Matching Items (9)
Filtering by

Clear all filters

151566-Thumbnail Image.png
Description
The past few decades have seen a consistent growth of distributed PV sources. Distributed PV, like other DG sources, can be located at or near load centers and provide benefits which traditional generation may lack. However, distribution systems were not designed to accommodate such power generation sources as these sources

The past few decades have seen a consistent growth of distributed PV sources. Distributed PV, like other DG sources, can be located at or near load centers and provide benefits which traditional generation may lack. However, distribution systems were not designed to accommodate such power generation sources as these sources might lead to operational as well as power quality issues. A high penetration of distributed PV resources may lead to bi-directional power flow resulting in voltage swells, increased losses and overloading of conductors. Voltage unbalance is a concern in distribution systems and the effect of single-phase residential PV systems on voltage unbalance needs to be explored. Furthermore, the islanding of DGs presents a technical hurdle towards the seamless integration of DG sources with the electricity grid. The work done in this thesis explores two important aspects of grid inte-gration of distributed PV generation, namely, the impact on power quality and anti-islanding. A test distribution system, representing a realistic distribution feeder in Arizona is modeled to study both the aforementioned aspects. The im-pact of distributed PV on voltage profile, voltage unbalance and distribution sys-tem primary losses are studied using CYMDIST. Furthermore, a PSCAD model of the inverter with anti-island controls is developed and the efficacy of the anti-islanding techniques is studied. Based on the simulations, generalized conclusions are drawn and the problems/benefits are elucidated.
ContributorsMitra, Parag (Author) / Heydt, Gerald T (Thesis advisor) / Vittal, Vijay (Thesis advisor) / Ayyanar, Raja (Committee member) / Arizona State University (Publisher)
Created2013
153544-Thumbnail Image.png
Description
The electric power system is one of the largest, most complicated, and most important cyber-physical systems in the world. The link between the cyber and physical level is the Supervisory Control and Data Acquisition (SCADA) systems and Energy Management Systems (EMS). Their functions include monitoring the real-time system operation

The electric power system is one of the largest, most complicated, and most important cyber-physical systems in the world. The link between the cyber and physical level is the Supervisory Control and Data Acquisition (SCADA) systems and Energy Management Systems (EMS). Their functions include monitoring the real-time system operation through state estimation (SE), controlling the system to operate reliably, and optimizing the system operation efficiency. The SCADA acquires the noisy measurements, such as voltage angle and magnitude, line power flows, and line current magnitude, from the remote terminal units (RTUs). These raw data are firstly sent to the SE, which filters all the noisy data and derives the best estimate of the system state. Then the estimated states are used for other EMS functions, such as contingency analysis, optimal power flow, etc.

In the existing state estimation process, there is no defense mechanism for any malicious attacks. Once the communication channel between the SCADA and RTUs is hijacked by the attacker, the attacker can perform a man-in-middle attack and send data of its choice. The only step that can possibly detect the attack during the state estimation process is the bad data detector. Unfortunately, even the bad data detector is unable to detect a certain type of attack, known as the false data injection (FDI) attacks.

Diagnosing the physical consequences of such attacks, therefore, is very important to understand system stability. In this thesis, theoretical general attack models for AC and DC attacks are given and an optimization problem for the worst-case overload attack is formulated. Furthermore, physical consequences of FDI attacks, based on both DC and AC model, are addressed. Various scenarios with different attack targets and system configurations are simulated. The details of the research, results obtained and conclusions drawn are presented in this document.
ContributorsLiang, Jingwen (Author) / Sankar, Lalitha (Thesis advisor) / Kosut, Oliver (Thesis advisor) / Hedman, Kory (Committee member) / Arizona State University (Publisher)
Created2015
153066-Thumbnail Image.png
Description
There has been a considerable growth in distributed photovoltaic (PV) genera-tion and its integration in electric power distribution systems. This has led to a change in the distribution system infrastructure. Properly planned distributed gen-eration can offer a variety of benefits for system operations and enhance opera-tional performance of the distribution

There has been a considerable growth in distributed photovoltaic (PV) genera-tion and its integration in electric power distribution systems. This has led to a change in the distribution system infrastructure. Properly planned distributed gen-eration can offer a variety of benefits for system operations and enhance opera-tional performance of the distribution system. However, high penetration of PV resources can give rise to operating conditions which do not arise in traditional systems and one of the potential issues that needs to be addressed involves impact on power quality of the system with respect to the spectral distortion in voltages and currents.

