

    ++2

    ++0

    2 ut not on ar!erproblems

    8!!! ++' 7us System

    #* candidate lines are

    identiDed ;ailure of these lines can

    cause a blac)out with #(0? loss of load 7total load is%&'' 0?8

    Better solutions e=ist

  • 8/9/2019 Ali Pinar Seminar: A Combinatorial Approach to Vulnerability Analysis of the Power Grid

    15/37

    Power5ow 1acobian corresponds to the !raphLaplacian

    Mey obser.ation6he $a%obian matrix,whi%h %hara%teri!es the feasibility boundary,has the same stru%ture as the &apla%ian inspe%tral graph theory.

    ;easibility of the optimi9ation problem pushesthe 1acobian towards a second 9ero ei!en.alue2

    Second 9ero ei!en.alue corresponds to

    disconnected re!ions in the !raph2

    Node-arc

    incidence matri

    Node-arc

    incidence matriDiagonal matrices with non-

    negative weights

    . et al., )ptimi:ation Strategies for the =ulnerability #nalysis of the

    ower >rid, S8#M ?. )ptimi:ation, =ol. *$, No. %, pages +0'2-+'+$, *$+$@

    UCSB Institute for ner!y#$#%$&'#( #(

    F

    =$ =AB"((1 )cos(A)A

  • 8/9/2019 Ali Pinar Seminar: A Combinatorial Approach to Vulnerability Analysis of the Power Grid

    16/37

    ;easible solutions ha.ea combinatorial structure

    3heoretical analysis of the bile.el0INLP formulation shows6

    System is split into load5richand !eneration5rich re!ions2

    3here is at least onesaturated line from the!eneration rich re!ion to theload rich re!ion2

    Blac)out si9e can beappro=imated by the!eneration$load mismatchand capacity of ed!es inbetween2

    28

    2 1

    4 3

    5 7 6

    8

    27

    25

    26

    29 30

    2422 21

    1020

    119

    23

    19

    18

    1312

    16 17

    14

    15

    ractical application6 !ploit the combinatorial structure to find a loosely

    coupled decomposition with a high generation/load mismatch

    UCSB Institute for ner!y#$#%$&'#( #

  • 8/9/2019 Ali Pinar Seminar: A Combinatorial Approach to Vulnerability Analysis of the Power Grid

    17/37

  • 8/9/2019 Ali Pinar Seminar: A Combinatorial Approach to Vulnerability Analysis of the Power Grid

    18/37

    Can we wor) on a nonlinear modelwithout sol.in! nonlinear e>uations@

    It is not free lunch- but a !ood deal2?hy does it wor)@?e are not proposin! a power ow model-we only Dnd why power is not owin!2

    3his is a ow problem2

    3he !oal of the load sheddin! problem is

    to ma)e this model wor)2?hat is missin!@?e can document the underlyin!assumptions that lead to the !raph model2

    But we cannot >uantify the !ap betweenthe two models- yet2

    ?e need a representation of a typicalcases2

    UCSB Institute for ner!y#$#%$&'#( #K

  • 8/9/2019 Ali Pinar Seminar: A Combinatorial Approach to Vulnerability Analysis of the Power Grid

    19/37

    -*

    -*-+

    -1

    -1

    (

    2

    (

    %2

    *

    *

    1

    *

    +$k 3+, ma-flow3 0

    k 3$, ma-flow3 ++

    k 3*, ma-flow3 (

    Networ) inhibition problem

    Cut min2 number of lines so that ma= ow is below a speciDed

    bound2 Shown to be NP5complete 7Phillips #::#82

    3he classical min5cut problem is a special .ersion of networ)inhibition- where ma=5ow is set to 9ero2

    Can be formulated as 0ILP with EVEFEE binary .ariables2

    k 31, ma-flow3+

    UCSB Institute for ner!y#$#%$&'#( #:

  • 8/9/2019 Ali Pinar Seminar: A Combinatorial Approach to Vulnerability Analysis of the Power Grid

