Assessment of power system vulnerability using metaheuristic techniques
ABSTRACT: This paper presents a comparison of different metaheuristic techniques applied to the assessment of power systems vulnerability to intentional attacks, also kwon as the electric grid interdiction problem. This problem is described through a bilevel formulation and comprises the interaction...
- Autores:
-
López Lezama, Jesús M.
Cortina, Juan J.
Muñoz Galeano, Nicolás
- Tipo de recurso:
- Article of investigation
- Fecha de publicación:
- 2018
- Institución:
- Universidad de Antioquia
- Repositorio:
- Repositorio UdeA
- Idioma:
- eng
- OAI Identifier:
- oai:bibliotecadigital.udea.edu.co:10495/35676
- Acceso en línea:
- https://hdl.handle.net/10495/35676
http://www.m-hikari.com/ces/ces2018/ces21-24-2018/p/lopezCES21-24-2018.pdf
- Palabra clave:
- Genetic algorithms
GRASP System
GRASP
Iterated Local Search and Tabu Search
http://id.loc.gov/authorities/subjects/sh92002377
http://id.loc.gov/authorities/subjects/sh85056504
- Rights
- openAccess
- License
- https://creativecommons.org/licenses/by/4.0/
| id |
UDEA2_15bf93a16d56c7c81f5d27876dd79ff8 |
|---|---|
| oai_identifier_str |
oai:bibliotecadigital.udea.edu.co:10495/35676 |
| network_acronym_str |
UDEA2 |
| network_name_str |
Repositorio UdeA |
| repository_id_str |
|
| dc.title.spa.fl_str_mv |
Assessment of power system vulnerability using metaheuristic techniques |
| title |
Assessment of power system vulnerability using metaheuristic techniques |
| spellingShingle |
Assessment of power system vulnerability using metaheuristic techniques Genetic algorithms GRASP System GRASP Iterated Local Search and Tabu Search http://id.loc.gov/authorities/subjects/sh92002377 http://id.loc.gov/authorities/subjects/sh85056504 |
| title_short |
Assessment of power system vulnerability using metaheuristic techniques |
| title_full |
Assessment of power system vulnerability using metaheuristic techniques |
| title_fullStr |
Assessment of power system vulnerability using metaheuristic techniques |
| title_full_unstemmed |
Assessment of power system vulnerability using metaheuristic techniques |
| title_sort |
Assessment of power system vulnerability using metaheuristic techniques |
| dc.creator.fl_str_mv |
López Lezama, Jesús M. Cortina, Juan J. Muñoz Galeano, Nicolás |
| dc.contributor.author.none.fl_str_mv |
López Lezama, Jesús M. Cortina, Juan J. Muñoz Galeano, Nicolás |
| dc.contributor.researchgroup.spa.fl_str_mv |
Grupo de Manejo Eficiente de la Energía (GIMEL) |
| dc.subject.lcsh.none.fl_str_mv |
Genetic algorithms GRASP System |
| topic |
Genetic algorithms GRASP System GRASP Iterated Local Search and Tabu Search http://id.loc.gov/authorities/subjects/sh92002377 http://id.loc.gov/authorities/subjects/sh85056504 |
| dc.subject.proposal.spa.fl_str_mv |
GRASP Iterated Local Search and Tabu Search |
| dc.subject.lcshuri.none.fl_str_mv |
http://id.loc.gov/authorities/subjects/sh92002377 http://id.loc.gov/authorities/subjects/sh85056504 |
| description |
ABSTRACT: This paper presents a comparison of different metaheuristic techniques applied to the assessment of power systems vulnerability to intentional attacks, also kwon as the electric grid interdiction problem. This problem is described through a bilevel formulation and comprises the interaction between a disruptive agent (attacker) and the power system operator (defender). The attacker is positioned in the upper level optimization problem and aims at finding the set of devices (lines, transformers and generators) that, once simultaneously attacked, would maximize the system load shedding. This problem is constrained by a limit on destructive resources and the response of the power system operator, located in the lower level optimization problem that reacts to the attack by modifying the generation dispatch aiming at minimizing the load shedding. The interdiction problem described in this paper is nonlinear and nonconvex; therefore, four different metaheuristic techniques are implemented and compared for its solution: Genetic Algorithm, GRASP, Iterated Local Search and Tabu Search. Results show that the Iterated Local Search adapts better to this problem obtaining the best rate between quality of solutions and computation time. |