The test bed feeder model representing a real operational distribution feeder is developed in OpenDSS and the feeder modeling takes into consideration the ob-jective of analysis and frequency of interest. Extensive metering infrastructure and measurements are utilized for validation of the model at harmonic frequencies. The harmonic study performed is divided into two sections: study of impact of non-linear loads on total harmonic voltage and current distortions and study of impact of PV resources on high frequency spectral distortion in voltages and cur-rents. The research work incorporates different harmonic study methodologies such as harmonic and high frequency power flow, and frequency scan study. The general conclusions are presented based on the simulation results and in addition, scope for future work is discussed.
ContributorsJoshi, Titiksha Vjay (Author) / Heydt, Gerald T (Thesis advisor) / Ayyanar, Raja (Committee member) / Vittal, Vijay (Committee member) / Arizona State University (Publisher)
Created2014
153184-Thumbnail Image.png
Description
This thesis addresses the issue of making an economic case for bulk energy storage in the Arizona bulk power system. Pumped hydro energy storage (PHES) is used in this study. Bulk energy storage has often been suggested for large scale electric power systems in order to levelize load (store energy

This thesis addresses the issue of making an economic case for bulk energy storage in the Arizona bulk power system. Pumped hydro energy storage (PHES) is used in this study. Bulk energy storage has often been suggested for large scale electric power systems in order to levelize load (store energy when it is inexpensive [energy demand is low] and discharge energy when it is expensive [energy demand is high]). It also has the potential to provide opportunities to avoid transmission and generation expansion, and provide for generation reserve margins. As the level of renewable energy resources increases, the uncertainty and variability of wind and solar resources may be improved by bulk energy storage technologies.

For this study, the MATLab software platform is used, a mathematical based modeling language, optimization solvers (specifically Gurobi), and a power flow solver (PowerWorld) are used to simulate an economic dispatch problem that includes energy storage and transmission losses. A program is created which utilizes quadratic programming to analyze various cases using a 2010 summer peak load from the Arizona portion of the Western Electricity Coordinating Council (WECC) system. Actual data from industry are used in this test bed. In this thesis, the full capabilities of Gurobi are not utilized (e.g., integer variables, binary variables). However, the formulation shown here does create a platform such that future, more sophisticated modeling may readily be incorporated.

The developed software is used to assess the Arizona test bed with a low level of energy storage to study how the storage power limit effects several optimization outputs such as the system wide operating costs. Large levels of energy storage are then added to see how high level energy storage affects peak shaving, load factor, and other system applications. Finally, various constraint relaxations are made to analyze why the applications tested eventually approach a constant value. This research illustrates the use of energy storage which helps minimize the system wide generator operating cost by "shaving" energy off of the peak demand.

The thesis builds on the work of another recent researcher with the objectives of strengthening the assumptions used, checking the solutions obtained, utilizing higher level simulation languages to affirm results, and expanding the results and conclusions.

One important point not fully discussed in the present thesis is the impact of efficiency in the pumped hydro cycle. The efficiency of the cycle for modern units is estimated at higher than 90%. Inclusion of pumped hydro losses is relegated to future work.
ContributorsDixon, William Jesse J (Author) / Heydt, Gerald T (Thesis advisor) / Hedman, Kory W (Committee member) / Karady, George G. (Committee member) / Arizona State University (Publisher)
Created2014
153914-Thumbnail Image.png
Description
The large distributed electric power system is a hierarchical network involving the

transportation of power from the sources of power generation via an intermediate

densely connected transmission network to a large distribution network of end-users

at the lowest level of the hierarchy. At each level of the hierarchy (generation/ trans-

mission/ distribution), the system

The large distributed electric power system is a hierarchical network involving the

transportation of power from the sources of power generation via an intermediate

densely connected transmission network to a large distribution network of end-users

at the lowest level of the hierarchy. At each level of the hierarchy (generation/ trans-

mission/ distribution), the system is managed and monitored with a combination of

(a) supervisory control and data acquisition (SCADA); and (b) energy management

systems (EMSs) that process the collected data and make control and actuation de-

cisions using the collected data. However, at all levels of the hierarchy, both SCADA

and EMSs are vulnerable to cyber attacks. Furthermore, given the criticality of the

electric power infrastructure, cyber attacks can have severe economic and social con-

sequences.