    20/37

    0ILP formulation for networ) inhibition

  • 8/9/2019 Ali Pinar Seminar: A Combinatorial Approach to Vulnerability Analysis of the Power Grid

    21/37

    problemcan be sol.ed e"ciently

    3he inte!rality !ap is pro.ably small2

    /nly one fractional .ariable after each solution2

    =perimented on a simpliDed model for ?estern stateswith #*-*% nodes and #-(&' lines- used PIC/ for sol.in!the 0ILPs2

    .en the lar!est instances can be sol.ed in small time-moti.atin! us for more hi!her obecti.es2

    UCSB Institute for ner!y#$#%$&'#(

    3a)e * Inhibitin! bisection

  • 8/9/2019 Ali Pinar Seminar: A Combinatorial Approach to Vulnerability Analysis of the Power Grid

    22/37

    3a)e *6 Inhibitin! bisectionproblem

    i4ide graph into two parts bisectionD so that load/generation mismatch is maimum. cutsi:e is minimum.

    imbalance3+$@ cutsi:e31imbalance3++@ cutsi:e3(

    imbalance3 2@ cutsi:e3*

    -*-+

    -1

    -1

    (

    2

    (

    %

    2 *

    *

    1

    *

    +$

    -*

    UCSB Institute for ner!y

    Lesieutre et al., ower system etreme e4ent analysis

    using graph partitioning, N#S *$$2.

    #$#%$&'#(

    &&

  • 8/9/2019 Ali Pinar Seminar: A Combinatorial Approach to Vulnerability Analysis of the Power Grid

    23/37

    Sol.in! the inhibitin! cutproblem

    Constrained problem is NP5complete2

    Goal6 minimi9e 7cutsi9e( )7#5 8 imbalance

    is the relati.e importance of cutsi9e compared to imbalance2

    Solution6 use a standard min5cut al!orithm2

    0in5cut !i.es an optimalsolution to the lineari9ed inhibitin! bisectionproblem2

    /ther .ersions are sol.able 0inimi9e cutsi9e$imbalance

    0inimi9e capacityO7cutsi9e5#8$cutsi9e

    s

    t

    (

    -*-+

    -1

    -12

    (

    %2

    *

    *

    1

    *

    +$

    -*

    ., Aogel, and Lesieutre,

  • 8/9/2019 Ali Pinar Seminar: A Combinatorial Approach to Vulnerability Analysis of the Power Grid

    24/37

    In t n! sect on ena esfast analysis of lar!e systems

    =perimented on aSimpliDed model for?estern states with#*-*% nodes and #-(&'lines2

    Complete analysis usin!

    Goldber!

  • 8/9/2019 Ali Pinar Seminar: A Combinatorial Approach to Vulnerability Analysis of the Power Grid

    25/37

    ;indin! .ulnerabilities is !ood D=in! them is

    better6 N5) sur.i.able networ) desi!n problem Impro.e a networ) e"ciently to ma)e

    it resilient to contin!encies 0inimi9ethe impro.ement cost such that

    the minimumnumber of lines for thema=imumow to be below a threshold B isabo.e a threshold C2

    Solution approaches6 A sin!le problem with a separate set of

    constraints for each contin!ency forms a !iant problem

    Benderuirements

    the number of subproblems is still .ery lar!e-prohibiti.ely e=pensi.e for lar!e N and )2

    Proposed 0ethod6 elayed Contin!encyGeneration

    UCSB Institute for ner!y

    Infrastructure/pera ons

    Infrastructure

    Pisrup ons

    Infrastructure

    Au!menta on#st Le.el

    &nd Le.el

    *rd Le.el

    #$#%$&'#( &(

    elayed contin!ency

  • 8/9/2019 Ali Pinar Seminar: A Combinatorial Approach to Vulnerability Analysis of the Power Grid

