After the digital revolution, the power system security becomes an important issue and it urges the power producers to maintain a well secured system in order to supply a quality power to the end users. This paper pre...After the digital revolution, the power system security becomes an important issue and it urges the power producers to maintain a well secured system in order to supply a quality power to the end users. This paper presents an integrated Corrective Security Constrained Optimal Power Flow (CSCOPF) with Flexible Transmission Line Impedance (FTLI) to enhance the power system security. The corrective approach of SCOPF is chosen, because it allows the corrective equipment to bring back the system to a stable operating point and hence, it offers high flexibility and better economics. The concept of FTLI arises from the ability of FACTS devices such as Thyristor Controlled Series Capacitor (TCSC), which can vary the line reactance to a certain extent. An enhanced security can be achieved by incorporating FTLI into the CSCOPF problem, since the power flow in a system is highly dependent on the line reactance. FTLI based CSCOPF can reduce the amount of rescheduling of generators, but it will result in an increased number of variables and thus, the complexity to the optimization process is increased. This highly complex problem is solved by using nonlinear programming. The AC based OPF model is preferred, since the corrective security actions require highly accurate solutions. IEEE 30 bus system is used to test the proposed scheme and the results are compared with the traditional CSCOPF. It can be seen that the proposed idea provides a notable improvement in the reduction of cost incurred for restoring the system security.展开更多
We devise a model for security investment that reflects dynamic interaction between a defender, who faces uncertainty, and an attacker, who repeatedly targets the weakest link. Using the model, we derive and compare o...We devise a model for security investment that reflects dynamic interaction between a defender, who faces uncertainty, and an attacker, who repeatedly targets the weakest link. Using the model, we derive and compare optimal security investment over multiple periods, exploring the delicate balance between proactive and reactive security investment. We show how the best strategy depends on the defender’s knowledge about prospective attacks and the recoverability of costs when upgrading defenses reactively. Our model explains why security under-investment is sometimes rational even when effective defenses are available and can be deployed independently of other parties’ choices. Finally, we connect the model to real-world security problems by examining two case studies where empirical data are available: computers compromised for use in online crime and payment card security.展开更多
Integrated energy distribution system(IEDS)is one of the integrated energy and power system forms,which involves electricity/gas/cold/heat and other various energy forms.The energy coupling relationship is close and c...Integrated energy distribution system(IEDS)is one of the integrated energy and power system forms,which involves electricity/gas/cold/heat and other various energy forms.The energy coupling relationship is close and complex.IEDS is the focus of regional energy internet research and development at home and abroad.Compared with the traditional power distribution system,IEDS through the multi-energy coupling link comprehensive utilization,effectively improve the distribution system economy,safety,reliability,flexibility and toughness,but also to ease the regional energy system environmental pressure.IEDS is an important direction for the future development of energy systems,and its related research and practice on China’s energy system development also has important practical and strategic significance.This paper summarizes the related researches of the IEDS and explores the energy operation characteristics and coupling mechanisms.What’s more,the integrated model of IEDS is summarized.On these bases,this paper discusses and prospects some key issues such as joint planning,optimization control and security analysis,state estimation and situational awareness and generalized demand side management.展开更多
文摘After the digital revolution, the power system security becomes an important issue and it urges the power producers to maintain a well secured system in order to supply a quality power to the end users. This paper presents an integrated Corrective Security Constrained Optimal Power Flow (CSCOPF) with Flexible Transmission Line Impedance (FTLI) to enhance the power system security. The corrective approach of SCOPF is chosen, because it allows the corrective equipment to bring back the system to a stable operating point and hence, it offers high flexibility and better economics. The concept of FTLI arises from the ability of FACTS devices such as Thyristor Controlled Series Capacitor (TCSC), which can vary the line reactance to a certain extent. An enhanced security can be achieved by incorporating FTLI into the CSCOPF problem, since the power flow in a system is highly dependent on the line reactance. FTLI based CSCOPF can reduce the amount of rescheduling of generators, but it will result in an increased number of variables and thus, the complexity to the optimization process is increased. This highly complex problem is solved by using nonlinear programming. The AC based OPF model is preferred, since the corrective security actions require highly accurate solutions. IEEE 30 bus system is used to test the proposed scheme and the results are compared with the traditional CSCOPF. It can be seen that the proposed idea provides a notable improvement in the reduction of cost incurred for restoring the system security.
文摘We devise a model for security investment that reflects dynamic interaction between a defender, who faces uncertainty, and an attacker, who repeatedly targets the weakest link. Using the model, we derive and compare optimal security investment over multiple periods, exploring the delicate balance between proactive and reactive security investment. We show how the best strategy depends on the defender’s knowledge about prospective attacks and the recoverability of costs when upgrading defenses reactively. Our model explains why security under-investment is sometimes rational even when effective defenses are available and can be deployed independently of other parties’ choices. Finally, we connect the model to real-world security problems by examining two case studies where empirical data are available: computers compromised for use in online crime and payment card security.
基金This work was supported by the National High Technology Research and Development Program(863 Program)of China(2015AA050403)Natural Science Foundation of Tianjin(17JCQNJC06600)+2 种基金Independent Innovation Foundation of Tianjin University(Research on Key Technology of Distributed Demand Response)Ocean Engineering Equipment and Technical Think Tank Joint Project of Qingdao(201707071003)the Distributed Energy and Microgrid Project conducted in collaboration with APPLIED ENERGY UNiLAB-DEM.
文摘Integrated energy distribution system(IEDS)is one of the integrated energy and power system forms,which involves electricity/gas/cold/heat and other various energy forms.The energy coupling relationship is close and complex.IEDS is the focus of regional energy internet research and development at home and abroad.Compared with the traditional power distribution system,IEDS through the multi-energy coupling link comprehensive utilization,effectively improve the distribution system economy,safety,reliability,flexibility and toughness,but also to ease the regional energy system environmental pressure.IEDS is an important direction for the future development of energy systems,and its related research and practice on China’s energy system development also has important practical and strategic significance.This paper summarizes the related researches of the IEDS and explores the energy operation characteristics and coupling mechanisms.What’s more,the integrated model of IEDS is summarized.On these bases,this paper discusses and prospects some key issues such as joint planning,optimization control and security analysis,state estimation and situational awareness and generalized demand side management.