This thesis focuses on cyber attacks on SCADA and EMS at the transmission

level of the electric power system. The goal is to study the consequences of three

classes of cyber attacks that can change topology data. These classes include: (i)

unobservable state-preserving cyber attacks that only change the topology data; (ii)

unobservable state-and-topology cyber-physical attacks that change both states and

topology data to enable a coordinated physical and cyber attack; and (iii) topology-

targeted man-in-the-middle (MitM) communication attacks that alter topology data

shared during inter-EMS communication. Specically, attack class (i) and (ii) focus on

the unobservable attacks on single regional EMS while class (iii) focuses on the MitM

attacks on communication links between regional EMSs. For each class of attacks,

the theoretical attack model and the implementation of attacks are provided, and the

worst-case attack and its consequences are exhaustively studied. In particularly, for

class (ii), a two-stage optimization problem is introduced to study worst-case attacks

that can cause a physical line over

ow that is unobservable in the cyber layer. The long-term implication and the system anomalies are demonstrated via simulation.

For attack classes (i) and (ii), both mathematical and experimental analyses sug-

gest that these unobservable attacks can be limited or even detected with resiliency

mechanisms including load monitoring, anomalous re-dispatches checking, and his-

torical data comparison. For attack class (iii), countermeasures including anomalous

tie-line interchange verication, anomalous re-dispatch alarms, and external contin-

gency lists sharing are needed to thwart such attacks.
ContributorsZhang, Jiazi (Author) / Sankar, Lalitha (Thesis advisor) / Hedman, Kory (Committee member) / Kosut, Oliver (Committee member) / Arizona State University (Publisher)
Created2015
155042-Thumbnail Image.png
Description
The past decades have seen a significant shift in the expectations and requirements re-lated to power system analysis tools. Investigations into major power grid disturbances have suggested the need for more comprehensive assessment methods. Accordingly, sig-nificant research in recent years has focused on the development of better power system models

The past decades have seen a significant shift in the expectations and requirements re-lated to power system analysis tools. Investigations into major power grid disturbances have suggested the need for more comprehensive assessment methods. Accordingly, sig-nificant research in recent years has focused on the development of better power system models and efficient techniques for analyzing power system operability. The work done in this report focusses on two such topics

1. Analysis of load model parameter uncertainty and sensitivity based pa-rameter estimation for power system studies

2. A systematic approach to n-1-1 analysis for power system security as-sessment

To assess the effect of load model parameter uncertainty, a trajectory sensitivity based approach is proposed in this work. Trajectory sensitivity analysis provides a sys-tematic approach to study the impact of parameter uncertainty on power system re-sponse to disturbances. Furthermore, the non-smooth nature of the composite load model presents some additional challenges to sensitivity analysis in a realistic power system. Accordingly, the impact of the non-smooth nature of load models on the sensitivity analysis is addressed in this work. The study was performed using the Western Electrici-ty Coordinating Council (WECC) system model. To address the issue of load model pa-rameter estimation, a sensitivity based load model parameter estimation technique is presented in this work. A detailed discussion on utilizing sensitivities to improve the ac-curacy and efficiency of the parameter estimation process is also presented in this work.

Cascading outages can have a catastrophic impact on power systems. As such, the NERC transmission planning (TPL) standards requires utilities to plan for n¬-1-1 out-ages. However, such analyses can be computationally burdensome for any realistic pow-er system owing to the staggering number of possible n-1-1 contingencies. To address this problem, the report proposes a systematic approach to analyze n-1-1 contingencies in a computationally tractable manner for power system security assessment. The pro-posed approach addresses both static and dynamic security assessment. The proposed methods have been tested on the WECC system.
ContributorsMitra, Parag (Author) / Vittal, Vijay (Thesis advisor) / Heydt, Gerald T (Committee member) / Ayyanar, Raja (Committee member) / Qin, Jiangchao (Committee member) / Arizona State University (Publisher)
Created2016
147972-Thumbnail Image.png
Description