    26/37

    Jestricted0aster Problem

    Sub5Problem*

    Sub5Problem

    Sub5Problem+

    xt

    /JACL@/P3I0AL,S7QI38

    /P3I0ALN/7AN?C/N3INGNC,8

    Optcut(s)

    xt#

    &

    *

    elayed contin!ency!eneration

    /utline of the al!orithm

    Sol.e a restricted master problemto identify candidate lines to add2

    Sol.e the networ) inhibitionproblem

    If we cannot brea) the networ)-current solution is optimal

    If not- add a constraint to themaster problem for the identiDed.ulnerability2

    New constraints e=clude re!ionsof the solution space- as opposedto indi.idual solutions2

    UCSB Institute for ner!y

    "cient solution of the interdiction problem is the )ey enabler2

    3he same framewor) can be applied to plannin! and operationalproblems

    ?e ha.e applied this approach to Unit commitment

    3ransmission and !eneration e=pansion

    Chen et al. Contingency-Constrained Unit Commitment

    with ost-Contingency Correcti4e 5ecourse,

    to appear in #nnals of )perations 5esearch

    #$#%$&'#( &

  • 8/9/2019 Ali Pinar Seminar: A Combinatorial Approach to Vulnerability Analysis of the Power Grid

    27/37

    elayed contin!ency analysis limitscontin!encies bein! considered2

    Problem6 3ransmission and Generation =pansion

    UCSB Institute for ner!y

    Chen et al., Contingency-5isk 8nformed ower System esign,

    to appear in 8!!!

  • 8/9/2019 Ali Pinar Seminar: A Combinatorial Approach to Vulnerability Analysis of the Power Grid

    28/37

    ;ast solutions enable analyses ofthe decision space

    '

    &

    %

    K

    #'

    #&

    #%

    #

    #K&'

    &&

    ' & % K #' #& #% # #K &' && &% & &K *' *&

    M#

    M&M*M%

    Rloadloss

    Cost7

    Billion48

    UCSB Institute for ner!y#$#%$&'#( &K

  • 8/9/2019 Ali Pinar Seminar: A Combinatorial Approach to Vulnerability Analysis of the Power Grid

    29/37

    Cost of perfectness

    '

    &

    %

    K

    #'

    #&

    #%

    #

    #K

    &'

    &&

    ' & % K #' #& #% # #K &' && &% & &K *' *&

    M#

    M&M*M%

    Rloadloss

    Cost

    7Billion48

    Infrastructurein.estment costcanbereducedby('Rif #Rlossof loadisacceptable

    UCSB Institute for ner!y#$#%$&'#( &:

  • 8/9/2019 Ali Pinar Seminar: A Combinatorial Approach to Vulnerability Analysis of the Power Grid

    30/37

    BeneDts of humbleness

    '

    &

    %

    K#'

    #&

    #%

    #

    #K

    &'

    &&

    ' & % K #' #& #% # #K &' && &% & &K *' *&

    M#M&M*M%

    Rloadloss

    Cost7Billion48

    Lossof loadT%RatM%

    Lossof loadT&RatM*

    Lossof loadT#RatM&

    ?ithabud!et of4Billion

    UCSB Institute for ner!y#$#%$&'#( *'

    N t St U t i ti f bl

  • 8/9/2019 Ali Pinar Seminar: A Combinatorial Approach to Vulnerability Analysis of the Power Grid

    31/37

    Ne=t Step6 Uncertainties of renewablesposea crucial challen!e for !rid operations

    Source6 http6//saferen4ironment.wordpress.com

    Aull link

    Source6 http6//www.thesierraleonetelegraph.com/Gp3(1&1

    Most renewable resources cannot be

    controlled and in4ol4e significant

    uncertainties.

    Figh penetration of renewables lead to

    a significant change in operations due

    to uncertainty.

    Storage technologies are not ade9uate

    enough, yet.

    )perations re9uire decision making

    under uncertainty.

    Stochastic optimi:ation is essential.

    7etter models for handling uncertainty

    are needed.