| publishDate |
2018 |
| dc.date.issued.none.fl_str_mv |
2018 |
| dc.date.accessioned.none.fl_str_mv |
2023-06-28T14:28:47Z |
| dc.date.available.none.fl_str_mv |
2023-06-28T14:28:47Z |
| dc.type.spa.fl_str_mv |
Artículo de investigación |
| dc.type.coar.spa.fl_str_mv |
http://purl.org/coar/resource_type/c_2df8fbb1 |
| dc.type.redcol.spa.fl_str_mv |
https://purl.org/redcol/resource_type/ART |
| dc.type.coarversion.spa.fl_str_mv |
http://purl.org/coar/version/c_970fb48d4fbd8a85 |
| dc.type.driver.spa.fl_str_mv |
info:eu-repo/semantics/article |
| dc.type.version.spa.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
| format |
http://purl.org/coar/resource_type/c_2df8fbb1 |
| status_str |
publishedVersion |
| dc.identifier.issn.none.fl_str_mv |
1313-6569 |
| dc.identifier.uri.none.fl_str_mv |
https://hdl.handle.net/10495/35676 |
| dc.identifier.doi.none.fl_str_mv |
10.12988/ces.2018.8399 |
| dc.identifier.eissn.none.fl_str_mv |
1314-7641 |
| dc.identifier.url.spa.fl_str_mv |
http://www.m-hikari.com/ces/ces2018/ces21-24-2018/p/lopezCES21-24-2018.pdf |
| identifier_str_mv |
1313-6569 10.12988/ces.2018.8399 1314-7641 |
| url |
https://hdl.handle.net/10495/35676 http://www.m-hikari.com/ces/ces2018/ces21-24-2018/p/lopezCES21-24-2018.pdf |
| dc.language.iso.spa.fl_str_mv |
eng |
| language |
eng |
| dc.relation.ispartofjournalabbrev.spa.fl_str_mv |
Contemp. Eng. Sci. |
| dc.relation.citationendpage.spa.fl_str_mv |
1184 |
| dc.relation.citationissue.spa.fl_str_mv |
24 |
| dc.relation.citationstartpage.spa.fl_str_mv |
1165 |
| dc.relation.citationvolume.spa.fl_str_mv |
11 |
| dc.relation.ispartofjournal.spa.fl_str_mv |
Contemporary Engineering Sciences |
| dc.rights.uri.spa.fl_str_mv |
https://creativecommons.org/licenses/by/4.0/ |
| dc.rights.uri.*.fl_str_mv |
http://creativecommons.org/licenses/by/2.5/co/ |
| dc.rights.accessrights.spa.fl_str_mv |
info:eu-repo/semantics/openAccess |
| dc.rights.coar.spa.fl_str_mv |
http://purl.org/coar/access_right/c_abf2 |
| rights_invalid_str_mv |
https://creativecommons.org/licenses/by/4.0/ http://creativecommons.org/licenses/by/2.5/co/ http://purl.org/coar/access_right/c_abf2 |
| eu_rights_str_mv |
openAccess |
| dc.format.extent.spa.fl_str_mv |
20 |
| dc.format.mimetype.spa.fl_str_mv |
application/pdf |
| dc.publisher.spa.fl_str_mv |
Hikari |
| dc.publisher.place.spa.fl_str_mv |
Ruse, Bulgaria |
| institution |
Universidad de Antioquia |
| bitstream.url.fl_str_mv |
https://bibliotecadigital.udea.edu.co/bitstreams/506aadce-ad8c-40f5-8383-c1c414b4118e/download https://bibliotecadigital.udea.edu.co/bitstreams/b975ac86-e0e7-47da-9a42-46b93d3fcf2c/download https://bibliotecadigital.udea.edu.co/bitstreams/39cacf65-39bb-4b8e-aa19-840fbbf0a895/download https://bibliotecadigital.udea.edu.co/bitstreams/1135371f-a8dc-420b-a2ff-b400426ddec7/download https://bibliotecadigital.udea.edu.co/bitstreams/4381e269-4964-4226-9a7e-b2e85edc48ae/download |
| bitstream.checksum.fl_str_mv |
36f0f00c3b94bd86642bba0ac9f2fd86 1646d1f6b96dbbbc38035efc9239ac9c 8a4605be74aa9ea9d79846c1fba20a33 1bda311ef111cbdb7ad85117b7f9acd7 a92b086e9f954fb32a762fddbc9564ad |
| bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 MD5 MD5 |
| repository.name.fl_str_mv |
Repositorio Institucional de la Universidad de Antioquia |
| repository.mail.fl_str_mv |
aplicacionbibliotecadigitalbiblioteca@udea.edu.co |
| _version_ |
1851052155478212608 |
| spelling |