Lossy compression is a form of compression that slightly degrades a signal in ways that are ideally not detectable to the human ear. This is opposite to lossless compression, in which the sample is not degraded at all. While lossless compression may seem like the best option, lossy compression, which

Lossy compression is a form of compression that slightly degrades a signal in ways that are ideally not detectable to the human ear. This is opposite to lossless compression, in which the sample is not degraded at all. While lossless compression may seem like the best option, lossy compression, which is used in most audio and video, reduces transmission time and results in much smaller file sizes. However, this compression can affect quality if it goes too far. The more compression there is on a waveform, the more degradation there is, and once a file is lossy compressed, this process is not reversible. This project will observe the degradation of an audio signal after the application of Singular Value Decomposition compression, a lossy compression that eliminates singular values from a signal’s matrix.

ContributorsHirte, Amanda (Author) / Kosut, Oliver (Thesis director) / Bliss, Daniel (Committee member) / Electrical Engineering Program (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
154323-Thumbnail Image.png
Description
This work presents research on practices in the day-ahead electric energy market, including replication practices and reliability coordinators used by some market operators to demonstrate the impact these practices have on market outcomes. The practice of constraint relaxations similar to those an Independent System Operator (ISO) might perform in day-ahead

This work presents research on practices in the day-ahead electric energy market, including replication practices and reliability coordinators used by some market operators to demonstrate the impact these practices have on market outcomes. The practice of constraint relaxations similar to those an Independent System Operator (ISO) might perform in day-ahead market models is implemented. The benefits of these practices are well understood by the industry; however, the implications these practices have on market outcomes and system security have not been thoroughly investigated. By solving a day-ahead market model with and without select constraint relaxations and comparing the resulting market outcomes and possible effects on system security, the effect of these constraint relaxation practices is demonstrated.

Proposed market solutions are often infeasible because constraint relaxation practices and approximations that are incorporated into market models. Therefore, the dispatch solution must be corrected to ensure its feasibility. The practice of correcting the proposed dispatch solution after the market is solved is known as out-of-market corrections (OMCs), defined as any action an operator takes that modifies a proposed day-ahead dispatch solution to ensure operating and reliability requirements. The way in which OMCs affect market outcomes is illustrated through the use of different corrective procedures. The objective of the work presented is to demonstrate the implications of these industry practices and assess the impact these practices have on market outcomes.
ContributorsAl-Abdullah, Yousef Mohammad (Author) / Hedman, Kory W (Thesis advisor) / Vittal, Vijay (Thesis advisor) / Heydt, Gerald T (Committee member) / Sankar, Lalitha (Committee member) / Arizona State University (Publisher)
Created2016
157614-Thumbnail Image.png
Description
Reliable and secure operation of bulk power transmission system components is an important aspect of electric power engineering. Component failures in a transmission network can lead to serious consequences and impact system reliability. The operational health of the transmission assets plays a crucial role in determining the reliability of an

Reliable and secure operation of bulk power transmission system components is an important aspect of electric power engineering. Component failures in a transmission network can lead to serious consequences and impact system reliability. The operational health of the transmission assets plays a crucial role in determining the reliability of an electric grid. To achieve this goal, scheduled maintenance of bulk power system components is an important activity to secure the transmission system against unanticipated events. This thesis identifies critical transmission elements in a 500 kV transmission network utilizing a ranking strategy.

The impact of the failure of transmission assets operated by a major utility company in the Southwest United States on its power system network is studied. A methodology is used to quantify the impact and subsequently rank transmission assets in decreasing order of their criticality. The analysis is carried out on the power system network using a node breaker model and steady state analysis. The light load case of spring 2019, peak load case of summer 2023 and two intermediate load cases have been considered for the ranking. The contingency simulations and power flow studies have been carried out using a commercial power flow study software package, Positive Sequence Load Flow (PSLF). The results obtained from PSLF are analyzed using Matlab to obtain the desired ranking. The ranked list of transmission assets will enable asset managers to identify the assets that have the most significant impact on the overall power system network performance. Therefore, investment and maintenance decisions can be made effectively. A conclusion along with a recommendation for future work is also provided in the thesis.
ContributorsBhandari, Harsh Nandlal (Author) / Vittal, Vijay (Thesis advisor) / Heydt, Gerald T (Thesis advisor) / Ayyanar, Raja (Committee member) / Arizona State University (Publisher)
Created2019