    UCSB Institute for ner!y#$#%$&'#( *#

    http://saferenvironment.wordpress.com/http://saferenvironment.wordpress.com/2008/11/03/wind-energy-renewable-energy-harnesses-natural-wind-power-%E2%80%93-effective-answer-for-emission-problem-towards-cleaner-safer-and-greener-environment/http://saferenvironment.wordpress.com/2008/11/03/wind-energy-renewable-energy-harnesses-natural-wind-power-%E2%80%93-effective-answer-for-emission-problem-towards-cleaner-safer-and-greener-environment/http://saferenvironment.wordpress.com/
  • 8/9/2019 Ali Pinar Seminar: A Combinatorial Approach to Vulnerability Analysis of the Power Grid

    32/37

    /perational problems re>uirestochastic optimi9ation

    Sample Problem6 UnitCommitment

    ;undamental problem inoperations

    3wo sta!e problem ecide on the state of bi! andslow !enerators under aprediction of demand$renewables

    /perate on a reali9ation ofuncertainties to minimi9e!eneration costs

    Standard approach6 0onte Carlosamplin!

    Unit

    commitment

    5eali:ation

    of demand

    rediction

    of demand

    !conomic

    dispatch

    Setup

    costs

    >eneration

    cost

    Commitment

    decisions

    UCSB Institute for ner!y#$#%$&'#( *&

    "cient 0odel for

  • 8/9/2019 Ali Pinar Seminar: A Combinatorial Approach to Vulnerability Analysis of the Power Grid

    33/37

    "cient 0odel forUncertainty6

    Polynomial Chaos =pansion rror for 0onte CarloVar7f8$s>rt7S8

    Accurate estimations renderoptimi9ation problems impractical2

    Proposed Solution6 Polynomial chaos

    e=pansion Commonly used for uncertainty

    >uantiDcation in CS applications

    Core idea6 preprocess the random.ariables to build a surro!ate thatrepresents random .ariables

    compactly Promisin! Initial results6

    Currently wor)in! on addin! thisto the optimi9ation loop

    (hiam and De)arco* +imply put, when

    uncertainty is credibly accounted for such

    methods yield solutions for economic

    benefit of a transmission e"pansion in

    which the +error bars are often larger than

    the nominal predicted benefit.

    UCSB Institute for ner!y

    Safta et al., rid )perations roblems,roc. N#S *$+%

    #$#%$&'#( **

  • 8/9/2019 Ali Pinar Seminar: A Combinatorial Approach to Vulnerability Analysis of the Power Grid

    34/37

    Concludin! remar)s ssentially all models are wron!- but some are useful2

    Geor!e 2 P2 Bo=

    Graph models are useful2 ?e ha.e made si!niDcant ad.ances in .ulnerability

    analysis2 Special structure of a feasible solution to our 0INLP formulation can

    be e=ploited for a simpler approach for .ulnerability detection2

    /ur combinatorial techni>ues can analy9e .ulnerabilities of lar!esystems in a short amount of time2

    Inte!ration of system dynamics remain as a challen!e2

    ?e can incorporate .ulnerability analysis as a constraintto !rid operations and plannin! problems2

    elayed contin!ency !eneration approach shows promisin! results forN5)5e contin!ency constrained problems2

    ?e need no.el approaches for handlin! uncertainties2 0onte Carlo al!orithms cannot pro.ide the desired accuracy in

    estimations2

    UCSB Institute for ner!y#$#%$&'#( *%

  • 8/9/2019 Ali Pinar Seminar: A Combinatorial Approach to Vulnerability Analysis of the Power Grid

    35/37

    Ac)nowled!ements

    Jichard Chen- Amy Cohn- Vaibha. onde- Nen!;an- ,onatan ;o!el- Bernard Lesieutre- VanessaLope9- 1uan 0e9a- Habib Nam- Adam Jeichert-Sandip Joy- Cosmin Safta- 1ean5paul ?atson- andChao ,an! contributed to this wor)2

    UCSB Institute for ner!y#$#%$&'#( *(

  • 8/9/2019 Ali Pinar Seminar: A Combinatorial Approach to Vulnerability Analysis of the Power Grid

    36/37

    Announcements

    ?e always try to create positions for talentedresearchers2 Please contact me

    Networ) Science under SIA0 *rd SIA0 ?or)shop on Networ) Science- Snowbird- U3-

    0ay #5#:- &'#(2 Co5located with the SIA0 C2 ynamical Systems

    Abstract due by 1an #:th2

    0ailin! list for networ) science 3o subscribe- send an email to siam5ns5subscribesiam2or!