López Lezama, Jesús M.Cortina, Juan J.Muñoz Galeano, NicolásGrupo de Manejo Eficiente de la Energía (GIMEL)2023-06-28T14:28:47Z2023-06-28T14:28:47Z20181313-6569https://hdl.handle.net/10495/3567610.12988/ces.2018.83991314-7641http://www.m-hikari.com/ces/ces2018/ces21-24-2018/p/lopezCES21-24-2018.pdfABSTRACT: This paper presents a comparison of different metaheuristic techniques applied to the assessment of power systems vulnerability to intentional attacks, also kwon as the electric grid interdiction problem. This problem is described through a bilevel formulation and comprises the interaction between a disruptive agent (attacker) and the power system operator (defender). The attacker is positioned in the upper level optimization problem and aims at finding the set of devices (lines, transformers and generators) that, once simultaneously attacked, would maximize the system load shedding. This problem is constrained by a limit on destructive resources and the response of the power system operator, located in the lower level optimization problem that reacts to the attack by modifying the generation dispatch aiming at minimizing the load shedding. The interdiction problem described in this paper is nonlinear and nonconvex; therefore, four different metaheuristic techniques are implemented and compared for its solution: Genetic Algorithm, GRASP, Iterated Local Search and Tabu Search. Results show that the Iterated Local Search adapts better to this problem obtaining the best rate between quality of solutions and computation time.COL001047720application/pdfengHikariRuse, Bulgariahttps://creativecommons.org/licenses/by/4.0/http://creativecommons.org/licenses/by/2.5/co/info:eu-repo/semantics/openAccesshttp://purl.org/coar/access_right/c_abf2Genetic algorithmsGRASP SystemGRASPIterated Local Search and Tabu Searchhttp://id.loc.gov/authorities/subjects/sh92002377http://id.loc.gov/authorities/subjects/sh85056504Assessment of power system vulnerability using metaheuristic techniquesArtículo de investigaciónhttp://purl.org/coar/resource_type/c_2df8fbb1https://purl.org/redcol/resource_type/ARThttp://purl.org/coar/version/c_970fb48d4fbd8a85info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionContemp. Eng. Sci.118424116511Contemporary Engineering SciencesPublicationORIGINALLopezJesus_2018_AssessmentPowerSystem.pdfLopezJesus_2018_AssessmentPowerSystem.pdfArtículo de investigaciónapplication/pdf923571https://bibliotecadigital.udea.edu.co/bitstreams/506aadce-ad8c-40f5-8383-c1c414b4118e/download36f0f00c3b94bd86642bba0ac9f2fd86MD51trueAnonymousREADCC-LICENSElicense_rdflicense_rdfapplication/rdf+xml; charset=utf-8927https://bibliotecadigital.udea.edu.co/bitstreams/b975ac86-e0e7-47da-9a42-46b93d3fcf2c/download1646d1f6b96dbbbc38035efc9239ac9cMD52falseAnonymousREADLICENSElicense.txtlicense.txttext/plain; charset=utf-81748https://bibliotecadigital.udea.edu.co/bitstreams/39cacf65-39bb-4b8e-aa19-840fbbf0a895/download8a4605be74aa9ea9d79846c1fba20a33MD53falseAnonymousREADTEXTLopezJesus_2018_AssessmentPowerSystem.pdf.txtLopezJesus_2018_AssessmentPowerSystem.pdf.txtExtracted texttext/plain45261https://bibliotecadigital.udea.edu.co/bitstreams/1135371f-a8dc-420b-a2ff-b400426ddec7/download1bda311ef111cbdb7ad85117b7f9acd7MD56falseAnonymousREADTHUMBNAILLopezJesus_2018_AssessmentPowerSystem.pdf.jpgLopezJesus_2018_AssessmentPowerSystem.pdf.jpgGenerated Thumbnailimage/jpeg12447https://bibliotecadigital.udea.edu.co/bitstreams/4381e269-4964-4226-9a7e-b2e85edc48ae/downloada92b086e9f954fb32a762fddbc9564adMD57falseAnonymousREAD10495/35676oai:bibliotecadigital.udea.edu.co:10495/356762025-03-26 17:48:17.162https://creativecommons.org/licenses/by/4.0/open.accesshttps://bibliotecadigital.udea.edu.coRepositorio Institucional de la Universidad de Antioquiaaplicacionbibliotecadigitalbiblioteca@udea.edu.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 |