    UCSB Institute for ner!y#$#%$&'#( *

    http://www.siam.org/meetings/ns14/mailto:[email protected]:[email protected]:[email protected]://www.siam.org/meetings/ns14/
  • 8/9/2019 Ali Pinar Seminar: A Combinatorial Approach to Vulnerability Analysis of the Power Grid

    37/37

    Jelated Publications Chen- Cohn- ;an- and P2- Contin!ency5Jis) Informed Power System esi!n-W I 32 Power

    Systems Vol2 &:- No2 (- pa!es6 &'K5&': preprint a.ailable as arQi.6#*'(2'K' Chen- ;an- P2- and ?atson- Contin!ency5Constrained Unit Commitment with Post5

    Contin!ency Correcti.e Jecourse-X to appear in Annals of /perations Jesearch- preprinta.ailable as arQi.6#%'%2&:% Safta- Chen- Nam- P2- ?atson- 3oward Usin! Surro!ates to Accelerate Solution of Stochastic

    lectricity Grid /perations Problems-W Proc2 NAPS &'#% preprint a.ailable asarQi.6#%'%2&:%

    Chen- Cohn- ;an- and P2- N5)5epsilon Sur.i.able Power System esi!n-W in #&thInternationalConference on Probabilistic 0ethods Applied to Power Systems 7P0APS#&8 arQi.6#&'#2#(*'

    Chen- Cohn- and P2- An Implicit /ptimi9ation Approach for Sur.i.able Networ) esi!n-W Proc2

    &'## I #stInternational Networ) Science ?or)shop 7NS? &'##8 arQi.6##':2#K'# P2- 0e9a- onde- and Lesieutre- Y

    /ptimi9ation Strate!ies for the Vulnerability Analysis of the Power Grid-W #A- ptimi!ation-&' 7%8- pp2 #K5#K#'- &'#'2

    onde- Lope9- Lesieutre- P2- ,an!- and 0e9a- YSe.ere 0ultiple Contin!ency Screenin! in lectric Power Systems-W EEE . Power #ystems/-&*7&8- pp2 %'5%#- &''K2

    Lesieutre- P2- and Joy- YPower System =treme .ent etection6 3he Vulnerability ;rontier-X inPro%. 0+st 1awaii nt. 2onf. on #ystem #%ien%es- p2 #K%- HI- &''K2 P2- Jeichert- and Lesieutre- YComputin! Criticality of Lines in a Power System-W Pro%. 3445

    EEE nt. #ymp. 2ir%uits and #ystems- pp2 (ZK- New /rleans- LA- 0ay &''2 Lesieutre- Joy- onde- and P2- YPower system e=treme e.ent analysis usin! !raph partitionin!

    -W Pro%. the 67th 8orth Ameri%an Power #ymp.- Carbondale- IL- &''2 onde- Lope9- Lesieutre- P- ,an!- 0e9a-

    IdentiDcation of se.ere multiple contin!encies in electric power networ)s-W Pro%. the 69th

    8orth Ameri%an Power #ymp Ames IA /ctober &''(

    http://arxiv.org/abs/1305.0780http://arxiv.org/abs/1404.2964http://arxiv.org/abs/1404.2964http://arxiv.org/abs/1201.1530http://arxiv.org/abs/1109.1801http://epubs.siam.org/doi/abs/10.1137/070708275http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=4483749http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=4438888http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=4252572http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=4201361http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=1560502http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=1560502http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=4201361http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=4252572http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=4438888http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=4483749http://epubs.siam.org/doi/abs/10.1137/070708275http://arxiv.org/abs/1109.1801http://arxiv.org/abs/1201.1530http://arxiv.org/abs/1404.2964http://arxiv.org/abs/1404.2964http://arxiv.org/abs/1305.0780http://arxiv.org/abs/1305.0780http://arxiv.org/abs/1305.0780